CN112187880A - Network content management method and device - Google Patents

Network content management method and device Download PDF

Info

Publication number
CN112187880A
CN112187880A CN202010947695.XA CN202010947695A CN112187880A CN 112187880 A CN112187880 A CN 112187880A CN 202010947695 A CN202010947695 A CN 202010947695A CN 112187880 A CN112187880 A CN 112187880A
Authority
CN
China
Prior art keywords
network content
content
network
identifier
publisher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010947695.XA
Other languages
Chinese (zh)
Other versions
CN112187880B (en
Inventor
任梦璇
薛淼
刘千仞
任杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010947695.XA priority Critical patent/CN112187880B/en
Publication of CN112187880A publication Critical patent/CN112187880A/en
Application granted granted Critical
Publication of CN112187880B publication Critical patent/CN112187880B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • H04L67/63Routing a service request depending on the request content or context
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/289Phrasal analysis, e.g. finite state techniques or chunking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/5682Policies or rules for updating, deleting or replacing the stored data

Abstract

The application provides a method and a device for managing network content, relates to the technical field of communication, and is used for solving the problem of transmission of invalid network content in a network. The method comprises the following steps: the network content management device acquires network content information of the first network content, verifies an account book according to the publisher identification and the history of the first network content, and determines whether the first network content is invalid network content; and if the first network content is invalid network content, stopping transmitting the first network content.

Description

Network content management method and device
Technical Field
The present application relates to the field of communications, and in particular, to a method and an apparatus for managing network content.
Background
A caching mechanism in a Content-centric Networking (CCN) may enable network performance of the CNN to be improved. Specifically, the caching mechanism of the CNN enables a large amount of network content to be cached in the routing node, thereby improving the efficiency of the routing node in transmitting the network content.
However, in the prior art, when the routing node caches illegal network content or the routing node caches expired network content, invalid network content (including the illegal network content or the expired network content) cached in the routing node cannot be deleted effectively, so that the invalid network content is transmitted continuously.
Disclosure of Invention
The application provides a method and a device for managing network content, which are used for solving the problem of transmission of invalid network content in a network.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, the present application provides a method for managing web content.
A network content management device (hereinafter referred to simply as a "management device") acquires network content information (the network content information includes a publisher identifier) of the first network content, and verifies an account book (network content information including at least one network content) according to the publisher identifier and history of the first network content to determine whether the first network content is invalid network content; and if the first network content is invalid network content, stopping transmitting the first network content.
Based on the technical scheme, the management device can determine whether the network content is invalid according to the publisher identification of the network content information and the network information of the network content in the historical verification account book. In this way, when the network content is determined to be invalid network content, the management apparatus may stop transmitting the network content, so that the invalid network content cannot be transmitted in the network.
In one possible design, the network information of the network content further includes a validity flag of the publisher flag; the method for determining whether the first network content is the invalid network content according to the publisher identification and the historical verification account book comprises the following steps: the management device reads the historical verification account book to determine whether the publisher identification of the first network content exists in the historical verification account book; if the history verifies that the publisher identification of the first network content exists in the account book, the management device determines the validity identification of the publisher identification of the first network content; the management device determines whether the first network content is invalid according to the value of the validity identification of the publisher identification of the first network content.
In one possible design, the method further includes: if the historical verification account book does not have the publisher identification of the first network content, the management device executes the first intelligent contract and determines an execution result, wherein the execution result is used for indicating whether the publisher identification is an invalid publisher identification; and storing the execution result in a history verification ledger.
In one possible design, the network content information further includes: the method comprises the steps of obtaining a content abstract identifier, an effectiveness identifier of the content abstract identifier, a network content identifier and an effectiveness identifier of the network content identifier; the method further comprises the following steps: if the first network content is effective network content and the history verifies that the network content information of the second network content exists in the account book, changing the validity identification of the content abstract identification of the second network content and the validity identification of the network content identification; the publisher identification of the second network content is the same as the publisher identification of the first network content, the network content identification of the second network content is the same as the network content identification of the first network content, and the content abstract identification of the second network content is different from the content abstract identification of the first network content; the management apparatus stores network content information of the first network content in a history verification ledger.
In a second aspect, the present application provides a management apparatus for web content, the management apparatus comprising: an acquisition unit and a processing unit.
The acquiring unit is configured to acquire network content information of the first network content, where the network content information includes a publisher identifier;
the processing unit is configured to determine whether the first network content is invalid network content according to the publisher identifier of the first network content and a historical verification ledger, where the historical verification ledger includes network content information of at least one network content;
the acquiring unit is further configured to stop transmitting the first network content if the first network content is invalid network content.
In one possible design, the network information of the network content further includes a validity flag of the publisher flag; the processing unit is specifically used for reading the historical verification account book to determine whether the publisher identification of the first network content exists in the historical verification account book; if the historical verification account book has the publisher identification of the first network content, determining the validity identification of the publisher identification of the first network content; and determining whether the first network content is invalid network content according to the value of the validity identification of the publisher identification of the first network content.
In one possible design, the management device further includes a storage unit; the processing unit is further specifically configured to execute the first intelligent contract if the history verification account book does not have the publisher identifier of the first network content, and determine an execution result, where the execution result is used to indicate whether the publisher identifier is an invalid publisher identifier; the storage unit is used for storing the execution result in the history verification account book.
In one possible design, the network content information further includes: the method comprises the steps of obtaining a content abstract identifier, an effectiveness identifier of the content abstract identifier, a network content identifier and an effectiveness identifier of the network content identifier; the processing unit is further configured to change the validity flag of the content abstract flag of the second network content and the validity flag of the network content flag if the first network content is valid network content and the history verification account book includes network content information of the second network content; the publisher identification of the second network content is the same as the publisher identification of the first network content, the network content identification of the second network content is the same as the network content identification of the first network content, and the content abstract identification of the second network content is different from the content abstract identification of the first network content; the storage unit is further configured to store the network content information of the first network content in the history verification ledger.
In a third aspect, the present application provides an apparatus for managing web content, the apparatus comprising: a processor and a memory; a processor and a memory coupling; the memory is used for storing one or more programs, the one or more programs including computer executable instructions, and when the management device of the network content runs, the processor executes the computer executable instructions stored by the memory to implement the management method of the network content as described in the first aspect and any possible implementation manner of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores instructions that, when executed on a computer, cause the computer to perform the method for managing network content described in the first aspect and any one of the possible implementation manners of the first aspect.
In a fifth aspect, the present application provides a computer program product containing instructions for causing a computer to perform the method for managing web content described in the first aspect and any one of the possible implementations of the first aspect when the computer program product runs on the computer.
In a sixth aspect, the present application provides a chip comprising a processor and a communication interface, the communication interface being coupled to the processor, the processor being configured to execute a computer program or instructions to implement the method for managing web content as described in the first aspect and any possible implementation manner of the first aspect.
In the foregoing solution, for technical problems that can be solved by a management apparatus for network content, a computer device, a computer storage medium, a computer program product, or a chip, and technical effects that can be achieved by the management apparatus for network content, the technical problems and the technical effects that are solved by the first aspect may be referred to, and details are not described herein.
Drawings
Fig. 1 is a system architecture diagram of a communication system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a method for managing network content according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another method for managing web content according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a device for managing network content according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another device for managing network content according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The character "/" herein generally indicates that the former and latter associated objects are in an "or" relationship. For example, A/B may be understood as A or B.
The terms "first" and "second" in the description and claims of the present application are used for distinguishing between different objects and not for describing a particular order of the objects.
Furthermore, the terms "including" and "having," and any variations thereof, as referred to in the description of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or modules is not limited to the listed steps or modules but may alternatively include other steps or modules not listed or inherent to such process, method, article, or apparatus.
In addition, in the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "e.g.," is intended to present concepts in a concrete fashion.
In order to facilitate understanding of the technical solution of the present application, before describing the method for managing network content in the embodiment of the present application in detail, an implementation environment of the embodiment of the present application is described first.
Fig. 1 is a system architecture diagram of a communication system according to an embodiment of the present application. The communication system includes: a plurality of servers. The plurality of servers includes a management server and at least one authentication server, such as a first authentication server and a second authentication server. The plurality of servers communicate with each other through wired communication. A blockchain content network platform may be built into the communication system.
The management server is responsible for managing the verification servers and issuing certificates and public and private keys to each verification server. The management server may also run intelligent contracts. It should be noted that only the server with the certificate will be recognized by the blockchain.
The verification node may be in data communication with the vehicle via the mobile network. And verifying the node installation block chain platform certificate. The verification node can also be used as a routing node in the CCN to realize the forwarding and caching of the message.
The technical scheme provided by the embodiment of the application can be applied to the communication system. The network architecture and the service scenario described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application, and as a person of ordinary skill in the art knows that along with the evolution of the network architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present application is also applicable to similar technical problems.
As shown in fig. 2, a method for managing network content provided in an embodiment of the present application includes the following steps:
s101, the block chain content network platform acquires network content information of the first network content.
The network content information comprises a publisher identifier, a network content identifier, a content abstract identifier and a timestamp.
Illustratively, the first network content information includes: vehicle a (publisher identity), road condition information (network content identity), road condition congestion (content summary identity), 2019, 7 month, 20 days (timestamp).
It can be understood that, through the publisher identification, the publisher of the network content can be determined; the network content can be determined through the network content identification and the content abstract identification.
Specifically, the blockchain content network platform acquires the first network content, checks the first network content, determines whether an invalid vocabulary (such as an illegal vocabulary, a sensitive vocabulary and the like) exists in the first network content, and generates and acquires network information of the first network content.
For example, in the embodiment of the present application, whether an invalid vocabulary exists in the network content may be determined by: the block chain manager verifies the network content in a mode of retrieving and spot-checking the network content; or, the intelligent contract periodically searches whether the network content contains invalid words or not; alternatively, when the user finds that the network content includes an invalid vocabulary, the user reports a complaint to the blockchain content network platform. The above is only an example of how the blockchain content network platform determines whether an invalid vocabulary exists in the network content, and the embodiment of the present application does not limit this.
S102, the block chain content network platform verifies the account book according to the publisher identification and the history of the first network content, and determines whether the first network content is invalid network content.
The historical verification account book comprises network content information of at least one network content, and the network content information of the network content further comprises a validity identifier of the publisher identifier.
In the embodiment of the present application, the validity flag of the publisher flag is used to indicate whether the publisher is a valid publisher.
In one possible implementation, the blockchain content network platform reads the historical verification ledger to determine whether the publisher identifier of the first network content exists in the historical verification ledger.
For example, when the blockchain content network platform acquires that the publisher identifier is the vehicle a, the vehicle a is used as an index to query whether the historical verification account book has the network content information of which the publisher identifier is the vehicle a.
And if the historical verification account book has the publisher identification of the first network content, the block chain content network platform determines the validity identification of the publisher identification of the first network content.
For example, after finding the network content information with the publisher id of the vehicle a, the blockchain content network platform may find the value of the validity id with the publisher id of the vehicle a in the historical verification book.
And the block chain content network platform determines whether the first network content is invalid according to the value of the validity identification of the publisher identification of the first network content.
In one possible design, if the validity flag of the publisher flag has a value of 0, the publisher is an invalid publisher. If the value of the validity flag of the publisher flag is 1, the publisher is a valid publisher.
Illustratively, the history verifies that the network information of the first network content in the ledger is vehicle a (0), and then vehicle a is an invalid publisher.
In another possible implementation manner, if the historical verification ledger does not have the publisher identifier of the first network content, the first intelligent contract is executed, the execution result is determined, and the execution result is stored in the historical verification ledger.
It should be noted that the first intelligent contract is based on trusted and non-tampered data, and can automatically execute some predefined rules and terms. In the embodiment of the present application, the first intelligent contract may be determined according to credit information, driving events, and the like of the issuer. The embodiment of the present application does not limit this.
And the execution result is used for indicating whether the publisher identification is the invalid publisher identification.
It should be noted that the historical verification ledger may be one ledger, or may be two verification ledgers (for example, a content source registration ledger and a content source verification ledger). If the historical verification account book is an account book, reference may be made to the above description, and details are not repeated here. If the historical verification account book is divided into a content source registration account book and a content source verification account book, the block chain content network platform verifies the identifier of the publisher according to the content source registration account book, and if the publisher corresponding to the identifier of the publisher is a valid publisher, the network content information is stored in the content source verification account book.
Optionally, the data format in the content source registration ledger may be: publisher identification (validity identification) -timestamp; the data format in the content source verification ledger can be as follows: publisher identification (validity identification) -network content identification (validity identification) -content digest identification (validity identification) -timestamp. The above description is only an example of the data format in the content source registration account book and the data format in the content source verification account book, and the embodiment of the present application does not limit this.
S103, if the first network content is invalid network content, the block chain content network platform stops transmitting the first network content.
Based on the technical scheme, the management device can determine whether the network content is invalid according to the publisher identification of the network content information and the network information of the network content in the historical verification account book. In this way, when the network content is determined to be invalid network content, the management apparatus may stop transmitting the network content, so that the invalid network content cannot be transmitted in the network.
As the routing node continuously stores new network content, expired network content may be present, that is, network content information with the same network publisher identifier and the same network content identifier is stored in the routing node. Thus, if the network content cannot be identified as expired network content, it is likely that the expired network content will be sent to the receiving party.
As shown in fig. 3, a method for managing network content provided in an embodiment of the present application includes the following steps:
s201, if the first network content is the effective network content, the block chain content network platform inquires whether the history verification account book has the network content information of the second network content.
The publisher identification of the second network content is the same as the publisher identification of the first network content, the network content identification of the second network content is the same as the network content identification of the first network content, and the content abstract identification of the second network content is different from the content abstract identification of the first network content.
In a possible implementation manner, the blockchain content network platform uses the network content information of the first network content as an index key word, and queries whether the network content information of the second network content exists in the history verification ledger.
S202, if the history verification account book contains the network content information of the second network content, the block chain content network platform executes a first operation.
In the embodiment of the present application, the first operation is to change the validity flag of the content digest flag and the validity flag of the network content flag of the second network content.
Illustratively, the network information of the second network content in the history verification ledger is: vehicle a (1) -content name X (1) -summary information K (1) -1 month, 2020, 1: 00. The network content information of the first network content is: vehicle a (1) -content name X (1) -summary information K' (1) -1/2/07: 00 in 2020. The blockchain content network platform changes the network information of the second network content in the historical verification account book into: vehicle a (1) -content name X (0) -summary information K (0) -1 month, 2020, 1: 07: 00.
It is understood that since the network content may be real-time, the network content in the blockchain content network platform may be updated iteratively. Therefore, when new network content is stored in the blockchain content network platform, whether second network content exists is checked, and the network content information of the second network content is changed, so that the second network content is changed into invalid network content.
S203, the block chain content network platform stores the network content information of the first network content in a history verification account book.
It is understood that the blockchain content network platform stores the network content information of the first network content in the history verification ledger, i.e. the blockchain content network platform stores the latest valid network content in the history verification ledger. Therefore, the transmitted network content can be guaranteed to be effective network content.
Based on the technical scheme, the block chain content network platform can identify whether the network content is the overdue network content, so that the transmission of invalid network content is avoided.
The following specifically describes the embodiment of the present application, taking the vehicle a as an example to request the web content a. The network content identifier of the network content A is road condition information, and the abstract identifier is AA.
The vehicle a may first check whether the local security cache module has the content of the traffic information. And if the content of the road condition information exists in the local safety cache module, reading the content. If the local safety cache module does not have the content of the road condition information, the vehicle A sends an interest message (network content identification, classification identification and abstract identification) to the vehicles in one hop around and the vehicle network edge node through the communication system, wherein the effective duration of the interest message is T, and T is a positive number.
After the vehicle B receives the interest message, whether the content of the road condition information is stored in the local safety cache module of the vehicle B is searched. And if the road condition information is stored in the local safety module of the vehicle B, verifying whether the abstract identification of the road condition information in the vehicle B is the same as the abstract identification in the received interest message. If the abstract identifications are not matched, the vehicle B sends network content information (publisher identification, network content identification and content abstract identification) of the road condition information in the vehicle B to the block chain content network platform.
And the block chain content network platform checks the network content information of the road condition information in the vehicle B by referring to the historical verification account book, and determines whether the network content is invalid network content. For a specific verification method, reference may be made to the above embodiments, which are not described herein again.
The foregoing describes the solution provided by an embodiment of the present application, primarily from the perspective of a computer device. It will be appreciated that the computer device, in order to implement the above-described functions, comprises corresponding hardware structures and/or software modules for performing the respective functions. Those skilled in the art will readily appreciate that the steps of the method for managing web content of the examples described in connection with the embodiments disclosed herein may be implemented in hardware or a combination of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application also provides a device for managing the network content. The network content management device may be a computer device, a CPU in the computer device, a processing module in the computer device for managing network content, or a client in the computer device for managing network content.
In the embodiment of the present application, the management apparatus for network content may be divided into functional modules or functional units according to the above method examples, for example, each functional module or functional unit may be divided according to each function, or two or more functions may be integrated into one processing module. The integrated module may be implemented in a form of hardware, or may be implemented in a form of a software functional module or a functional unit. The division of the modules or units in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 4 is a schematic structural diagram of a management device according to an embodiment of the present application. The network content management apparatus is configured to execute the network content management method shown in fig. 2 or 3. The management apparatus of the network content may include an acquisition unit 101 and a processing unit 102.
An obtaining unit 101, configured to obtain network content information of the first network content, where the network content information includes a publisher identifier. For example, in conjunction with fig. 2, the acquisition unit 101 may be configured to perform S101. The processing unit 102 is configured to determine whether the first network content is invalid network content according to the publisher identifier of the first network content and a historical verification ledger, where the historical verification ledger includes network content information of at least one network content. For example, in conjunction with fig. 2, processing unit 102 may be configured to perform S101. The obtaining unit 101 is further configured to stop transmitting the first network content if the first network content is invalid network content.
Optionally, the network information of the network content further includes a validity identifier of the publisher identifier; the processing unit 102 is specifically configured to read the historical verification ledger to determine whether a publisher identifier of the first network content exists in the historical verification ledger; if the historical verification account book has the publisher identification of the first network content, determining the validity identification of the publisher identification of the first network content; and determining whether the first network content is invalid network content according to the value of the validity identification of the publisher identification of the first network content.
Optionally, the management apparatus further includes a storage unit 103; the processing unit 102 is further specifically configured to, if the history verification ledger does not have the publisher identifier of the first network content, execute the first intelligent contract, and determine an execution result, where the execution result is used to indicate whether the publisher identifier is an invalid publisher identifier; a storage unit 103, configured to store the execution result in the history verification ledger.
Optionally, the network content information further includes: the method comprises the steps of obtaining a content abstract identifier, an effectiveness identifier of the content abstract identifier, a network content identifier and an effectiveness identifier of the network content identifier; the processing unit 102 is further configured to change the validity flag of the content abstract flag and the validity flag of the network content flag of the second network content if the first network content is valid network content and the history verification account book includes network content information of the second network content; the publisher identification of the second network content is the same as the publisher identification of the first network content, the network content identification of the second network content is the same as the network content identification of the first network content, and the content abstract identification of the second network content is different from the content abstract identification of the first network content. For example, in conjunction with fig. 3, processing unit 102 may be configured to perform S202. The storage unit 103 is further configured to store the network content information of the first network content in the history verification ledger. For example, in conjunction with fig. 3, the storage unit 103 may be configured to perform S203.
Fig. 5 shows still another possible structure of the management apparatus of web contents involved in the above-described embodiment. The management device of the network content comprises: a processor 201 and a communication interface 202. The processor 201 is used to control and manage the actions of the device, for example, to perform the various steps in the method flows shown in the above-described method embodiments, and/or to perform other processes for the techniques described herein. The communication interface 202 is used to support the management device of the network content to communicate with other network entities. The management device of the web content may further comprise a memory 203 and a bus 204, the memory 203 being used for storing program codes and data of the device.
The processor 201 may implement or execute various exemplary logical blocks, units and circuits described in connection with the present disclosure. The processor may be a central processing unit, general purpose processor, digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, units, and circuits described in connection with the present disclosure. A processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a DSP and a microprocessor, or the like.
Memory 203 may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
The bus 204 may be an Extended Industry Standard Architecture (EISA) bus or the like. The bus 204 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus.
In practical implementation, the obtaining unit 101 may be implemented by the communication interface 202 shown in fig. 5, and the processing unit 102 and the storage unit 103 may be implemented by the processor 201 shown in fig. 5 calling the program code in the memory 203. The specific implementation process may refer to the description of the management method part of the network content shown in fig. 2 or fig. 3, which is not described herein again.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
The present application provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method for managing web content in the above method embodiments.
The embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the instructions are run on a computer, the computer is caused to execute the method for managing the network content in the method flow shown in the foregoing method embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a Read-Only Memory (ROM), an Erasable Programmable Read-Only Memory (EPROM), a register, a hard disk, an optical fiber, a portable Compact Disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, any suitable combination of the above, or any other form of computer readable storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Since the management apparatus, the computer-readable storage medium, and the computer program product of the network content in the embodiments of the present invention may be applied to the method described above, the technical effects obtained by the method may also refer to the method embodiments described above, and the details of the embodiments of the present invention are not repeated herein.
The above is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method for managing network content, which is applied to a blockchain content network platform, the method comprising:
acquiring network content information of first network content, wherein the network content information comprises a publisher identifier;
determining whether the first network content is invalid network content according to the publisher identification of the first network content and a historical verification ledger, wherein the historical verification ledger comprises network content information of at least one network content;
and if the first network content is invalid network content, stopping transmitting the first network content.
2. The method for managing web contents according to claim 1, wherein the web information of the web contents further includes a validity flag of a publisher flag;
the determining whether the first network content is invalid network content according to the publisher identification and the historical verification account book includes:
reading the historical verification ledger to determine whether a publisher identification of the first network content exists in the historical verification ledger;
if the historical verification account book has the publisher identification of the first network content, determining the validity identification of the publisher identification of the first network content;
and determining whether the first network content is invalid network content according to the value of the validity identifier of the publisher identifier of the first network content.
3. The method for managing web contents according to claim 2, wherein the method further comprises:
if the historical verification account book does not have the publisher identification of the first network content, executing a first intelligent contract, and determining an execution result, wherein the execution result is used for indicating whether the publisher identification is an invalid publisher identification;
storing the execution result in the historical validation ledger.
4. The method for managing web contents according to any one of claims 1 to 3, wherein the web content information further includes: the method comprises the steps of obtaining a content abstract identifier, an effectiveness identifier of the content abstract identifier, a network content identifier and an effectiveness identifier of the network content identifier; the method further comprises the following steps:
if the first network content is effective network content and the history verification account book contains network content information of second network content, changing the validity identification of the content abstract identification of the second network content and the validity identification of the network content identification; the publisher identifier of the second network content is the same as the publisher identifier of the first network content, the network content identifier of the second network content is the same as the network content identifier of the first network content, and the content abstract identifier of the second network content is different from the content abstract identifier of the first network content;
storing the network content information of the first network content in the historical validation ledger.
5. A management apparatus for network contents, the management apparatus comprising:
the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring network content information of first network content, and the network content information comprises a publisher identification;
the processing unit is used for determining whether the first network content is invalid network content according to the publisher identification of the first network content and a historical verification ledger, wherein the historical verification ledger comprises network content information of at least one network content;
the obtaining unit is further configured to stop transmitting the first network content if the first network content is invalid network content.
6. The apparatus for managing web contents according to claim 5, wherein the network information of the web contents further includes a validity flag of a publisher flag; the processing unit is particularly used for
Reading the historical verification ledger to determine whether a publisher identification of the first network content exists in the historical verification ledger;
if the historical verification account book has the publisher identification of the first network content, determining the validity identification of the publisher identification of the first network content;
and determining whether the first network content is invalid network content according to the value of the validity identifier of the publisher identifier of the first network content.
7. The management apparatus of web contents according to claim 6, wherein the management apparatus further comprises a storage unit;
the processing unit is further specifically configured to execute a first intelligent contract and determine an execution result if the publisher identifier of the first network content does not exist in the history verification ledger, where the execution result is used to indicate whether the publisher identifier is an invalid publisher identifier;
the storage unit is configured to store the execution result in the history verification ledger.
8. The apparatus for managing web contents according to any one of claims 5 to 7, wherein the web contents information further includes: the method comprises the steps of obtaining a content abstract identifier, an effectiveness identifier of the content abstract identifier, a network content identifier and an effectiveness identifier of the network content identifier; the management device includes: a storage unit;
the processing unit is further configured to change the validity flag of the content abstract flag of the second network content and the validity flag of the network content flag if the first network content is valid network content and the history verification account book includes network content information of the second network content; the publisher identifier of the second network content is the same as the publisher identifier of the first network content, the network content identifier of the second network content is the same as the network content identifier of the first network content, and the content abstract identifier of the second network content is different from the content abstract identifier of the first network content;
the storage unit is further configured to store the network content information of the first network content in the history verification ledger.
9. An apparatus for managing web contents, comprising: a processor and a memory; the processor and the memory are coupled; the memory is used for storing one or more programs, and the one or more programs comprise computer-executable instructions which are executed by the processor when the management device of the network content runs, so that the management device of the network content executes the management method of the network content as claimed in any one of claims 1 to 4.
10. A computer-readable storage medium having instructions stored therein, wherein when the instructions are executed by a computer, the computer performs the method for managing web contents as set forth in any one of claims 1 to 4.
CN202010947695.XA 2020-09-10 2020-09-10 Network content management method and device Active CN112187880B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010947695.XA CN112187880B (en) 2020-09-10 2020-09-10 Network content management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010947695.XA CN112187880B (en) 2020-09-10 2020-09-10 Network content management method and device

Publications (2)

Publication Number Publication Date
CN112187880A true CN112187880A (en) 2021-01-05
CN112187880B CN112187880B (en) 2022-03-18

Family

ID=73920377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010947695.XA Active CN112187880B (en) 2020-09-10 2020-09-10 Network content management method and device

Country Status (1)

Country Link
CN (1) CN112187880B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557439A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110557438A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2985970A1 (en) * 2014-08-11 2016-02-17 Palo Alto Research Center, Incorporated Probabilistic lazy-forwarding technique without validation in a content centric network
US20160212146A1 (en) * 2008-04-25 2016-07-21 Kelce S. Wilson PEDDaL Blockchaining for Document Integrity Verification Preparation
US20170085545A1 (en) * 2015-07-14 2017-03-23 Fmr Llc Smart Rules and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
CN107135077A (en) * 2017-05-05 2017-09-05 中国联合网络通信集团有限公司 Software protecting method and device
CN109308287A (en) * 2018-09-26 2019-02-05 南京荣链科技有限公司 A kind of partitions of file storage method, terminal and medium based on block chain
CN109313771A (en) * 2016-04-14 2019-02-05 T移动美国公司 The degree of reiability of real-time auction
CN109327457A (en) * 2018-11-09 2019-02-12 广州大学 A kind of internet of things equipment identity identifying method and system based on block chain
CN109951490A (en) * 2019-03-27 2019-06-28 远光软件股份有限公司 Webpage integrity assurance, system and electronic equipment based on block chain
CN110046165A (en) * 2019-04-17 2019-07-23 江苏全链通信息科技有限公司 Dissemination method, equipment and the computer readable storage medium of distributed application program
CN110557438A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110659441A (en) * 2019-09-26 2020-01-07 腾讯科技(深圳)有限公司 Information release management method and device based on block chain
CN110852399A (en) * 2019-11-19 2020-02-28 腾讯科技(深圳)有限公司 Block chain-based content processing method and device, computer equipment and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160212146A1 (en) * 2008-04-25 2016-07-21 Kelce S. Wilson PEDDaL Blockchaining for Document Integrity Verification Preparation
US20190260761A1 (en) * 2008-04-25 2019-08-22 Kelce S. Wilson Registering received email documents in a blockchain
EP2985970A1 (en) * 2014-08-11 2016-02-17 Palo Alto Research Center, Incorporated Probabilistic lazy-forwarding technique without validation in a content centric network
US20170085545A1 (en) * 2015-07-14 2017-03-23 Fmr Llc Smart Rules and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
CN109313771A (en) * 2016-04-14 2019-02-05 T移动美国公司 The degree of reiability of real-time auction
CN107135077A (en) * 2017-05-05 2017-09-05 中国联合网络通信集团有限公司 Software protecting method and device
CN109308287A (en) * 2018-09-26 2019-02-05 南京荣链科技有限公司 A kind of partitions of file storage method, terminal and medium based on block chain
CN109327457A (en) * 2018-11-09 2019-02-12 广州大学 A kind of internet of things equipment identity identifying method and system based on block chain
CN109951490A (en) * 2019-03-27 2019-06-28 远光软件股份有限公司 Webpage integrity assurance, system and electronic equipment based on block chain
CN110046165A (en) * 2019-04-17 2019-07-23 江苏全链通信息科技有限公司 Dissemination method, equipment and the computer readable storage medium of distributed application program
CN110557438A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110659441A (en) * 2019-09-26 2020-01-07 腾讯科技(深圳)有限公司 Information release management method and device based on block chain
CN110852399A (en) * 2019-11-19 2020-02-28 腾讯科技(深圳)有限公司 Block chain-based content processing method and device, computer equipment and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
QIUYUN LYU;YIZHEN QI;XIAOCHEN ZHANG;HUAPING LIU;QIUHUA WANG: "SBAC:A secure blockchain-based access control framework for information-centric netwoking", 《JOURNAL OF NETWORK AND COMPUTER APPLICATIONS》 *
王姝等: "基于区块链的科学数据标识技术创新应用模式", 《数据与计算发展前沿》 *
雷凯;黄硕康;方俊杰;黄济乐;谢英英: "智能生态网络:知识驱动的未来价值互联网基础设施", 《应用科学学报》 *
马勇: "基于IBC机制的内容中心网络安全认证方案", 《电子设计工程》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557439A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110557438A (en) * 2019-08-07 2019-12-10 中国联合网络通信集团有限公司 Network content management method and block chain content network platform
CN110557438B (en) * 2019-08-07 2022-02-11 中国联合网络通信集团有限公司 Network content management method and block chain content network platform

Also Published As

Publication number Publication date
CN112187880B (en) 2022-03-18

Similar Documents

Publication Publication Date Title
Michelin et al. SpeedyChain: A framework for decoupling data from blockchain for smart cities
CN111698228B (en) System access authority granting method, device, server and storage medium
US11217332B1 (en) Distributed ledger system for managing medical records
US11088854B2 (en) Securing blockchain access through a gateway on behalf of a communication device
CN112187880B (en) Network content management method and device
CN113271311B (en) Digital identity management method and system in cross-link network
US20080052388A1 (en) Substitutable domain management system and method for substituting the system
CN112966028A (en) Data traceability system, method and device based on industrial internet identification
CN109639643A (en) Customer manager's information sharing method, electronic device and readable storage medium storing program for executing based on block chain
CN110944007B (en) Network access management method, system, device and storage medium
CN111212027A (en) Network security verification method and device based on enterprise browser
CN111654375A (en) Block chain-based edge calculation security encryption method, device and system
CN112560074B (en) Vehicle passing data processing method, device, equipment and system
WO2019175427A1 (en) Method, device and medium for protecting work based on blockchain
KR20130029190A (en) System for controlling user resources access and method thereof
WO2020259519A1 (en) Certificate update method and related device
CN111478890B (en) Network service access control method and system based on intelligent contract
EP2708090A1 (en) Sensor data distribution system
CN113239255B (en) Heterogeneous data resource sharing method and device, computer equipment and medium
Aswathy et al. Bvd-a blockchain based vehicle database system
CN102999570B (en) The Off-line control method of application program critical data and system in mobile equipment
CN114493565A (en) Account association method and account association management system
KR102156183B1 (en) A trust index provision apparatus for an IoT device, a trust index provision method for an IoT device, a trust information management apparatus for an IoT device, a a trust information management method for an IoT device, a cooperation system of IoT devices based on trust index, a cooperation method of IoT devices based on trust index
CN112862589B (en) Authentication method, device and system in financial scene
Das et al. Design of a secure blockchain-based toll-tax collection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant