CN116032793B - Information processing method, information processing device, electronic equipment and computer readable medium - Google Patents

Information processing method, information processing device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN116032793B
CN116032793B CN202211459798.7A CN202211459798A CN116032793B CN 116032793 B CN116032793 B CN 116032793B CN 202211459798 A CN202211459798 A CN 202211459798A CN 116032793 B CN116032793 B CN 116032793B
Authority
CN
China
Prior art keywords
target
node
log information
blockchain
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211459798.7A
Other languages
Chinese (zh)
Other versions
CN116032793A (en
Inventor
田新雪
肖征荣
邴建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211459798.7A priority Critical patent/CN116032793B/en
Publication of CN116032793A publication Critical patent/CN116032793A/en
Application granted granted Critical
Publication of CN116032793B publication Critical patent/CN116032793B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an information processing method, an information processing device, electronic equipment and a computer readable medium, which are applied to network access equipment nodes in a blockchain, wherein the method comprises the following steps: acquiring a test record issued by a first user node; responding to the test record, and acquiring network access log information corresponding to the terminal equipment, wherein the network access log information is generated after the terminal equipment is accessed to an operator network based on target network access equipment, and the target network access equipment corresponds to the network access equipment node; and generating a target ciphertext by using a preset encryption algorithm according to the network log information, and issuing the target ciphertext to the block chain. The method can improve the solution efficiency of the test problem corresponding to the terminal equipment and avoid potential safety hazard problems possibly brought in the information transmission process.

Description

Information processing method, information processing device, electronic equipment and computer readable medium
Technical Field
The invention relates to the technical field of computers, in particular to an information processing method, an information processing device, electronic equipment and a computer readable medium.
Background
At present, when a test problem is found in a terminal test process, a user usually carries out problem feedback in a telephone mode, and customer service personnel of an operator carry out on-line problem solving in a manual contact function mode, so that the whole process is tedious and tedious, for example, the process can involve the cooperation of multiple roles of a terminal user, first-line personnel, operation and maintenance specialist, hardware manufacturer, terminal software manufacturer, research institute and the like, and the problem of low participation enthusiasm often exists in the processes, so that more energy and time are consumed in a communication link, and the problem solving efficiency is extremely low; in addition, in the process of offline communication, the transmitted offline files may be lost, so that potential safety hazards are brought, and therefore, it is necessary to provide an information processing method to solve the above problems.
Disclosure of Invention
Therefore, the invention provides an information processing method to solve the problems of low efficiency and potential safety hazard caused by information leakage possibly existing in the related art when processing the test problem.
To achieve the above object, a first aspect of the present invention provides an information processing method applied to a network access device node in a blockchain, the method comprising:
Acquiring a test record issued by a first user node, wherein the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
responding to the test record, and acquiring network access log information corresponding to the terminal equipment, wherein the network access log information is generated after the terminal equipment is accessed to an operator network based on target network access equipment, and the target network access equipment corresponds to the network access equipment node;
generating a target ciphertext by using a preset encryption algorithm according to the network log information, and issuing the target ciphertext into the block chain;
the target ciphertext comprises an access policy, the access policy is used for limiting the attribute of a decryption party for decrypting the target ciphertext, the target ciphertext is used for a node in the blockchain to acquire the networking log information, and the testing problem is solved based on the networking log information and the testing record.
Optionally, the generating, according to the log information, the target ciphertext by using a preset encryption algorithm includes: acquiring preset public parameters and an access structure for describing the access strategy; performing attribute-based encryption processing on the network entry log information according to the preset public parameters and the access structure to obtain the target ciphertext; wherein the preset common parameters are parameters that are generated and distributed to each node in the blockchain when the blockchain is constructed; and the preset public parameters are used for decrypting the target ciphertext under the condition that the target ciphertext is received by a node in the blockchain so as to acquire the network entry log information.
Optionally, the obtaining an access structure for describing the access policy includes: acquiring target attribute information of a target user corresponding to the terminal equipment and/or the target network access equipment; and generating the access structure according to the target attribute information.
Optionally, before executing the step of responding to the test record and acquiring the log information corresponding to the terminal device, the method further includes: acquiring a terminal identifier corresponding to the terminal equipment from the test record; checking whether an operator network used by the terminal equipment is accessed based on the target network access equipment according to the terminal identification; and under the condition that the terminal equipment is checked to access the operator network based on the target network access equipment, executing the step of responding to the test record and acquiring the network log information corresponding to the terminal equipment.
To achieve the above object, a second aspect of the present invention provides another information processing method applied to a second user node in a blockchain, the method including:
acquiring a test record issued by a first user node, wherein the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
Responding to the test record, and acquiring a target ciphertext, wherein the target ciphertext is a ciphertext which is generated by a network access equipment node corresponding to the terminal equipment after encrypting network access log information of the terminal equipment based on a preset encryption algorithm and contains an access strategy;
decrypting the target ciphertext by using a preset decryption algorithm to obtain the network entry log information;
generating a solution for solving the test problem according to the network log information, and publishing the solution to the blockchain, wherein the solution is used for an operator node in the blockchain to solve the test problem.
Optionally, the decrypting the target ciphertext using a preset decryption algorithm to obtain the log information includes: acquiring preset public parameters and a target private key of the second user node, wherein the target private key is generated based on the attribute of the second user node when the second user node is registered in the blockchain; and performing attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key to obtain the network entry log information.
Optionally, the performing, according to the preset public parameter and the target private key, attribute-based decryption processing on the target ciphertext to obtain the log information includes: and in the process of carrying out attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key, acquiring an access structure used for describing the access strategy in the target ciphertext, and acquiring the network entry log information under the condition that the attribute of the second user node represented by the target private key is matched with the target attribute information of the target user represented in the access structure.
In order to achieve the above object, a third aspect of the present invention further provides a test problem handling method applied to an operator node in a blockchain, the method comprising:
acquiring a test record issued by a first user node, wherein the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
obtaining, from the blockchain, at least one solution issued by a second user node for solving the test problem in response to the test record, wherein the solution is generated by the second user node according to network entry log information obtained by decrypting a target ciphertext when the second user node obtains the test record, and the network entry log information is obtained by a network access device node in the blockchain in response to the test record;
Processing the test problem according to the at least one solution, and issuing a verification request in the blockchain according to a processing result, wherein the verification request is used for requesting the first user to verify whether the test problem is solved;
and under the condition that a response message corresponding to the verification request is acquired, issuing a problem solving result in the block chain according to the response message.
Optionally, the problem solving result is used for triggering a computing node in the blockchain to calculate rewards of each participating node according to contribution degrees of the participating nodes; the participation node comprises at least one of the network access equipment node, the operator node, the second user node and a manufacturer node to which the second user belongs, and the manufacturer node comprises at least one of a terminal manufacturer node, an application manufacturer node and a network access manufacturer node; the manufacturer node is used for generating a target processing result for repairing the test problem under the condition that the target work order issued by the operator node is received, and the target processing result comprises a software update package or operation information for repairing the test problem.
In order to achieve the above object, a fourth aspect of the present invention also provides an information processing apparatus applied to a network access device node in a blockchain, the apparatus comprising:
the system comprises a first record acquisition module, a first user node and a second user node, wherein the first record acquisition module is used for acquiring a test record issued by the first user node, the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
the information acquisition module is used for responding to the test record and acquiring network access log information corresponding to the terminal equipment, wherein the network access log information is generated by the terminal equipment after the terminal equipment is accessed to an operator network based on target network access equipment, and the target network access equipment corresponds to the network access equipment node;
the information processing module is used for generating a target ciphertext by using a preset encryption algorithm according to the network log information and issuing the target ciphertext into the block chain;
the target ciphertext comprises an access policy, the access policy is used for limiting the attribute of a decryption party for decrypting the target ciphertext, the target ciphertext is used for a node in the blockchain to acquire the networking log information, and the testing problem is solved based on the networking log information and the testing record.
In order to achieve the above object, a fifth aspect of the present invention further provides an electronic device, including:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors cause the one or more processors to implement the method of any of the first, second or third aspects of the present invention;
one or more I/O interfaces coupled between the processor and the memory configured to enable information interaction of the processor with the memory.
In order to achieve the above object, a sixth aspect of the present invention further provides a computer readable medium having stored thereon a computer program which, when executed by a processor, implements the method of any one of the first, second or third aspects of the present invention.
The invention has the following advantages: according to the embodiment of the invention, under the condition that the network access equipment node in the blockchain acquires the test record which is issued by the first user node and corresponds to the terminal equipment, after the network access equipment node acquires the network access log information which corresponds to the terminal equipment, in order to facilitate other nodes in the blockchain to generate a solution for solving the test problem recorded in the test record based on the network access log information, meanwhile, the potential safety hazard which is possibly caused by the malicious utilization of the network access log information after being issued to the blockchain is avoided, the network access equipment node can encrypt the network access log information based on a preset encryption algorithm to obtain a target ciphertext and issue the target ciphertext into the blockchain, and because the target ciphertext comprises an access strategy for limiting a decryption party for decrypting the target ciphertext, the potential safety hazard which is possibly caused by the malicious utilization of the target ciphertext can be avoided; meanwhile, based on the block chain, the test record of the terminal equipment is issued, and based on the block chain, the network entry log information is transmitted, so that online closed loops of test problem issue, solution solicitation, test problem processing, processing result verification and solution issue can be formed, and the test problem corresponding to the terminal equipment can be efficiently solved.
Drawings
The accompanying drawings are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate the invention and together with the description serve to explain, without limitation, the invention.
Fig. 1 is a schematic flow chart of an information processing method according to an embodiment of the present invention;
FIG. 2 is a flowchart of another information processing method according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method for processing test problems according to an embodiment of the present invention;
fig. 4 is a block diagram showing the constitution of an information processing apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram showing another information processing apparatus according to an embodiment of the present invention;
FIG. 6 is a block diagram showing a test problem handling apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following describes specific embodiments of the present invention in detail with reference to the drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above-described drawings are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order; in addition, the embodiments of the present invention and the features in the embodiments may be arbitrarily combined with each other without collision.
As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The terms "comprises," "comprising," and/or "including" when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and the present invention and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
In the related art, a user or a tester usually relies on an off-line manner to solve a test problem, such as a call or communication problem, when the terminal device is found to exist in the test problem during use of the terminal device or testing of the terminal device.
For example, in the related art, when a tester finds that a certain call or communication related test problem exists in a terminal device, a problem feedback is often performed to customer service of an operator to which a network used by the terminal device belongs by a telephone manner, then a manual contact function manner is used by the customer service of the operator to perform a downlink problem solution, the roles involved in the whole problem solution process are more, and the problem that the participation enthusiasm of a user is not high is often existed in the processes, so that the problem solution efficiency is extremely low; in addition, in the process of online and offline communication, potential safety hazards can be caused by the loss of transmitted offline files.
In order to solve the above problems and to safely and efficiently solve the test problems of the terminal device, the embodiment of the invention provides an information processing method. Fig. 1 is a schematic flow chart of an information processing method according to an embodiment of the invention. The method may be implemented by an electronic device, which may specifically be a network access device node in a blockchain.
The blockchain in the embodiment of the invention can be constructed by an operator to which an operator node belongs, and is used for solving the testing problem corresponding to the terminal equipment in a closed loop manner by all participants in an online manner, wherein the participants can comprise a first user for using or testing the terminal equipment, a terminal manufacturer, an application manufacturer, a hardware manufacturer (such as a network access equipment manufacturer), a second user belonging to different manufacturers and can also comprise network access equipment.
It should be noted that, in the embodiment of the present invention, a blockchain client may be installed in the network access device, so that the network access device may be used as a node in the blockchain, that is, a node of the network access device accesses the blockchain, and participates in solving the test problem corresponding to the terminal device. For example, the network access device may detect a test record published on a blockchain based on the blockchain client, and obtain log information of the terminal device after accessing the operator network based on a terminal identifier in the test record, such as a mobile phone number associated with the terminal device.
It may be understood that the blockchain may include, in addition to the network access device node corresponding to the network access device, a node corresponding to each participant as needed, for example, at least one of a first user node corresponding to the first user, a second user node corresponding to the second user, a terminal vendor node corresponding to a terminal vendor, an application vendor node corresponding to an application vendor, and a hardware vendor node corresponding to a different hardware vendor, where the hardware vendor node may be, for example, a network access vendor node corresponding to a network access device vendor.
In the embodiment of the present invention, considering that the network access device may expose the vulnerability of the device itself, so as to bring about a potential safety hazard to the device, in the embodiment of the present disclosure, a blockchain builder may generate a system-level preset public parameter PK during construction, i.e., initialization, and generate a master key MK, each participant issues its own identity in the blockchain, i.e., during registration, the blockchain may obtain the preset public parameter PK, and at the same time, the blockchain may also generate a private key for each participant, where the private key may be generated by a preset private key generation algorithm, for example, may be based on the formula: sk=key Generation (MK, S) wherein SK represents the generated private Key, MK represents the above master Key, S is used to describe the Key or at least one attribute of the participant, and Key Generation represents the preset private Key Generation algorithm.
The blockchain, nodes possibly included in the blockchain, and information possibly included in the nodes in the embodiment of the present invention are briefly described above. Of course, in practice, the blockchain may also include nodes of other participants, which are not particularly limited herein.
As shown in fig. 1, the first information processing method provided in the embodiment of the present invention may include the following steps S101 to S103, which are described in detail below.
Step S101, a test record issued by a first user node is obtained, wherein the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user.
In the embodiment of the invention, the terminal device may be a device that performs a call or communication based on an operator network, where the operator network used by the terminal device may correspond to an operator node, i.e. the operator network is operated by an operator corresponding to the operator node.
The terminal device may be, for example, a mobile phone, but of course, it may also be other devices, for example, a tablet computer, a smart watch, etc., which are not limited herein.
The first user may be a user using or testing a terminal device.
The test record in the embodiment of the present invention may be a record generated by the first user, i.e. the end user or the end tester when discovering the test problem existing in the terminal device, for describing the test problem, where the test problem may be a problem related to a call or communication, and of course, the test problem may also be another type of problem, which is not limited herein specifically.
In addition, in some embodiments, the first user node may also be the terminal device, and in this embodiment, the test record may also be that, in a case where the first user finds that a test problem exists in the terminal, the first user performs problem reproduction based on a blockchain record generating application program that is installed in the terminal device in advance, automatically records information related to the terminal, such as various signaling interaction information on the terminal side, and automatically generates and issues the test record to the blockchain.
The test record may include terminal information corresponding to the terminal device, a terminal identifier corresponding to the terminal device, application information of a target application with a problem, and problem description information, where the problem description information may be signaling interaction information at a terminal side, for example.
The terminal identifier may be a mobile phone number associated with the terminal device; the target application may be any application, and the application information may include information such as an application identifier and version information of the target application.
To improve problem-solving efficiency, the test record may not rely on offline transmission, but may be issued by the first user node in the form of a broadcast message signed by a private key into the blockchain of the embodiment of the present invention.
Step S102, responding to the test record, and acquiring network access log information corresponding to the terminal equipment, wherein the network access log information is generated after the terminal equipment is accessed to an operator network based on target network access equipment, and the target network access equipment corresponds to a network access equipment node.
The log information may be information of signaling interaction between the terminal device and the network access device after the terminal device accesses the operator network. Of course, in some embodiments, in order to facilitate the participants in the blockchain to quickly locate the test problem and provide a solution, the network entry log information may also include original log information and an exception analysis report, where the original log information may be signaling interaction information corresponding to the terminal device originally generated in the network access device, and the exception analysis report may be an analysis report obtained by the network access node automatically analyzing the original log information based on the occurrence time of the test problem, where the occurrence time may cause the test problem to occur.
It should be noted that, in the embodiment of the present invention, the problem types corresponding to the test problem may include: at least one of the types of terminal problems, application problems, network access device problems, etc., wherein a terminal problem represents a test problem caused by a terminal device, for example, a problem caused by an operating system of the terminal device or an underlying application built in a terminal vendor; the application problem refers to a problem caused by a target application installed by a user on a terminal device; the network access device problem refers to a problem caused by an abnormal operation of the network access device.
That is, in the embodiment of the present invention, since the first user may only obtain the problem field information measured by the terminal device, for example, the problem prompt information, the problem screenshot, the problem log measured by the terminal device, and the problem on the network side cannot be obtained when submitting the test record, in order to facilitate the participants in the blockchain to find the problem solution, the network access device node may obtain, after detecting the test record corresponding to the terminal device in the blockchain, the network access log information corresponding to the terminal device based on the terminal identifier of the terminal device included in the test record, so that the participants in the blockchain analyze the test problem in the test record based on the network log information on the network side, to provide a solution for solving the test problem.
In the embodiment of the invention, the blockchain client is installed in the network access equipment node, and after the network access equipment detects that the testing record is issued in the blockchain, the testing record can be acquired, and the network access log information corresponding to the terminal equipment is acquired, so that participants in the blockchain for providing log information on the network side participate in providing a solution for solving the testing problem.
In some embodiments, before performing the present step S102, the method may further include: acquiring a terminal identifier corresponding to the terminal equipment from the test record; checking whether an operator network used by the terminal equipment is accessed based on the target network access equipment according to the terminal identification; and under the condition that the verification terminal equipment accesses the operator network based on the target network access equipment, executing the step, namely, responding to the test record and acquiring the network access log information corresponding to the terminal equipment.
That is, in the embodiment of the present invention, when the network device access node in the blockchain obtains the test record issued by the first user node, it may be checked whether the terminal device is accessed to the operator network used by the terminal device based on the terminal device itself, and if not, it may not need to perform processing, so as to avoid the problem of resource waste.
Step S103, generating a target ciphertext by using a preset encryption algorithm according to the network entry log information, and issuing the target ciphertext into a block chain; the target ciphertext comprises an access policy, the access policy is used for limiting the attribute of a decryption party for decrypting the target ciphertext, the target ciphertext is used for a node in the blockchain to acquire networking log information, and the testing problem is solved based on the networking log information and the testing record.
In some embodiments, the generating the target ciphertext according to the log information by using a preset encryption algorithm may include: acquiring preset public parameters and an access structure for describing an access strategy; performing attribute-based encryption processing on the network entry log information according to preset public parameters and an access structure to obtain a target ciphertext; wherein the preset common parameters are parameters that are generated and distributed to each node in the blockchain when the blockchain is constructed; the preset public parameters are used for decrypting the target ciphertext under the condition that the node in the block chain receives the target ciphertext so as to acquire the network log information.
Wherein in this embodiment, the obtaining the access structure for describing the access policy includes: acquiring target attribute information of a target user corresponding to terminal equipment and/or target network access equipment; and generating the access structure according to the target attribute information.
In the embodiment of the invention, because the network entry log information contains the information of signaling interaction performed by the network access device when the network access device accesses the operator network, the loophole existing in the device can be exposed, if the network entry log information is released to the blockchain in a plaintext form, the potential safety hazard can be brought to the device, and therefore, in the embodiment of the invention, the network entry log information can be encrypted based on a preset encryption algorithm, so that on one hand, the trusted participant of the network entry log information can be ensured to be obtained and analyzed, and on the other hand, because the preset encryption algorithm is the encryption based on the attribute, after any party obtains the target ciphertext, the target ciphertext can be directly decrypted based on the preset public parameter PK and the private key for describing the attribute of the target ciphertext, namely, the target ciphertext can be ensured to be only trusted by the participant in the blockchain, namely, the participant with the attribute conforming to the access structure.
In this embodiment, in order to ensure that the log-in information can be obtained and parsed by the trusted participant, when the target ciphertext is generated, the access structure may be generated by acquiring target attribute information of the target user corresponding to the terminal device and/or the target network access device, and based on the target attribute information.
The target user may be at least one of a user in a terminal vendor corresponding to the terminal device, a user in an operator corresponding to an operator network used by the terminal device, a user in a network access device vendor corresponding to the target network access device, and a user in an application vendor corresponding to an application running in the terminal device; of course, the target user may also be an associated user associated with a terminal manufacturer, an operator, an application manufacturer, and a network access device manufacturer, but not belonging to any manufacturer, and the associated user may be, for example, an outside expert of a certain manufacturer.
In the embodiment of the invention, the target ciphertext can be obtained by the following formula: ct=encrypt (PK, M, a), where PK represents a preset public parameter, M represents the log information, a represents the access structure, encrypt represents the preset encryption algorithm.
After the decryption party, for example, the second user node trusted by the network access device obtains the target ciphertext and successfully decrypts the target ciphertext to obtain the log-in information, the method can participate in providing a solution for solving the test problem, so that the operator node in the blockchain repairs the test problem based on the solutions, wherein the second user node trusted by the network access device can be a node corresponding to any second user whose attribute matches with the target attribute information of the target user described in the access structure.
Therefore, in the information processing method provided by the embodiment of the invention, after the network access equipment node in the blockchain acquires the network access log information corresponding to the terminal equipment, which is issued by the first user node, in order to facilitate other nodes in the blockchain to generate a solution for solving the test problem recorded in the test record based on the network access log information, and meanwhile, potential safety hazards possibly caused by malicious utilization of the network access log information after being issued to the blockchain are avoided, the network access log information can be encrypted based on a preset encryption algorithm to obtain a target ciphertext and the target ciphertext is issued to the blockchain, and because the target ciphertext comprises an access strategy for limiting a decryption party for decrypting the target ciphertext, the potential safety hazards possibly caused by malicious utilization of the target ciphertext can be avoided; meanwhile, based on the block chain, the test record of the terminal equipment is issued, and based on the block chain, the network entry log information is transmitted, so that online closed loops of test problem issue, solution solicitation, test problem processing, processing result verification and solution issue can be formed, and the test problem corresponding to the terminal equipment can be efficiently solved.
In addition, please refer to fig. 2, which is a flowchart illustrating another information processing method according to an embodiment of the present invention. Corresponding to the above-mentioned first information processing method applied to the network access device node, the second information processing method shown in fig. 2 may be applied to a second user node in the blockchain, where the second user node may be used as a decryption party that issues a target ciphertext in the blockchain, and decrypt the target ciphertext based on a private key generated by at least one attribute of the second user node itself, so as to obtain network log information corresponding to a test problem to be solved, so that a corresponding second user analyzes and generates a solution for solving the test problem based on the network log information.
As shown in fig. 2, the second information processing method may include the following steps S201 to S204, which will be described in detail below.
Step S201, a test record issued by a first user node is obtained, where the test record is used to describe a test problem corresponding to a terminal device of a first user, and the first user node corresponds to the first user.
Step S202, a target ciphertext is obtained in response to the test record, wherein the target ciphertext is generated by a network access equipment node corresponding to the terminal equipment after encrypting network access log information of the terminal equipment based on a preset encryption algorithm, and the target ciphertext comprises an access policy.
And step S203, decrypting the target ciphertext by using a preset decryption algorithm to obtain the network entry log information.
That is, in the embodiment of the present invention, when the second user node in the blockchain detects that the test record issued by the first user node exists in the blockchain, the target ciphertext issued by the network access device node corresponding to the terminal device in the blockchain may be detected, so as to decrypt the target ciphertext, thereby obtaining the network log information of the network side corresponding to the terminal device, and analyzing a solution for solving the corresponding test problem.
In some embodiments, the decrypting the target ciphertext using a preset decryption algorithm to obtain the log information may include: acquiring preset public parameters and a target private key of a second user node, wherein the target private key is generated based on the attribute of the second user node when the second user node registers in a blockchain; and performing attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key to obtain network entry log information.
That is, in this embodiment, since the second user node may obtain the private key generated based on at least one attribute of the second user node when the second user node registers in the blockchain, after obtaining the target ciphertext generated by the network access device using the preset encryption algorithm, the target ciphertext may be parsed using the preset decryption algorithm corresponding to the preset encryption algorithm according to the preset public parameter and the target private key of the second user node, so as to determine whether the target ciphertext may be decrypted to obtain the log information.
The attribute-based decryption processing is performed on the target ciphertext according to the preset public parameter and the target private key to obtain the log information of network access, which may be: and in the process of carrying out attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key, acquiring an access structure used for describing an access strategy in the target ciphertext, and acquiring network entry log information under the condition that the attribute of the second user node represented by the target private key is matched with the target attribute information of the target user represented in the access structure.
The preset decryption algorithm may be expressed as: m=decrypt (PK, CT, SK), where M represents log information of the network access obtained after decrypting the target ciphertext, PK represents a preset public parameter, CT represents the target ciphertext, and SK represents a target private key of the second user node.
That is, since the target private key is generated based on the attribute of the second user node, when the second user node decrypts the target ciphertext based on the preset encryption algorithm, if the attribute of the second user node is matched with the target attribute information of the target user in the access structure for describing the access policy in the target ciphertext, the target ciphertext can be successfully decrypted to obtain the network entry log information; if the second user node is not matched with the target network access equipment, the current second user node is not trusted by the target network access equipment, and in order to ensure the safety of the target network access equipment, decryption processing fails, and the second user node cannot obtain the network log information.
Step S204, generating a solution for solving the test problem according to the network log information, and issuing the solution to the blockchain, wherein the solution is used for an operator node in the blockchain to solve the test problem.
Therefore, according to the information processing method provided by the embodiment of the disclosure, as the target ciphertext issued to the blockchain by the network access equipment node contains the access strategy for limiting the decryption party for decrypting the target ciphertext, the potential safety hazard problem possibly caused by the malicious utilization of the target ciphertext can be avoided; meanwhile, based on the test record of the blockchain issuing terminal equipment and based on the blockchain transmitting the networking log information, a decryption party meeting the conditions can decrypt the target ciphertext to obtain the networking log information, and based on the networking log information, a solution is generated and issued to the blockchain, so that online closed loops of test problem issuing, solution solicitation, test problem processing, processing result verification and solution issuing can be formed, and the test problem corresponding to the terminal equipment can be efficiently solved.
In addition, corresponding to the two information processing methods, the embodiment of the present invention further provides a test problem processing method, please refer to fig. 3, which is a flow chart of the test problem processing method provided in the embodiment of the present invention, and the method can be applied to an operator node in a blockchain.
As shown in fig. 3, the test problem handling method may include the following steps S301 to S304, which will be described in detail below.
Step S301, a test record issued by a first user node is obtained, where the test record is used to describe a test problem corresponding to a terminal device of a first user, and the first user node corresponds to the first user.
Step S302, at least one solution issued by a second user node for solving the test problem is acquired from the blockchain in response to the test record, wherein the solution is generated by the second user node according to the network access log information obtained by decrypting the target ciphertext when the second user node acquires the test record, and the network access log information is acquired by the network access equipment node in the blockchain in response to the test record.
Step S303, the test problem is processed according to at least one solution, and a verification request is issued in the blockchain according to the processing result, wherein the verification request is used for requesting the first user to verify whether the test problem is solved.
Step S304, when the response message corresponding to the verification request is obtained, the problem solving result is issued in the block chain according to the response message.
That is, in the embodiment of the present invention, after receiving the test record corresponding to the terminal device, the operator node may obtain at least one solution issued by the second user node from the blockchain, and determine a target solution from the at least one solution; if the target solution indicates that any of the corresponding vendors, e.g., terminal vendors, application vendors, or network access device vendors, is required to process, e.g., the vendor is required to repair the test problem by modifying the code or directing the operation, the operator node may perform the following steps: generating a target work order according to the target solution, and distributing the target work order into a blockchain, wherein the target work order is used for processing the test problem by a manufacturer node corresponding to the target solution in the blockchain; and under the condition that the target processing result issued by the manufacturer node is received, generating the verification request according to the target processing result.
In the embodiment of the invention, the target processing result can be a software update package for repairing the test problem or operation information for repairing the test problem.
It can be understood that, in the case that the vendor node corresponding to the target solution is the terminal vendor node or the application vendor node, when generating the verification request based on the target processing result, the verification request needs to include a software update package or operation information for repairing the test problem, so that after receiving the verification request, the first user determines whether the test problem corresponding to the terminal device can be solved based on the software update package or operation information; and in the case that the vendor node corresponding to the target solution is a network access vendor node, the operator node may directly send the verification request to the first user node when receiving a result response message returned by the network access device node, where the result response message is execution result information returned after executing the repair operation when the network access device node obtains the target processing result issued in the blockchain.
In addition, in the embodiment of the invention, the problem-solving result issued to the blockchain by the operator node can be used for triggering the computing node in the blockchain to calculate the rewards of each participating node according to the contribution degree of the participating node; the participating node comprises at least one of a network access equipment node, an operator node, a second user node and a manufacturer node to which the second user belongs, and the manufacturer node comprises at least one of a terminal manufacturer node, an application manufacturer node and a network access manufacturer node; the manufacturer node is used for generating a target processing result for repairing the test problem under the condition that the target work order issued by the operator node is received, and the target processing result comprises a software update package or operation information for repairing the test problem.
That is, in the embodiment of the present invention, for the test record issued by the first user, each participant in the blockchain may participate in solving the test problem in the test record, and the blockchain may accurately record the contribution made by each participant, so that after the operator node issues the problem solving result, that is, after completing the closed loop of the problem, the computing node gives each participant a Token reward of a different level for the contribution degree of each record according to the record issued by each participant in the blockchain, where, for the adopted solution, that is, the participant of the solution that finally solves the test problem may also give an additional Token reward, so as to promote the enthusiasm of each participant, and promote the test problem to be able to be efficiently solved.
In addition, it should be further noted that, in the above embodiments of the method, the steps of the various methods are divided, for clarity of description, and may be combined into one step or split into multiple steps when implemented, so long as they include the same logic relationship, and they are all within the protection scope of the present patent; it is within the scope of this patent to add insignificant modifications to the algorithm or flow or introduce insignificant designs, but not to alter the core design of its algorithm and flow.
The embodiment of the present invention also provides an information processing apparatus, which may be applied to a network access device node in a blockchain, as shown in fig. 4, where the information processing apparatus 400 includes: a first record acquisition module 401, an information acquisition module 402, and an information processing module 403.
The first record obtaining module 401 is configured to obtain a test record issued by a first user node, where the test record is used to describe a test problem corresponding to a terminal device of a first user, and the first user node corresponds to the first user.
The information obtaining module 402 is configured to obtain, in response to the test record, log information corresponding to the terminal device, where the log information is log information generated by the terminal device after the terminal device accesses an operator network based on a target network access device, and the target network access device corresponds to the network access device node.
The information processing module 403 is configured to generate a target ciphertext according to the log information, and issue the target ciphertext to the blockchain by using a preset encryption algorithm; the target ciphertext comprises an access policy, the access policy is used for limiting the attribute of a decryption party for decrypting the target ciphertext, the target ciphertext is used for a node in the blockchain to acquire the networking log information, and the testing problem is solved based on the networking log information and the testing record.
In some embodiments, the information processing module 403 may be configured to, when generating the target ciphertext according to the log information and using a preset encryption algorithm: acquiring preset public parameters and an access structure for describing the access strategy; performing attribute-based encryption processing on the network entry log information according to the preset public parameters and the access structure to obtain the target ciphertext; wherein the preset common parameters are parameters that are generated and distributed to each node in the blockchain when the blockchain is constructed; and the preset public parameters are used for decrypting the target ciphertext under the condition that the target ciphertext is received by a node in the blockchain so as to acquire the network entry log information.
In some embodiments, the information processing module 403, when acquiring the access structure for describing the access policy, may be configured to: acquiring target attribute information of a target user corresponding to terminal equipment and/or target network access equipment; and generating an access structure according to the target attribute information.
The embodiment of the present invention also provides another information processing apparatus, which may be applied to a second user node in a blockchain, as shown in fig. 5, the information processing apparatus 500 includes: a second record acquisition module 501, a ciphertext acquisition module 502, a decryption processing module 503, and a scheme generation module 504.
The second record obtaining module 501 is configured to obtain a test record issued by a first user node, where the test record is used to describe a test problem corresponding to a terminal device of a first user, and the first user node corresponds to the first user.
The ciphertext obtaining module 502 is configured to obtain a target ciphertext in response to the test record, where the target ciphertext is a ciphertext that includes an access policy and is generated by a network access device node corresponding to the terminal device after encrypting network entry log information of the terminal device based on a preset encryption algorithm.
And the decryption processing module 503 is configured to decrypt the target ciphertext by using a preset decryption algorithm, so as to obtain the log information.
A solution generating module 504, configured to generate a solution for solving the test problem according to the log information, and issue the solution into the blockchain, where the solution is used for an operator node in the blockchain to solve the test problem.
In some embodiments, the decryption processing module 503 may be configured to, when decrypting the target ciphertext using a preset decryption algorithm to obtain the log information, obtain the log information by: acquiring preset public parameters and a target private key of the second user node, wherein the target private key is generated based on the attribute of the second user node when the second user node is registered in the blockchain; and performing attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key to obtain the network entry log information.
In some embodiments, the decryption processing module 503 may be configured to, when performing an attribute-based decryption process on the target ciphertext according to the preset public parameter and the target private key, obtain the log information of the network access, perform: and in the process of carrying out attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key, acquiring an access structure used for describing an access strategy in the target ciphertext, and acquiring network entry log information under the condition that the attribute of the second user node represented by the target private key is matched with the target attribute information of the target user represented in the access structure.
The embodiment of the present invention further provides a test problem processing apparatus, which may be applied to an operator node in a blockchain, as shown in fig. 6, where the test problem processing apparatus 600 includes: a third record acquisition module 601, a scheme acquisition module 602, a scheme verification module 603, and a result publication module 604.
The third record obtaining module 601 is configured to obtain a test record issued by a first user node, where the test record is used to describe a test problem corresponding to a terminal device of a first user, and the first user node corresponds to the first user.
And a solution obtaining module 602, configured to obtain, in response to the test record, at least one solution issued by a second user node and used for solving the test problem from the blockchain, where the solution is generated by the second user node according to network access log information obtained by decrypting a target ciphertext when the second user node obtains the test record, and the network access log information is obtained by a network access device node in the blockchain in response to the test record.
A solution verification module 603, configured to process the test problem according to the at least one solution, and issue a verification request in the blockchain according to a processing result, where the verification request is used to request the first user to verify whether the test problem has been solved.
And a result issuing module 604, configured to issue a problem solving result in the blockchain according to the response message when the response message corresponding to the verification request is acquired.
The functions or modules included in the apparatus provided by the embodiments of the present invention may be used to perform the methods described in the corresponding method embodiments, and the specific implementation and technical effects of the methods may refer to the descriptions of the method embodiments above, which are not repeated herein for brevity.
In this embodiment, each module is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of a plurality of physical units. In addition, in order to highlight the innovative part of the present invention, units that are not so close to solving the technical problem presented by the present invention are not introduced in the present embodiment, but this does not indicate that other units are not present in the present embodiment.
The embodiment of the invention provides electronic equipment, which comprises:
one or more processors 701;
a memory 702 having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method of any of the above embodiments;
One or more I/O interfaces 703, coupled between the processor and the memory, are configured to enable information interaction of the processor with the memory.
Wherein the processor 701 is a device having data processing capabilities, including but not limited to a Central Processing Unit (CPU) or the like; memory 702 is a device with data storage capability including, but not limited to, random access memory (RAM, more specifically SDRAM, DDR, etc.), read-only memory (ROM), electrically charged erasable programmable read-only memory (EEPROM), FLASH memory (FLASH); an I/O interface (read/write interface) 703 is connected between the processor 701 and the memory 702 to enable information interaction between the processor 701 and the memory 702, including but not limited to a data Bus (Bus) or the like.
In some embodiments, processor 701, memory 702, and I/O interface 703 are interconnected by a bus, which in turn is connected to other components of the computing device.
The embodiment of the present invention further provides a computer readable medium, on which a computer program is stored, where the program when executed by a processor implements the method of any one of the foregoing embodiments, and specific steps are not repeated herein to avoid repetitive description.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods of the invention described above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of embodiments of the invention and form different embodiments.
It is to be understood that the above embodiments are merely illustrative of the application of the principles of the present invention, but not in limitation thereof. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the invention, and are also considered to be within the scope of the invention.

Claims (11)

1. An information processing method, applied to a network access device node in a blockchain, the method comprising:
acquiring a test record issued by a first user node, wherein the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
responding to the test record, and acquiring network access log information corresponding to the terminal equipment, wherein the network access log information is generated after the terminal equipment is accessed to an operator network based on target network access equipment, and the target network access equipment corresponds to the network access equipment node;
generating a target ciphertext by using a preset encryption algorithm according to the network log information, and issuing the target ciphertext into the block chain;
the target ciphertext comprises an access policy, the access policy is used for limiting the attribute of a decryption party for decrypting the target ciphertext, the target ciphertext is used for a second user node in the blockchain to acquire the network entry log information, and an operator node in the blockchain solves the test problem based on the network entry log information and the test record.
2. The method according to claim 1, wherein the generating the target ciphertext using a preset encryption algorithm according to the log information comprises:
acquiring preset public parameters and an access structure for describing the access strategy;
performing attribute-based encryption processing on the network entry log information according to the preset public parameters and the access structure to obtain the target ciphertext;
wherein the preset common parameters are parameters that are generated and distributed to each node in the blockchain when the blockchain is constructed; and the preset public parameters are used for decrypting the target ciphertext under the condition that the target ciphertext is received by a node in the blockchain so as to acquire the network entry log information.
3. The method of claim 2, wherein the obtaining an access structure describing the access policy comprises:
acquiring target attribute information of a target user corresponding to the terminal equipment and/or the target network access equipment;
and generating the access structure according to the target attribute information.
4. The method of claim 1, wherein prior to performing the step of obtaining the log information corresponding to the terminal device in response to the test record, the method further comprises:
Acquiring a terminal identifier corresponding to the terminal equipment from the test record;
checking whether an operator network used by the terminal equipment is accessed based on the target network access equipment according to the terminal identification;
and under the condition that the terminal equipment is checked to access the operator network based on the target network access equipment, executing the step of responding to the test record and acquiring the network log information corresponding to the terminal equipment.
5. An information processing method for use with a second user node in a blockchain, the method comprising:
acquiring a test record issued by a first user node, wherein the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
responding to the test record, and acquiring a target ciphertext, wherein the target ciphertext is a ciphertext which is generated by a network access equipment node corresponding to the terminal equipment after encrypting network access log information of the terminal equipment based on a preset encryption algorithm and contains an access strategy;
decrypting the target ciphertext by using a preset decryption algorithm to obtain the network entry log information;
Generating a solution for solving the test problem according to the network log information, and publishing the solution to the blockchain, wherein the solution is used for an operator node in the blockchain to solve the test problem.
6. The method of claim 5, wherein decrypting the target ciphertext using a preset decryption algorithm to obtain the network entry log information comprises:
acquiring preset public parameters and a target private key of the second user node, wherein the target private key is generated based on the attribute of the second user node when the second user node is registered in the blockchain;
and performing attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key to obtain the network entry log information.
7. The method according to claim 6, wherein the performing the attribute-based decryption processing on the target ciphertext according to the preset public parameter and the target private key to obtain the log information includes:
and in the process of carrying out attribute-based decryption processing on the target ciphertext according to the preset public parameters and the target private key, acquiring an access structure used for describing the access strategy in the target ciphertext, and acquiring the network entry log information under the condition that the attribute of the second user node represented by the target private key is matched with the target attribute information of the target user represented in the access structure.
8. A method of testing problem handling for an operator node in a blockchain, the method comprising:
acquiring a test record issued by a first user node, wherein the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
obtaining, from the blockchain, at least one solution issued by a second user node for solving the test problem in response to the test record, wherein the solution is generated by the second user node according to network entry log information obtained by decrypting a target ciphertext when the second user node obtains the test record, and the network entry log information is obtained by a network access device node in the blockchain in response to the test record;
processing the test problem according to the at least one solution, and issuing a verification request in the blockchain according to a processing result, wherein the verification request is used for requesting the first user to verify whether the test problem is solved;
and under the condition that a response message corresponding to the verification request is acquired, issuing a problem solving result in the block chain according to the response message.
9. An information processing apparatus for use with a network access device node in a blockchain, the apparatus comprising:
the system comprises a first record acquisition module, a first user node and a second user node, wherein the first record acquisition module is used for acquiring a test record issued by the first user node, the test record is used for describing a test problem corresponding to terminal equipment of a first user, and the first user node corresponds to the first user;
the information acquisition module is used for responding to the test record and acquiring network access log information corresponding to the terminal equipment, wherein the network access log information is generated by the terminal equipment after the terminal equipment is accessed to an operator network based on target network access equipment, and the target network access equipment corresponds to the network access equipment node;
the information processing module is used for generating a target ciphertext by using a preset encryption algorithm according to the network log information and issuing the target ciphertext into the block chain;
the target ciphertext comprises an access policy, the access policy is used for limiting the attribute of a decryption party for decrypting the target ciphertext, the target ciphertext is used for a second user node in the blockchain to acquire the network entry log information, and an operator node in the blockchain solves the test problem based on the network entry log information and the test record.
10. An electronic device, comprising:
one or more processors;
a memory having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-8;
one or more I/O interfaces coupled between the processor and the memory configured to enable information interaction of the processor with the memory.
11. A computer readable medium having stored thereon a computer program which, when executed by a processor, implements the method of any of claims 1-8.
CN202211459798.7A 2022-11-17 2022-11-17 Information processing method, information processing device, electronic equipment and computer readable medium Active CN116032793B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211459798.7A CN116032793B (en) 2022-11-17 2022-11-17 Information processing method, information processing device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211459798.7A CN116032793B (en) 2022-11-17 2022-11-17 Information processing method, information processing device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN116032793A CN116032793A (en) 2023-04-28
CN116032793B true CN116032793B (en) 2024-04-02

Family

ID=86069814

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211459798.7A Active CN116032793B (en) 2022-11-17 2022-11-17 Information processing method, information processing device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN116032793B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737430A (en) * 2018-05-25 2018-11-02 全链通有限公司 The encryption communication method and system of block chain node
CN109523040A (en) * 2018-11-23 2019-03-26 南京荣链科技有限公司 A kind of user equipment that protecting privacy reports method, server, system and medium for repairment
WO2020082917A1 (en) * 2018-10-26 2020-04-30 阿里巴巴集团控股有限公司 Methods and systems for publishing programming problem, publishing solution code, and checking solution code
CN111159306A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Information publishing method and device based on block chain and computer equipment
CN113609224A (en) * 2021-08-06 2021-11-05 四川工小为科技有限公司 Crowdsourcing operation method and system for realizing privacy protection based on block chain
CN115085902A (en) * 2022-06-09 2022-09-20 深圳供电局有限公司 Power grid dispatching log management method and system
KR20220133740A (en) * 2021-03-25 2022-10-05 주식회사 한컴코드게이트 Solution inquiry service server that supports to be able to inquire the answer information and the commentary information for user-selected question based on the two-dimensional code printed in learning book and operating method thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3144715A1 (en) * 2018-06-21 2019-12-26 Haibin Zhang Systems and methods for permissioned blockchain infrastructure with fine-grained access control and confidentiality-preserving publish/subscribe messaging
US20200311695A1 (en) * 2019-03-27 2020-10-01 International Business Machines Corporation Privacy-preserving gridlock resolution
US11449478B2 (en) * 2020-10-08 2022-09-20 Kyndryl, Inc. Blockchain implemented data migration audit trail

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737430A (en) * 2018-05-25 2018-11-02 全链通有限公司 The encryption communication method and system of block chain node
WO2020082917A1 (en) * 2018-10-26 2020-04-30 阿里巴巴集团控股有限公司 Methods and systems for publishing programming problem, publishing solution code, and checking solution code
CN109523040A (en) * 2018-11-23 2019-03-26 南京荣链科技有限公司 A kind of user equipment that protecting privacy reports method, server, system and medium for repairment
CN111159306A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Information publishing method and device based on block chain and computer equipment
CN112487100A (en) * 2020-04-02 2021-03-12 支付宝(杭州)信息技术有限公司 Information publishing method and device based on block chain and computer equipment
KR20220133740A (en) * 2021-03-25 2022-10-05 주식회사 한컴코드게이트 Solution inquiry service server that supports to be able to inquire the answer information and the commentary information for user-selected question based on the two-dimensional code printed in learning book and operating method thereof
CN113609224A (en) * 2021-08-06 2021-11-05 四川工小为科技有限公司 Crowdsourcing operation method and system for realizing privacy protection based on block chain
CN115085902A (en) * 2022-06-09 2022-09-20 深圳供电局有限公司 Power grid dispatching log management method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链工作量证明共识算法的研究与实现;张鹏;中国优秀硕士学位论文全文数据库信息科技辑;20220115;全文 *

Also Published As

Publication number Publication date
CN116032793A (en) 2023-04-28

Similar Documents

Publication Publication Date Title
US11258792B2 (en) Method, device, system for authenticating an accessing terminal by server, server and computer readable storage medium
CN106790083B (en) Detection method, device and the mobile terminal that DNS is kidnapped
EP3061027A1 (en) Verifying the security of a remote server
US20200074122A1 (en) Cryptographic operation processing method, apparatus, and system, and method for building measurement for trust chain
AU2019101564A4 (en) Information registration and authentication method and device
CN112507291B (en) Method and device for generating unique identifier of Android device
WO2021137769A1 (en) Method and apparatus for sending and verifying request, and device thereof
CA3127882C (en) Short message sending method, device, and computer system
CN110324416A (en) Download path tracking, device, server, terminal and medium
CN110598377A (en) Software serial number management method and device based on block chain
CN111414640A (en) Key access control method and device
CN115952552A (en) Remote data destruction method, system and equipment
CN114138590A (en) Operation and maintenance processing method and device for Kubernetes cluster and electronic equipment
CN112231674A (en) Skip verification method and system for URL (Uniform resource locator) address and electronic equipment
JP7310003B2 (en) Remote authentication method and device
CN116032793B (en) Information processing method, information processing device, electronic equipment and computer readable medium
CN109922056B (en) Data security processing method, terminal and server thereof
CN112583890B (en) Message pushing method and device based on enterprise office system and computer equipment
CN114386047A (en) Application vulnerability detection method and device, electronic equipment and storage medium
CN114584313A (en) Equipment physical identity authentication method, system and device and first platform
KR20180078764A (en) Method for providing validation procedure for automated test of application runnable on vehicle terminal, thereby supporting registeration of said application to market portal server, and developer portal server and application management server using the same
CN111259400A (en) Vulnerability detection method, device and system
CN111859351A (en) Method, system, server and storage medium for writing information into chip
CN111190824A (en) Monitoring method, monitoring device, terminal equipment and storage medium
TWI673621B (en) Information registration, authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant