CN107528855A - A kind of data verification method and server - Google Patents
A kind of data verification method and server Download PDFInfo
- Publication number
- CN107528855A CN107528855A CN201710882095.8A CN201710882095A CN107528855A CN 107528855 A CN107528855 A CN 107528855A CN 201710882095 A CN201710882095 A CN 201710882095A CN 107528855 A CN107528855 A CN 107528855A
- Authority
- CN
- China
- Prior art keywords
- block chain
- server
- client
- block
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2255—Hash tables
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Graphics (AREA)
- Multimedia (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Computer And Data Communications (AREA)
Abstract
The embodiment of the invention discloses a kind of data verification method and server.Present invention method includes:First block chain is issued to the roomed all clients of live platform institute by server, to cause each client to generate the second block chain after receiving the first block chain, and the second block chain is sent to server;Server receives all second block chains that all clients return;Server in all second block chains, determine identical second block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain;Server determines that client corresponding to the second legal block chain is legitimate client, and client corresponding to the second illegal block chain is illegitimate client.Server and the block chain progress legitimacy verifies that need not be reported to each client, have greatly subtracted the calculating pressure of server, have realized that the minority is subordinate to the majority, the thought of decentralization in the embodiment of the present invention.
Description
Technical field
The present invention relates to net cast technical field, more particularly to a kind of data verification method and server.
Background technology
At present, as the progress of the network communications technology and the speed-raising of broadband network, network direct broadcasting have obtained more and more
Development and application.Especially in live field of playing, increasing spectators can watch the live of game main broadcaster.
And part main broadcaster can improve the spectator attendance in room while viewing by the method for brush popularity, received so as to obtain
Benefit.The concrete implementation mode of its brush popularity is then on an extraordinary server of performance, by cracking live platform
Procotol, while forge substantial amounts of false client user and log on direct broadcasting room simultaneously, so as to forge the method for mass viewer audiences,
The popularity data of direct broadcasting room is brushed higher.
Therefore a kind of method is then needed to be capable of detecting when the direct broadcasting room with the presence or absence of the false client of forgery for live platform
Hold the situation of a large amount of brush popularities.
The content of the invention
The embodiments of the invention provide a kind of data verification method and server, and false client is forged to detect direct broadcasting room
The situation of brush popularity.
In a first aspect, this application provides a kind of data verification method, this method includes:
Server issues the first block chain to the roomed all clients of live platform institute, to cause each client to receive
The second block chain is generated after to the first block chain, and the second block chain is sent to the server;
The server receives all second block chains that all clients return;
The server in all second block chains, determine identical second block chain quantity it is most for legal second
Block chain, it is other for the second illegal block chain;
The server determines that client corresponding to the second legal block chain is legitimate client, the second illegal block
Client corresponding to chain is illegitimate client.
Further, the server issue the first block chain to the roomed all clients of live platform institute it
Before, methods described also includes:
The server generates the first block chain.
Further, the first block chain and the second block chain have identical data structure;
The data structure include the block number of block chain, the cryptographic Hash of previous block chain, current time timestamp with
And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation
Obtained data are filled after one fixed data encryption.
Further, methods described also includes:
If the server, which is received in all second block chains that all clients return, does not have the live platform target
The second block chain that the destination client in room is sent, and the destination client is current still in the target room, then really
The fixed destination client is illegitimate client.
Further, the server is in all second block chains, determine identical second block chain quantity it is most be
The second legal block chain, it is other for the second illegal block chain the step of, including:
The server is using each second block chain in all second block chains as a numerical value;
The server determines that the numerical value that quantity is most in all numerical value is Constant numerical values, by corresponding to Constant numerical values second
Block chain is defined as the second legal block chain, other for the second illegal block chain.
Second aspect, the application provide a kind of server, and the server includes:
Sending module, it is each to cause for issuing the first block chain to the roomed all clients of live platform institute
Client generates the second block chain after receiving the first block chain, and the second block chain is sent into the server;
Receiving module, for receiving all second block chains of all clients return;
First determining module, in all second block chains, determine identical second block chain quantity it is most to close
Second block chain of method, it is other for the second illegal block chain;
Second determining module, for determining that client corresponding to the second legal block chain is legitimate client, illegal
Client corresponding to second block chain is illegitimate client.
Further, the server also includes:
Generation module, for issuing the first block chain to the roomed all clients of live platform institute in the sending module
Before end, the first block chain is generated.
Further, the first block chain and the second block chain have identical data structure;
The data structure include the block number of block chain, the cryptographic Hash of previous block chain, current time timestamp with
And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation
Obtained data are filled after one fixed data encryption.
Further, second determining module is additionally operable to:
If the server, which is received in all second block chains that all clients return, does not have the live platform target
The second block chain that the destination client in room is sent, and the destination client is current still in the target room, then really
The fixed destination client is illegitimate client.
Further, second determining module is specifically used for:
Using each second block chain in all second block chains as a numerical value, determine that quantity in all numerical value is most
Numerical value is Constant numerical values, the second block chain corresponding to Constant numerical values is defined as to the second legal block chain, other is illegal
Second block chain.
The third aspect, the present invention also provide a kind of server, including:Memory, processor and is stored in the memory
Computer program that is upper and can running on the processor, wherein, can be with during computer program described in the computing device
Realize any described method in first aspect.
Fourth aspect, the present invention also provide a kind of computer-readable recording medium, are stored thereon with computer program, the journey
Any described method in first aspect is realized when sequence is executed by processor.
The embodiment of the present invention issues the first block chain to the roomed all clients of live platform institute by server, with
So that each client generates the second block chain after receiving the first block chain, and the second block chain is sent to server;Service
Device receives all second block chains that all clients return;Server determines identical secondth area in all second block chains
Block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain;Server determines legal second
Client corresponding to block chain is legitimate client, and client corresponding to the second illegal block chain is illegitimate client.This hair
After server issues the first block chain in bright embodiment, the new block chain numerical value that legal client is calculated is the same
, therefore the new block chain that server is reported by the client received, obey a small number of principles by most, it is believed that phase
With new block chain quantity it is maximum be legal block chain, and measure and on the low side be then considered illegal block chain so that
Server and the block chain progress legitimacy verifies that need not be reported to each client, have greatly subtracted the calculating of server
Pressure, server only need to carry out the result of block chain distributed number to determine legal block chain, and realization is a small number of to be obeyed
Majority, the thought of decentralization.
Brief description of the drawings
Fig. 1 is one embodiment schematic diagram of data verification method in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of data verification method in the embodiment of the present invention;
Fig. 3 is one embodiment schematic diagram of S103 in embodiment illustrated in fig. 1;
Fig. 4 is one embodiment schematic diagram of server in the embodiment of the present invention;
Fig. 5 is another embodiment schematic diagram of server in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of server in the embodiment of the present invention.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people
The every other embodiment that member is obtained under the premise of creative work is not made, it should all belong to the model that the present invention protects
Enclose.
The (if present)s such as term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing
It is for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that the number so used
According to can exchange in the appropriate case, so as to the embodiments described herein can with except the content for illustrating or describing herein with
Outer order is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover non-exclusive bag
Contain, for example, containing the process of series of steps or unit, method, system, product or equipment is not necessarily limited to what is clearly listed
Those steps or unit, but may include not listing clearly or intrinsic for these processes, method, product or equipment
Other steps or unit.
Referring to Fig. 1, one embodiment of data verification method includes in the embodiment of the present invention:
S101, server issue the first block chain to the roomed all clients of live platform institute, to cause each visitor
Family end generates the second block chain after receiving the first block chain, and the second block chain is sent into server;
In the present embodiment, server i.e. server corresponding to live platform, client can be user terminal, such as hand
The intelligent terminals such as machine, tablet personal computer, target room are the direct broadcasting room that main broadcaster establishes on live platform, and destination client is to enter to be somebody's turn to do
The client of target direct broadcasting room.Block chain be it is a kind of sequentially in time by data block by sequentially be connected in a manner of be combined into
A kind of linked data structure, and the distributed account book that can not be distorted He can not forge ensured in a manner of cryptography.
S102, server receive all second block chains that all clients return;
Specifically, the second block chain is in step S101, each client in target room is receiving the first block chain
Generate afterwards.
S103, server in all second block chains, determine identical second block chain quantity it is most for legal the
Two block chains, it is other for the second illegal block chain;
Because in the user of whole live platform, validated user must exceed disabled user, then it can be assumed that most
The correct quantity of numerical value for being reported to the second block chain of server eventually should be most, so as to the second block chain of other values
It is then illegal.
S104, server determine that client corresponding to the second legal block chain is legitimate client, the secondth illegal area
Client corresponding to block chain is illegitimate client.
The embodiment of the present invention issues the first block chain to the roomed all clients of live platform institute by server, with
So that each client generates the second block chain after receiving the first block chain, and the second block chain is sent to server;Service
Device receives all second block chains that all clients return;Server determines identical secondth area in all second block chains
Block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain;Server determines legal second
Client corresponding to block chain is legitimate client, and client corresponding to the second illegal block chain is illegitimate client.This hair
After server issues the first block chain in bright embodiment, the new block chain numerical value that legal client is calculated is the same
, therefore the new block chain that server is reported by the client received, obey a small number of principles by most, it is believed that phase
With new block chain quantity it is maximum be legal block chain, and measure and on the low side be then considered illegal block chain so that
Server and the block chain progress legitimacy verifies that need not be reported to each client, have greatly subtracted the calculating of server
Pressure, server only need to carry out the result of block chain distributed number to determine legal block chain, and realization is a small number of to be obeyed
Majority, the thought of decentralization.
As shown in Fig. 2 the server issue the first block chain to the roomed all clients of live platform institute it
Before, method can further include in the embodiment of the present invention:
S105, server generate the first block chain.
In the embodiment of the present invention, the first block chain and the second block chain can have identical data structure;
The data structure can include the block number of block chain, the cryptographic Hash of previous block chain, the timestamp and block of current time
Chain performance data, the block chain performance data are the random data that the server generates at random, or solid for generation one
Determine to fill obtained data after data encryption, now, the data structure of the first block chain can be the data knot of foregoing description
Structure, the first block chain can include the block number of the first block chain, the cryptographic Hash of previous block chain, the timestamp of current time
And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation
Obtained data are filled after one fixed data encryption.In the embodiment of the present invention, above-mentioned data structure is implemented as follows:
Struct BlockData{
Int64index;
String previousHash;
Int64timestamp;
String data;
String hash;
}
Wherein, index is used for representing the block number of block chain, is incremented by generally since 0;PreviousHash represents previous
The HASH values of block chain;Timestamp represents current time stamp;Data then represents splicing (the i.e. above-mentioned block chain of some data
Performance data), the content of this data field is then according to designed by the function of being completed required for block chain, is directed to this paper's
All room popularities are detected, block chain performance data data can be that server generates one piece of data at random, and this data is to all
Client all uses same value, fills this value during server initiation, client then directly takes this when generating new block chain
Value;Hash then represents the hash values of the content of this current block chain.After the design for having this block chain, when server receives
Client, then can be by verifying, to judge its legitimacy newly after caused block chain to the data of the inside.
In the embodiment of the present invention, the first block chain can be the original block chain of server generation, when the first block chain is
During original block chain, original block chain is due to being first block chain generated, and the block number of original block chain is 0, timestamp
It is then current time, the hash values of a upper block chain are 0, and block chain performance data (above-mentioned data data) is then entered for server
The random generation of row, server are generated to fill after a fixed data is encrypted and obtained.
The algorithm that new block chain generates in block chain, block chain initial first are devised in the embodiment of the present invention simultaneously
It is that server generates (such as the first block chain), server can be issued to each client for logging on live platform target room
End, then the client in the target room receives after original block chain, it is necessary to which algorithm generates next block chain.Specific implementation
It is as follows:The data structure of a upper block chain has been got first, and next block chain is then according to a upper block chain
Data generated.
In the embodiment of the present invention, it is assumed that the name of a upper block chain is prevblock, the name of newly-generated block chain
It is newblock, the process for specifically generating new block chain is as follows:
(1) block number of new block chain is calculated.
Newblock.index=prevblock.index+1;
The block number of i.e. new block chain is that current block number adds 1.
(2) timestamp of new block chain is calculated.
Newblock.timestamp=prevblock.time;
In the embodiment of the present invention, the timestamp of new block chain then uses the timestamp of a upper block chain, because if making
With the current time, then the Time Inconsistency that each client is got is likely to result in, so as to cause the hash finally calculated
It is worth inconsistent, ultimately results in legal client and the equal block chain of one result cannot get according to identical block chain.
(3) the hash values of a upper block chain for new block chain are calculated.
Newblock.previousHash=prevblock.hash;
Wherein, the hash values of a upper block chain for new block chain are then the hash values of the upper block chain obtained.
(4) the block chain performance data of new block chain is calculated.
Newblock.data=prevblock.data;
The data data of new block chain are then generated at random by server, then filling is that data are that server issues
The data of block chain, it in order to reach the new block chain value ultimately generated is one that why so design, which is, in the embodiment of the present invention
Sample, if filling out room number or user uid, then the new block chain for eventually resulting in each client all differs
Sample.
Certainly, in the embodiment of the present invention, server can also classify to different live rooms, such as according to plate
To classify, different plates inserts different random value (block chain performance data), so carries out school to different versions
Test, the block chain data of the client corresponding to each plate below room are then the same certainly, can so prevent for
The fewer room of popularity, if the substantial amounts of false client of brush, can prevent this special circumstances.In some implementations of the present invention
In example, block chain performance data can also all use a same random value to all rooms.
(5) the hash values of new block chain are calculated.
Newblock.hash=HASH (index+previousHash+timestamp+data);
Wherein, the hash values of new block chain be then have new block chain index fields and previousHash fields and
Timestamp fields and data fields.
In the embodiment of the present invention, Hash corresponding to cryptographic Hash (HASH) algorithm is unified, and the HASH algorithms can be SHA-256
Algorithm, naturally it is also possible to be other HASH algorithms, such as SHA-1 etc., be not construed as limiting herein.
So far, the algorithm that a new block chain is generated by a block chain is achieved that by above-mentioned steps.And this
In inventive embodiments, when client generates the second block chain by receiving the first block chain, i.e., realized using above-mentioned steps.
In addition, in the embodiment of the present invention, the data verification method can further include:If the server receives institute
Have the second of the destination client transmission for not having the live platform target room in all second block chains of client return
Block chain, and the destination client is current still in the target room, it is determined that the destination client is illegal client
End.So it is due to that the client of the brush popularity having has not been aware of the verification of a newly-increased block chain, and normal client
End then can all carry out reporting new block chain, therefore it is non-that can directly determine that this does not return to the destination client of the second block chain
Method client.
In some embodiments of the invention, as shown in figure 3, above-mentioned steps S103 can specifically include:
S1031, server are using each second block chain in all second block chains as a numerical value;
S1032, server determine that the numerical value that quantity is most in all numerical value is Constant numerical values, by corresponding to Constant numerical values
Two block chains are defined as the second legal block chain, other for the second illegal block chain.
In the present embodiment, after server issues the first block chain, the second new block that legal client is calculated
Chain numerical value is the second new block chain the same, that server is reported by the client received, is obeyed by majority a small number of
Principle, it is believed that the quantity of the second new block chain of identical it is maximum be correct second block chain, and measure and on the low side then recognize
To be the second illegal block chain so that server and the second block chain that need not be reported to each client carries out legitimacy
Verification, has greatly subtracted the calculating pressure of server, server need not be calculated, it is only necessary to the knot of the second block chain
Fruit carries out distributed number to determine legal block, also utilizes the core concept of block chain, the minority is subordinate to the majority, goes to center
The thought of change.
The embodiment of server in the embodiment of the present invention is described below.
Referring to Fig. 4, for one embodiment schematic diagram of server in the embodiment of the present invention, the server includes:
Sending module 401, it is every to cause for issuing the first block chain to the roomed all clients of live platform institute
Individual client generates the second block chain after receiving the first block chain, and the second block chain is sent into the service
Device;
Receiving module 402, for receiving all second block chains of all clients return;
First determining module 403, in all second block chains, determine identical second block chain quantity it is most be
The second legal block chain, it is other for the second illegal block chain;
Second determining module 404, for determining that client corresponding to the second legal block chain is legitimate client, illegally
The second block chain corresponding to client be illegitimate client.
Further, as shown in figure 5, the server also includes:
Generation module 405, it is roomed all to live platform institute for issuing the first block chain in the sending module
Before client, the first block chain is generated.
Further, the first block chain and the second block chain have identical data structure;
The data structure include the block number of block chain, the cryptographic Hash of previous block chain, current time timestamp with
And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation
Obtained data are filled after one fixed data encryption.
Further, second determining module 404 is additionally operable to:
If the server, which is received in all second block chains that all clients return, does not have the live platform target
The second block chain that the destination client in room is sent, and the destination client is current still in the target room, then really
The fixed destination client is illegitimate client.
Further, second determining module 404 is specifically used for:
Using each second block chain in all second block chains as a numerical value, determine that quantity in all numerical value is most
Numerical value is Constant numerical values, the second block chain corresponding to Constant numerical values is defined as to the second legal block chain, other is illegal
Second block chain.
A kind of server is also provided in the embodiment of the present invention, refers to Fig. 6, the server includes:
Memory 601, processor 602 and is stored in the computer that can be run on the memory and on the processor
Program 603, wherein, the processor 602 can realize above-mentioned data verification method when performing the computer program 603.
It should be noted that the server that the application is related to include but is not limited to be:Mobile terminal (mobile phone, smart mobile phone,
PAD, notebook computer etc.), fixed terminal (computer).
For convenience of description, the part related to the embodiment of the present invention is illustrate only, particular technique details does not disclose, please
With reference to present invention method part.Memory 601 can be used for storage computer program 603, and above computer program includes
Software program, module and data, processor 602 perform the computer program 603 for being stored in memory 601 by running, so as to
The various function application of execute server and data processing.
In specific implementation process, memory 601 can be used for storage software program and module, processor 602 to pass through
Operation is stored in the software program and module of memory 601, at the various function application and data of execute server
Reason.Memory 601 can mainly include storing program area and storage data field, wherein, storing program area can storage program area, extremely
Application program (such as game class application program, chat class application program) needed for few One function etc.;Storage data field can deposit
Storage uses created data (game configuration data, voice data) etc. according to server.In addition, memory 601 can wrap
High-speed random access memory is included, nonvolatile memory, for example, at least disk memory, a flash memories can also be included
Part or other volatile solid-state parts.Processor 602 is the control centre of server, is connected using various interfaces and circuit
The various pieces of whole server are connect, by running or performing the software program and/or module that are stored in memory 601, with
And the data being stored in memory 601 are called, the various functions and processing data of execute server, so as to be carried out to server
Integral monitoring.Optionally, processor 602 may include one or more processing units;Preferably, processor 602 can integrate application
Processor, wherein, application processor mainly handles operating system, user interface and application program etc..
The embodiment of the present invention also provides a kind of computer-readable recording medium, wherein, the computer-readable recording medium can
Have program stored therein, the part or all of step including the data verification method described in the above method embodiment when program performs
Suddenly.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with
Realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing
Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or
The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communicate to connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before
Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding
State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these
Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (10)
1. a kind of data verification method, it is characterised in that methods described includes:
Server issues the first block chain to the roomed all clients of live platform institute, to cause each client to receive institute
The second block chain is generated after stating the first block chain, and the second block chain is sent to the server;
The server receives all second block chains that all clients return;
The server in all second block chains, determine identical second block chain quantity it is most for the second legal block
Chain, it is other for the second illegal block chain;
The server determines that client corresponding to the second legal block chain is legitimate client, the second illegal block chain pair
The client answered is illegitimate client.
2. according to the method for claim 1, it is characterised in that issue the first block chain to live platform in the server
Before the roomed all clients of institute, methods described also includes:
The server generates the first block chain.
3. according to the method for claim 1, it is characterised in that the first block chain and the second block chain have phase
Same data structure;
The data structure includes the block number of block chain, the cryptographic Hash of previous block chain, the timestamp of current time and area
Block chain performance data, the block chain performance data are the random data that the server generates at random, or are generation one
Obtained data are filled after fixed data encryption.
4. according to the method for claim 1, it is characterised in that methods described also includes:
If the server, which is received in all second block chains that all clients return, does not have the live platform target room
The second block chain for sending of destination client, and the destination client is current still in the target room, it is determined that institute
It is illegitimate client to state destination client.
5. according to the method for claim 1, it is characterised in that the server determines phase in all second block chains
With the second block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain the step of, including:
The server is using each second block chain in all second block chains as a numerical value;
The server determines that the numerical value that quantity is most in all numerical value is Constant numerical values, by the second block corresponding to Constant numerical values
Chain is defined as the second legal block chain, other for the second illegal block chain.
6. a kind of server, it is characterised in that the server includes:
Sending module, for issuing the first block chain to the roomed all clients of live platform institute, to cause each client
End generates the second block chain after receiving the first block chain, and the second block chain is sent into the server;
Receiving module, for receiving all second block chains of all clients return;
First determining module, in all second block chains, determine identical second block chain quantity it is most to be legal
Second block chain, it is other for the second illegal block chain;
Second determining module, for determining that client corresponding to the second legal block chain is legitimate client, illegal second
Client corresponding to block chain is illegitimate client.
7. server according to claim 6, it is characterised in that the server also includes:
Generation module, for the sending module issue the first block chain to the roomed all clients of live platform institute it
Before, generate the first block chain.
8. server according to claim 6, it is characterised in that the first block chain and the second block chain have
Identical data structure;
The data structure includes the block number of block chain, the cryptographic Hash of previous block chain, the timestamp of current time and area
Block chain performance data, the block chain performance data are the random data that the server generates at random, or are generation one
Obtained data are filled after fixed data encryption.
9. server according to claim 6, it is characterised in that second determining module is additionally operable to:
If the server, which is received in all second block chains that all clients return, does not have the live platform target room
The second block chain for sending of destination client, and the destination client is current still in the target room, it is determined that institute
It is illegitimate client to state destination client.
A kind of 10. server, it is characterised in that including:Memory, processor and is stored on the memory and can be described
The computer program run on processor, wherein, claim 1 can be realized described in the computing device during computer program
To 5 any described methods.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710882095.8A CN107528855A (en) | 2017-09-26 | 2017-09-26 | A kind of data verification method and server |
PCT/CN2017/108051 WO2019061627A1 (en) | 2017-09-26 | 2017-10-27 | Data verification method, and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710882095.8A CN107528855A (en) | 2017-09-26 | 2017-09-26 | A kind of data verification method and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107528855A true CN107528855A (en) | 2017-12-29 |
Family
ID=60737340
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710882095.8A Pending CN107528855A (en) | 2017-09-26 | 2017-09-26 | A kind of data verification method and server |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107528855A (en) |
WO (1) | WO2019061627A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256353A (en) * | 2018-01-11 | 2018-07-06 | 武汉斗鱼网络科技有限公司 | A kind of data integrity verifying method, apparatus and client |
CN108830088A (en) * | 2018-04-26 | 2018-11-16 | 张莉 | A kind of big data analysis method and system based on Internet of Things |
CN108924089A (en) * | 2018-05-29 | 2018-11-30 | 武汉斗鱼网络科技有限公司 | A kind of client device recognition methods, device and client device |
CN110147686A (en) * | 2019-04-18 | 2019-08-20 | 阿里巴巴集团控股有限公司 | A kind of storage method, system, device and the equipment of personal asset change record |
CN110381375A (en) * | 2018-04-13 | 2019-10-25 | 武汉斗鱼网络科技有限公司 | A kind of determining method, client and server for stealing brush data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160218879A1 (en) * | 2015-01-23 | 2016-07-28 | Daniel Robert Ferrin | Method and apparatus for the limitation of the mining of blocks on a block chain |
CN105959728A (en) * | 2016-06-27 | 2016-09-21 | 武汉斗鱼网络科技有限公司 | System and method for counting number of online users of live platform |
CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
CN106789985A (en) * | 2016-12-08 | 2017-05-31 | 武汉斗鱼网络科技有限公司 | Client validation method and system based on GPU algorithms |
US20170243217A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for routing of process authorizations and settlement to a user in a process data network |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106385593B (en) * | 2016-09-14 | 2019-05-17 | 武汉斗鱼网络科技有限公司 | The statistical method and system of live streaming number are watched while based on elliptic curve |
CN106385601B (en) * | 2016-09-14 | 2019-04-05 | 武汉斗鱼网络科技有限公司 | The statistical method and system of live streaming number are watched while based on multi-protocols verifying |
CN106487801B (en) * | 2016-11-03 | 2019-10-11 | 江苏通付盾科技有限公司 | Information Authentication method and device based on block chain |
CN106533696B (en) * | 2016-11-18 | 2019-10-01 | 江苏通付盾科技有限公司 | Identity identifying method, certificate server and user terminal based on block chain |
CN107086909B (en) * | 2017-03-07 | 2021-01-12 | 创新先进技术有限公司 | Identity information generation method and device and identity verification method and device |
-
2017
- 2017-09-26 CN CN201710882095.8A patent/CN107528855A/en active Pending
- 2017-10-27 WO PCT/CN2017/108051 patent/WO2019061627A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160218879A1 (en) * | 2015-01-23 | 2016-07-28 | Daniel Robert Ferrin | Method and apparatus for the limitation of the mining of blocks on a block chain |
US20170243217A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for routing of process authorizations and settlement to a user in a process data network |
CN105959728A (en) * | 2016-06-27 | 2016-09-21 | 武汉斗鱼网络科技有限公司 | System and method for counting number of online users of live platform |
CN106534160A (en) * | 2016-12-02 | 2017-03-22 | 江苏通付盾科技有限公司 | Identity authentication method and system based on block chain |
CN106789985A (en) * | 2016-12-08 | 2017-05-31 | 武汉斗鱼网络科技有限公司 | Client validation method and system based on GPU algorithms |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108256353A (en) * | 2018-01-11 | 2018-07-06 | 武汉斗鱼网络科技有限公司 | A kind of data integrity verifying method, apparatus and client |
CN108256353B (en) * | 2018-01-11 | 2021-01-01 | 武汉斗鱼网络科技有限公司 | Data integrity checking method and device and client |
CN110381375A (en) * | 2018-04-13 | 2019-10-25 | 武汉斗鱼网络科技有限公司 | A kind of determining method, client and server for stealing brush data |
CN110381375B (en) * | 2018-04-13 | 2022-06-21 | 武汉斗鱼网络科技有限公司 | Method for determining data embezzlement, client and server |
CN108830088A (en) * | 2018-04-26 | 2018-11-16 | 张莉 | A kind of big data analysis method and system based on Internet of Things |
CN108924089A (en) * | 2018-05-29 | 2018-11-30 | 武汉斗鱼网络科技有限公司 | A kind of client device recognition methods, device and client device |
CN108924089B (en) * | 2018-05-29 | 2021-11-09 | 武汉斗鱼网络科技有限公司 | Client device identification method and device and client device |
CN110147686A (en) * | 2019-04-18 | 2019-08-20 | 阿里巴巴集团控股有限公司 | A kind of storage method, system, device and the equipment of personal asset change record |
TWI724730B (en) * | 2019-04-18 | 2021-04-11 | 開曼群島商創新先進技術有限公司 | Storage method, system, device and equipment for personal asset change records |
Also Published As
Publication number | Publication date |
---|---|
WO2019061627A1 (en) | 2019-04-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107528855A (en) | A kind of data verification method and server | |
CN107465698A (en) | A kind of data verification method and server | |
CN107454110A (en) | A kind of data verification method and server | |
CN107682328A (en) | A kind of data verification method and client | |
CN109360100B (en) | Transaction rapid confirmation method and device based on block chain technology | |
CN107801059B (en) | A kind of method for authenticating and server | |
CN107239954B (en) | Method and device for increasing block generation speed | |
CN107623865A (en) | A kind of data verification method and server | |
CN109740384A (en) | Data based on block chain deposit card method and apparatus | |
CN107426253A (en) | A kind of data verification method and client | |
CN107798538A (en) | One kind transaction accounting method and client | |
CN108646983A (en) | The treating method and apparatus of storage service data on block chain | |
CN104933207B (en) | The acquisition methods and system of user behavior data in application program | |
CN109598598A (en) | Transaction processing method and device, electronic equipment based on block chain | |
CN106815722A (en) | Information processing method and device based on block chain | |
CN108256353A (en) | A kind of data integrity verifying method, apparatus and client | |
CN107480990A (en) | Block chain bookkeeping methods and device | |
CN109598504A (en) | Transaction processing method and device, electronic equipment based on block chain | |
CN107679149A (en) | A kind of data processing method and server | |
CN108366057A (en) | A kind of data processing method, client and electronic equipment | |
CN108260015B (en) | Voting data processing method and device and electronic equipment | |
CN110177124A (en) | Identity identifying method and relevant device based on block chain | |
CN108847926A (en) | A kind of client secure detection method, device and client device | |
CN111461720B (en) | Identity verification method and device based on blockchain, storage medium and electronic equipment | |
CN110264354A (en) | It creates block chain account and verifies the method and device of block chain transaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171229 |