CN109831501A - Information dispensing method and system based on block chain - Google Patents

Information dispensing method and system based on block chain Download PDF

Info

Publication number
CN109831501A
CN109831501A CN201910090502.0A CN201910090502A CN109831501A CN 109831501 A CN109831501 A CN 109831501A CN 201910090502 A CN201910090502 A CN 201910090502A CN 109831501 A CN109831501 A CN 109831501A
Authority
CN
China
Prior art keywords
user
cryptographic hash
block chain
information
user identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910090502.0A
Other languages
Chinese (zh)
Other versions
CN109831501B (en
Inventor
聂二保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Jingdong Technology Holding Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN201910090502.0A priority Critical patent/CN109831501B/en
Publication of CN109831501A publication Critical patent/CN109831501A/en
Priority to PCT/CN2019/130315 priority patent/WO2020156008A1/en
Application granted granted Critical
Publication of CN109831501B publication Critical patent/CN109831501B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses information dispensing methods and system based on block chain, are related to field of computer technology.One specific embodiment of this method includes: access end according to the classification and quantity of user generation informative abstract, is broadcast to block chain;Receiving end generates application identification request according to the informative abstract on block chain, and is sent to access end;Access end determines user identifier according to application identification request, to obtain the first cryptographic Hash of user identifier;Respond request parameter is set, and respond request parameter includes the first parameter;Respond request parameter and the first cryptographic Hash are broadcast to block chain, and user identifier is sent to receiving end;Receiving end receives user identifier, obtains the second cryptographic Hash according to the first cryptographic Hash on block chain, the second cryptographic Hash is broadcast to block chain, and handled according to the first parameter.The embodiment reduces access end and distributes invalid information, guarantees the equity of user.

Description

Information dispensing method and system based on block chain
Technical field
The present invention relates to field of computer technology more particularly to a kind of information dispensing methods and system based on block chain.
Background technique
Existing information distribution procedure is: access end obtains user information, and classifies to user, will according to classification results User information is directly pushed to receiving end.
In realizing process of the present invention, at least there are the following problems in the prior art for inventor's discovery: first, access end meeting Inactive users information is pushed to receiving end, receiving end is caused to there are problems that managing and waste;Second, receiving end is by user information It is packaged and sells again, damage user's right.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of information dispensing method and system based on block chain, can reduce Access end distributes invalid information, reduces the waste of receiving end management and resource, guarantees the equity of user.
To achieve the above object, first aspect according to an embodiment of the present invention provides a kind of letter based on block chain Cease distribution method.
The information dispensing method based on block chain of the embodiment of the present invention, comprising:
Access end generates informative abstract according to the classification and quantity of user, and the informative abstract is broadcast to block chain;
Receiving end generates application identification request according to the informative abstract on the block chain, and the application is identified Request is sent to the access end;
The access end determines user identifier according to the application identification request, to obtain the first of the user identifier Cryptographic Hash;Respond request parameter is set, and the respond request parameter includes the first parameter;By the respond request parameter and described First cryptographic Hash is broadcast to the block chain, and the user identifier is sent to the receiving end;
The receiving end receives the user identifier, obtains the second Kazakhstan according to first cryptographic Hash on the block chain Uncommon value, is broadcast to the block chain for second cryptographic Hash, and handled according to first parameter.
In one embodiment, the application identification request carries the classification and quantity of the user;
User identifier is determined according to the application identification request, to obtain the first cryptographic Hash of the user identifier, is wrapped It includes:
User identifier is determined according to the classification of the user and quantity;
Hash operation is carried out to the user identifier, obtains the first operation result;
It is signed using access end private key to first operation result, obtains the first Hash of the user identifier Value.
In one embodiment, the second cryptographic Hash is obtained according to first cryptographic Hash on the block chain, comprising:
First cryptographic Hash is obtained from the block chain, and first cryptographic Hash is signed using receiving end private key Name, obtains the second cryptographic Hash.
In one embodiment, the respond request parameter further includes the second parameter;
After being handled according to first parameter, further includes:
The receiving end generates application information request according to the user identifier, and application information request is sent to The access end;
The access end requests to determine user information according to the application information, to obtain the third of the user information Cryptographic Hash;The third cryptographic Hash is broadcast to the block chain, and the user information is sent to the receiving end;
The receiving end receives the user information, obtains the third cryptographic Hash from the block chain, is connect using described Receiving end private key signs to the third cryptographic Hash, obtains the 4th cryptographic Hash, and the 4th cryptographic Hash is broadcast to the area Block chain, and handled according to second parameter.
In one embodiment, the application information request carries the user identifier;
It is requested to determine user information according to the application information, to obtain the third cryptographic Hash of the user information, be wrapped It includes:
User information is determined according to the user identifier;
Hash operation is carried out to the user information, obtains the second operation result;
It is signed using the access end private key to second operation result, the third for obtaining the user information is breathed out Uncommon value.
In one embodiment, before access end generates informative abstract according to the classification and quantity of user, further includes:
Obtain user information and user identifier;
User is drawn a portrait and classified in the behavioral data that access end generates, obtains the corresponding classification of user;
User information, user identifier and the corresponding classification of user are subjected to matching storage.
To achieve the above object, the second aspect according to an embodiment of the present invention provides a kind of letter based on block chain Cease dissemination system.
The information distribution system based on block chain of the embodiment of the present invention, including access end and receiving end;
The access end includes:
First generation unit broadcasts the informative abstract for generating informative abstract according to the classification and quantity of user To block chain;
First processing units, for determining user identifier according to the application identification request, to obtain user's mark The first cryptographic Hash known;Respond request parameter is set, and the respond request parameter includes the first parameter;The respond request is joined Several and first cryptographic Hash is broadcast to the block chain, and the user identifier is sent to the receiving end;
The receiving end includes:
Second generation unit, for generating application identification request according to the informative abstract on the block chain, and will The application identification request is sent to the access end;
The second processing unit is obtained for receiving the user identifier according to first cryptographic Hash on the block chain To the second cryptographic Hash, second cryptographic Hash is broadcast to the block chain, and handled according to first parameter.
In one embodiment, the application identification request carries the classification and quantity of the user;
The first processing units are also used to:
User identifier is determined according to the classification of the user and quantity;
Hash operation is carried out to the user identifier, obtains the first operation result;
It is signed using access end private key to first operation result, obtains the first Hash of the user identifier Value.
In one embodiment, described the second processing unit is also used to:
First cryptographic Hash is obtained from the block chain, and first cryptographic Hash is signed using receiving end private key Name, obtains the second cryptographic Hash.
In one embodiment, the respond request parameter further includes the second parameter;
Second generation unit is also used to after being handled according to first parameter, is marked according to the user Know and generate application information request, and application information request is sent to the access end;
The first processing units are also used to be requested to determine user information according to the application information, to obtain described The third cryptographic Hash of user information;The third cryptographic Hash is broadcast to the block chain, and the user information is sent to The receiving end;
Described the second processing unit is also used to receive the user information, obtains the third Hash from the block chain Value, signs to the third cryptographic Hash using the receiving end private key, obtains the 4th cryptographic Hash, by the 4th cryptographic Hash It is broadcast to the block chain, and is handled according to second parameter.
In one embodiment, the application information request carries the user identifier;
The first processing units are also used to:
User information is determined according to the user identifier;
Hash operation is carried out to the user information, obtains the second operation result;
It is signed using the access end private key to second operation result, the third for obtaining the user information is breathed out Uncommon value.
In one embodiment, the access end further includes pretreatment unit, is used for:
Before generating informative abstract according to the classification of user and quantity, user information and user identifier are obtained;
User is drawn a portrait and classified in the behavioral data that access end generates, obtains the corresponding classification of user;
User information, user identifier and the corresponding classification of user are subjected to matching storage.
To achieve the above object, in terms of third according to an embodiment of the present invention, a kind of electronic equipment is provided.
The a kind of electronic equipment of the embodiment of the present invention, comprising: one or more processors;Storage device, for storing one A or multiple programs, when one or more of programs are executed by one or more of processors, so that one or more A processor realizes following method provided in an embodiment of the present invention: informative abstract is generated according to the classification of user and quantity, by institute It states informative abstract and is broadcast to block chain;User identifier is determined according to the application identification request, to obtain the user identifier The first cryptographic Hash;Respond request parameter is set, and the respond request parameter includes the first parameter;By the respond request parameter It is broadcast to the block chain with first cryptographic Hash, and the user identifier is sent to the receiving end.
To achieve the above object, the 4th aspect according to an embodiment of the present invention, provides a kind of electronic equipment.
The a kind of electronic equipment of the embodiment of the present invention, comprising: one or more processors;Storage device, for storing one A or multiple programs, when one or more of programs are executed by one or more of processors, so that one or more A processor realizes following method provided in an embodiment of the present invention: generating application according to the informative abstract on the block chain Identification request, and the application identification request is sent to the access end;The user identifier is received, according to the block chain On first cryptographic Hash obtain the second cryptographic Hash, second cryptographic Hash is broadcast to the block chain, and according to described First parameter is handled.
To achieve the above object, the 5th aspect according to an embodiment of the present invention, provides a kind of computer-readable medium.
A kind of computer-readable medium of the embodiment of the present invention, is stored thereon with computer program, and described program is processed Device realizes following method provided in an embodiment of the present invention when executing: informative abstract is generated according to the classification of user and quantity, by institute It states informative abstract and is broadcast to block chain;User identifier is determined according to the application identification request, to obtain the user identifier The first cryptographic Hash;Respond request parameter is set, and the respond request parameter includes the first parameter;By the respond request parameter It is broadcast to the block chain with first cryptographic Hash, and the user identifier is sent to the receiving end.
To achieve the above object, the 6th aspect according to an embodiment of the present invention, provides a kind of computer-readable medium.
A kind of computer-readable medium of the embodiment of the present invention, is stored thereon with computer program, and described program is processed Device realizes following method provided in an embodiment of the present invention when executing: generating application according to the informative abstract on the block chain Identification request, and the application identification request is sent to the access end;The user identifier is received, according to the block chain On first cryptographic Hash obtain the second cryptographic Hash, second cryptographic Hash is broadcast to the block chain, and according to described First parameter is handled.
One embodiment in foregoing invention have the following advantages that or the utility model has the advantages that access end according to the classification sum number of user Amount generates informative abstract, is broadcast to block chain;Receiving end generates application identification request according to the classification and quantity of user.Thus, When receiving end generates request, access end just sends user identifier, and when receiving end does not generate request, access end does not send user's mark Know, rather than directly pushed by access end, to reduce access end distribution invalid information, reduces the management and money of receiving end The waste in source.Access end determines user identifier, obtains the first cryptographic Hash according to application identification request, and the first cryptographic Hash is broadcasted To block chain, user identifier is sent to receiving end.Receiving end obtains the second cryptographic Hash according to the first cryptographic Hash, and is broadcast to area Block chain.In this way, then reducing receiving end leakage user identifier using the record of block chain and not modifiable characteristic, ensure that The interests of user.When access end dispatch user identifies, there is the record of the first parameter, reducing receiving end and exaggerating own strength causes Access end benefit damage problem.
Further effect possessed by above-mentioned non-usual optional way adds hereinafter in conjunction with specific embodiment With explanation.
Detailed description of the invention
Attached drawing for a better understanding of the present invention, does not constitute an undue limitation on the present invention.Wherein:
Fig. 1 is the schematic diagram of the main flow of the information dispensing method according to an embodiment of the invention based on block chain;
Fig. 2 is the signal of the Signalling exchange of the information dispensing method according to another embodiment of the present invention based on block chain Figure;
Fig. 3 is the structural relation signal in the information dispensing method according to another embodiment of the present invention based on block chain Figure;
Fig. 4 is the application scenarios signal of the information dispensing method according to another embodiment of the present invention based on block chain Figure;
Fig. 5 is the schematic diagram of the main component of the information distribution system according to an embodiment of the present invention based on block chain;
Fig. 6 is that the embodiment of the present invention can be applied to exemplary architecture figure therein;
Fig. 7 is adapted for the structural representation of the computer system for the terminal device or server of realizing the embodiment of the present invention Figure.
Specific embodiment
Below in conjunction with attached drawing, an exemplary embodiment of the present invention will be described, including the various of the embodiment of the present invention Details should think them only exemplary to help understanding.Therefore, those of ordinary skill in the art should recognize It arrives, it can be with various changes and modifications are made to the embodiments described herein, without departing from scope and spirit of the present invention.Together Sample, for clarity and conciseness, descriptions of well-known functions and structures are omitted from the following description.
It should be pointed out that in the absence of conflict, the feature in embodiment and embodiment in the present invention can be with It is combined with each other.
With Internet era, the especially arrival in mobile interchange epoch, people are higher and higher to the dependency degree of network, together When, with deepening continuously for the division of labor in society, information distribution is used as a special division of labor in society field, also carries on a shoulder pole in modern society Shoulder increasingly important role.
The essence of information distribution is exactly that the user information that will acquire of access end is distributed to receiving end, and is responded by receiving end The demand of user.Wherein, the demand of user can be the transactions demand of consumer, be also possible to the transactions demand of sellers.Letter The demand that breath distribution can be avoided a large number of users is handled the problem for causing access end processing speed slow by access end, together Sample has also expanded the scope of business of receiving end, and the user experience is improved.
Existing information distribution procedure is illustrated with a specific example below:
Access end obtains user information through a variety of ways, for example, access end is obtained by the development of online e-commerce The information of sellers and the access ends such as the information of consumer or employer's organization are registered by the enterprise that management registers on the books The company information of enterprise on the regular payroll.Access end can be electric business platform.In general, there is competition between the platform of same type to close System, the user information that each platform obtains have certain platform preference, but the user information that each platform obtains on the whole Middle major part user information is identical.
Access end draws a portrait and classifies to user in the behavioral data that access end generates according to user, will be different classes of The user information of user is directly pushed to different receiving ends.
Receiving end receives user information, is matched with mechanism itself existing product, the demand to user responds.
In above-mentioned existing information distribution procedure, there are the following problems:
Firstly, access end in order to get a profit, can push inactive users information to receiving end, for example, repeatedly pushing same subscriber Information, in this way, then receiving end can have management and the waste of resource in recognition user information.
Secondly, user information can be packaged again sale by receiving end, in this way, then after user information is distributed to receiving end User information is leaked in the case where user does not agree to, compromises user's right.
Again, receiving end often exaggerates the friendship of receiving end to strive for more initiatives in the cooperation with access end Easy scale and trading volume, cause access end benefit damage.
Of the existing technology in order to solve the problems, such as, one embodiment of the invention provides a kind of information based on block chain point Forwarding method, as shown in Figure 1, this method comprises:
Step S101, access end generates informative abstract according to the classification and quantity of user, and the informative abstract is broadcast to Block chain.
In this step, when it is implemented, quantity can be obtained by the quantity of the classification of counting user, and, information is plucked The whole network broadcast is carried out in block chain with plaintext version.
In addition, classification can be children's classification, young and middle-aged classification and old classification;Classification can also be high consumption classification, Medium consumption classification and low consumption classification;Classification can also be high credit category, medium credit category and low credit category;Classification It can also be high-quality classification, medium quality classification and low quality classification.It should be noted that being above only to list several classes Other example, above-mentioned example are not intended to limit the present invention, and classification can be arranged in the embodiment of the present invention according to specific needs.
Step S102, receiving end generates application identification request according to the informative abstract on the block chain, and by institute It states application identification request and is sent to the access end.
In this step, when it is implemented, receiving end obtains informative abstract from block chain, and informative abstract carries user's Classification and quantity generate application identification request according to the classification of its user carried and quantity, and will by the agreement of block chain Application identification request is sent to access end.
Step S103, the described access end determines user identifier according to the application identification request, to obtain the user First cryptographic Hash of mark;Respond request parameter is set, and the respond request parameter includes the first parameter;By the respond request Parameter and first cryptographic Hash are broadcast to the block chain, and the user identifier is sent to the receiving end.
In this step, when it is implemented, access end can be in advance by user information, user identifier and the corresponding class of user Matching storage is not carried out.And apply for that identification request carries the classification and quantity of user, in this way, then access end can be according to user's Classification and quantity determine user identifier.Hash operation is carried out to user identifier, the first operation result is obtained, uses access end private key It signs to the first operation result, obtains the first cryptographic Hash.It should be noted that user identifier is not the agreement by block chain It is sent to receiving end, but is sent to receiving end by other approach, other approach can be mailbox.
Step S104, the described receiving end receives the user identifier, according to first cryptographic Hash on the block chain The second cryptographic Hash is obtained, second cryptographic Hash is broadcast to the block chain, and handled according to first parameter.
In this step, when it is implemented, receiving end obtains the first cryptographic Hash from block chain, and receiving end private key pair is used First cryptographic Hash is signed, and the second cryptographic Hash is obtained.In addition, the first parameter can be the fuel value (abbreviation GAS) of block chain, It may is that the GAS that block chain is paid to the miner of block chain according to the detailed process that the first parameter is handled.It should be noted It is, it can be complete in verifying and one first according to the integrality and consistency of the first cryptographic Hash and user identifier verifying user identifier The GAS of block chain is paid after cause again.
In embodiments of the present invention, access end generates informative abstract according to the classification and quantity of user, is broadcast to block chain; Receiving end generates application identification request according to the classification and quantity of user.Thus, when receiving end generates request, access end is just sent User identifier, when receiving end does not generate request, access end does not send user identifier, rather than is directly pushed by access end, thus Reduce access end distribution invalid information, reduces the management of receiving end and the waste of resource.Access end is asked according to application mark It asks, determines user identifier, obtain the first cryptographic Hash, the first cryptographic Hash is broadcast to block chain, user identifier is sent to reception End.Receiving end obtains the second cryptographic Hash according to the first cryptographic Hash, and is broadcast to block chain.In this way, then utilizing the record of block chain Not modifiable characteristic reduces receiving end leakage user identifier, ensure that the interests of user.Access end dispatch user mark When, there is the record of the first parameter, reduces receiving end and exaggerate access end benefit damage problem caused by own strength.
User, access end and receiving end are configured to alliance's chain by block chain technology by the embodiment of the present invention.User Not only it interacts with access end, after the distribution by access end, can also be interacted with receiving end, then by receiving end Respond the demand of user.
Of the existing technology in order to solve the problems, such as, another embodiment of the present invention provides a kind of information based on block chain Distribution method, as shown in Figure 2, Figure 3 and Figure 4, this method comprises:
Step S201, access end obtains user information and user identifier;The behavioral data that user is generated in access end into Row portrait and classification, obtain the corresponding classification of user;User information, user identifier and the corresponding classification of user are carried out matching to deposit Storage.
In this step, when it is implemented, user information is sent to access end by user terminal by user.Thus, distribution End receives user information.By behavioral data that user generates in access end, (behavioral data can be browsing behavior, reads access end Behavior, trading activity or other behavioral datas), being input to algorithm or model, (algorithm can be machine learning algorithm, and model can To be user's portrait model), the portrait of user is obtained, portrait depicts the behavioural habits or production and operation state of user. Access end gives a mark to the portrait of user according to the Rating Model of access end, obtains the corresponding class of user according to marking result Not, the user information of the user is partitioned into the identical classification group of classification corresponding to the user, and right in category group User information is ranked up, and distributes to the unique User ID of the user, and User ID is user identifier.
It should be noted that the purpose that access end draws a portrait to user and classifies is: access end being facilitated to provide more for user Effective service, and more accurately realize information distribution.
It should be noted that the user of access end is generally unwilling to carry out user in the initial data that access end is formed Distribution, but similar subscriber blacklist etc. can be distributed.For example, bad user list can be distributed to receiving end by access end.
In addition, user information may include: user contact details, user's gender and address name etc..
Step S202, access end generates informative abstract according to the classification and quantity of user, and the informative abstract is broadcast to Block chain.
In this step, when it is implemented, quantity is obtained by the quantity of the user of the classification of counting user.In addition, Informative abstract is subjected to the whole network broadcast in block chain with plaintext version.Furthermore access end be by the classification and quantity of user, and point The IP address of originator is assembled into informative abstract, thus, informative abstract carries the classification and quantity of user.
Step S203, receiving end generates application identification request according to the informative abstract on the block chain, and by institute It states application identification request and is sent to the access end, the application identification request carries the classification and quantity of the user.
In this step, when it is implemented, receiving end obtains informative abstract from block chain, the user of receiving end is by connecing Receiving end browses informative abstract, and informative abstract carries the classification and quantity of user, and the user of receiving end is according to the classification of user Determine whether to operate receiving end with quantity, to generate application identification request.The user's that receiving end is carried by informative abstract Classification and quantity generate application identification request.Receiving end will apply for that identification request is sent to access end by the agreement of block chain.
Step S204, access end determines user identifier according to the classification and quantity of the user, to the user identifier into Row Hash operation obtains the first operation result;It is signed, is obtained described to first operation result using access end private key First cryptographic Hash of user identifier;Respond request parameter is set, and the respond request parameter includes the first parameter and the second parameter; The respond request parameter and first cryptographic Hash are broadcast to the block chain, and the user identifier is sent to described Receiving end.
In this step, when it is implemented, since access end is by user information, user identifier and the corresponding classification of user Matching storage is carried out, thus, access end can determine user identifier from access end according to the classification and quantity of user.It should be understood that It is that access end has exclusive private key, i.e., different access ends, access end private key difference.In this way, then the first cryptographic Hash is that have label Name access end it is markup.In addition, the Hash operation of access end can pass through the application (DAPP) of the decentralization of block chain It realizes.
Second parameter can be token (abbreviation TOKEN).It should be noted that informative abstract is broadcast to block by access end Chain, receiving end will apply for that identification request is sent to access end, receiving end and application information request is sent to access end etc., be required to It pays GAS and needs the miner to block chain that is, access end or receiving end use block chain to the miner of block chain Pay GAS.
Access end account information is also sent to receiving end by access end, thus make receiving end payment TOKEN to access end, The account information of access end may include: account name, bank of deposit and duty paragraph of access end etc..In addition, access end first marks user Know and access end account information is packaged into the first data packet, the first data packet is sent to receiving end by other approach, other Approach can be mailbox, and the first data packet is sent to receiving end not by the agreement of block chain.Why in this way, being because of area The bearing capacity of block chain is limited, and the data volume of the first data packet is more.
Access end signs to the first operation result using access end private key, obtains the first cryptographic Hash, and the first operation It is obtained the result is that carrying out Hash operation by user identifier, the first cryptographic Hash is broadcast to block chain, thus, utilize the note of block chain Record and not modifiable characteristic reduce receiving end leakage user identifier, have further ensured the equity of user.
Step S205, receiving end receives the user identifier, and first cryptographic Hash is obtained from the block chain, uses Receiving end private key signs to first cryptographic Hash, obtains the second cryptographic Hash;Second cryptographic Hash is broadcast to described Block chain, and handled according to first parameter.
In this step, when it is implemented, receiving end receive the first data packet, obtain user identifier, to user identifier into Row Hash operation, if the cryptographic Hash that Hash operation obtains is identical as the first cryptographic Hash, confirm received user identifier be it is complete, And it is consistent, GAS is then paid to the miner of block chain.It should be noted that the detailed process handled according to the first parameter is i.e. It is payment GAS to the miner of block chain.
In addition, receiving end needs to prop up after the second cryptographic Hash is broadcast to block chain if the first parameter is a GAS A GAS is paid to the miner of block chain.
It should be noted that after the second cryptographic Hash is broadcast to block chain by receiving end, miner's (mine in block chain of block chain For work for generating block, miner can be receiving end, be also possible to user terminal etc.) the second cryptographic Hash can be viewed, and by altogether Know algorithm and confirms whether the second cryptographic Hash is true;If miner's confirmation is the fact, block is generated according to the second cryptographic Hash.When So, miner not often views second cryptographic Hash and generates block, but the quantity in the second cryptographic Hash to be viewed reaches To block chain be arranged quantitative value when just generate block, different types of block chain its setting quantitative value difference.Applied to this The common recognition algorithm of inventive embodiments can be practical Byzantine failure tolerance algorithm (PBFT), be also possible to the calculation of modified Byzantine failure tolerance Method (DBFT), but cannot be that work quantity algorithm (POW) or share prove algorithm (POS).In addition, the first cryptographic Hash, third are breathed out It is identical that uncommon value and the 4th cryptographic Hash etc. are broadcast to the situation after the situation after block chain is broadcast to block chain with the second cryptographic Hash, This is repeated no more.Certainly, the accounting nodes of block chain are generated by common recognition algorithm, and accounting procedure can be rewarded.
It should be understood that receiving end has exclusive private key, i.e., different receiving ends, receiving end private key difference.In this way, then Two cryptographic Hash are the markup of the access end of the markup of the receiving end with signature and signature.
Receiving end signs to the first cryptographic Hash using receiving end private key, and is broadcast to block chain, thus, utilize block The record of chain and not modifiable characteristic reduce receiving end leakage user identifier, further ensure the equity of user.
Step S206, after being handled according to first parameter, receiving end generates Shen according to the user identifier Please information request, and application information request is sent to the access end, the application information request carries the user Mark.
In this step, when it is implemented, the user of receiving end can after being handled according to first parameter To browse user identifier by receiving end;It feels the need to obtain user information after browsing user identifier, thus to user's Demand is responded, or when user is included in service range, receiving end can be operated, to make receiving end according to user identifier Generate application information request.In addition, it may include: receiving end to reception that receiving end, which generates application information request according to user identifier, The end address ip and user identifier are assembled, and application information request is obtained.In this way, then access end can use the receiving end address ip User information is sent to receiving end.Application information request is sent to access end by the agreement of block chain by receiving end.
Step S207, access end determines user information according to the user identifier;Hash fortune is carried out to the user information It calculates, obtains the second operation result;It is signed using the access end private key to second operation result, obtains the user The third cryptographic Hash of information;The third cryptographic Hash is broadcast to the block chain, and the user information is sent to described Receiving end.
In this step, when it is implemented, access end is to carry out user information, user identifier and the corresponding classification of user Matching storage, thus, access end can determine user information from access end according to user identifier.It should be understood that access end makes It is signed with access end private key to the second operation result, thus, make the source of information that there is trackability, prevents leakage user Privacy.
User information is first packaged into the second data packet by access end, and the second data packet is sent to reception by other approach End, other approach can be mailbox, and the second data packet is sent to receiving end not by the agreement of block chain.Why in this way, It is because the bearing capacity of block chain is limited, and the data volume of the second data packet is more.
Access end signs to the second operation result using access end private key, obtains third cryptographic Hash, and the second operation It is obtained the result is that carrying out Hash operation by user information, third cryptographic Hash is broadcast to block chain, thus, utilize the note of block chain Record and not modifiable characteristic reduce receiving end leakage user information, further ensure the equity of user.
Step S208, receiving end receives the user information, obtains the third cryptographic Hash from the block chain, uses institute It states receiving end private key to sign to the third cryptographic Hash, obtains the 4th cryptographic Hash;4th cryptographic Hash is broadcast to institute Block chain is stated, and is handled according to second parameter.
In this step, when it is implemented, receiving end receive the second data packet, obtain user information, to user information into Row Hash operation, if the cryptographic Hash that Hash operation obtains is identical as third cryptographic Hash, confirm received user information be it is complete, And it is consistent, TOKEN is then paid to access end.It should be noted that being branch according to the detailed process that the second parameter is handled TOKEN is paid to access end.It should be understood that the comparison of the cryptographic Hash of receiving end and the payment of TOKEN can pass through DAPP reality It is existing.
4th cryptographic Hash is to have passed through access end and receiving end signature respectively, and be broadcast to block chain, utilizes block chain Record and not modifiable characteristic, make the generation of user information and use be provided with record, reduce receiving end leakage user Information has further ensured the equity of user.Also, when access end dispatch user information, there is the record of the second parameter, further Reduce receiving end and exaggerates access end benefit damage problem caused by own strength.
It should be noted that the second cryptographic Hash and the 4th cryptographic Hash can store on same block, also can store not With on block.In addition, access end is the intermediary of information, user information is only distributed to receiving end, thus, user is believed The demand for ceasing the user being directed toward, is to be handled by receiving end, rather than handled by access end.Furthermore receiving end is from distribution After end obtains user information, secondary clearing, and and receiving end again can also be carried out to user according to the preference and strategy of receiving end Product matched, meet the needs of users.Also, after user information is distributed to receiving end by access end, user terminal with connect Receiving end establishes direct connection, for operation layer, does not need access end and provides information again, but since user is in the row of access end To continue, thus, user is changing in the behavioral data that access end generates, and the classification of user is changing, so, access end can be with According to the classification of updated user, continue dispatch user information, but need that the classification of user is marked, is convenient for receiving end Identification is the classification variation of same user, to promote distribution efficiency.
It should be understood that individual user is carried out a large amount of concentrate to access end in some period and is visited by a plurality of clients It asks (a large amount of central access are to propose a large amount of access requests to access end), causes the network blockage towards access end, or even should Individual user's therefore unjustified enrichment.In order to solve this problem, it can propose that primary request needs user's branch by the way that user is every Pay the mode of the GAS of preset quantity, if the quantity of request that is proposed within a preset period of time by user to be equal to first pre- If when quantity, then the user is needed to pay the mode of the GAS of the second preset quantity (it should be understood that the first preset quantity and second Preset quantity can be arranged according to specific needs), to limit central access behavior.In this way, proposing to ask to improve user The mode for the cost asked, the case where reducing individual user's unjustified enrichment.
It will also be appreciated that receiving end has distribution letter as shown in figure 4, the role of access end and receiving end can be interchanged When the demand of breath, access end can also be used as, similarly, access end can also be used as receiving end.For example, the user of user terminal 1 After the user information of information, the user information of user terminal 2 and user terminal 3 is obtained by access end 1, it can be distributed to by access end 1 Access end 2, access end 3, receiving end 1, receiving end 2 and receiving end 3.User terminal can be terminal device, be also possible to server, But access end and receiving end are servers.
It will also be appreciated that user, after access end registration, access end is the user information for obtaining the user.It was registering Cheng Zhong, access end need to carry out identification to the user, and identification is prior art.After the user's registration, access end User name is the public key of the user, and the password of access end is the private key of the user, and the private key of the user is used for the user It signs, which may have access to access end by the public key and private key of the user.In addition, access end is by the use of the user Before family information is distributed, the agreement for agreeing to dispatch user information, after signing an agreement, access end ability need to be signed with the user Distribute the user information of the user, in this way, then having met relevant regulations.Furthermore since access end produces the user in access end Raw behavioral data is drawn a portrait and is classified, and the classification of the user is obtained, and obtains informative abstract by the classification of the user, and broadcast To block chain, so that receiving end be enable to be distributed to the user information of the user, which may include the state of user (for example, shortage of funding state) leads to the benefit damage of receiving end in this way, then reducing receiving end and not obtaining the state of user Problem.
It will also be appreciated that if the intelligent contract of block chain does not receive in preset time period since receiving informative abstract The first cryptographic Hash generated by informative abstract, then the intelligent contract of block chain deducts the first parameter from access end.Due to information Abstract is to be broadcast to block chain, and the first cryptographic Hash is also to be broadcast to block chain, thus intelligent contract (the intelligent contract of block chain It is a kind of program that can voluntarily execute) it can be realized the above process.Certainly, the miner of block chain can deduct the first ginseng to access end Number is kept accounts.It is arranged according to specific needs in addition, preset time period can be, for example, weekly.Due in preset time period not Receive the first cryptographic Hash, thus, intelligent contract confirmation receiving end does not need the user information of access end, at this point, by access end Lai The first parameter is undertaken, receiving end does not have to recognition user information when not needed, reduce the waste of receiving end management and resource, and And by way of improving and distributing cost, reduce access end distribution invalid information.
The information dispensing method based on block chain is illustrated above in association with Fig. 1 to Fig. 4, is based on area below in conjunction with Fig. 5 explanation The information distribution system of block chain.
It is of the existing technology in order to solve the problems, such as, the information distribution based on block chain that the embodiment of the invention provides a kind of System, as shown in figure 5, the system includes access end 510 and receiving end 520;
The access end 510 includes:
First generation unit 511 is wide by the informative abstract for generating informative abstract according to the classification and quantity of user It is multicast to block chain;
First processing units 512, for determining user identifier according to the application identification request, to obtain the user First cryptographic Hash of mark;Respond request parameter is set, and the respond request parameter includes the first parameter;By the respond request Parameter and first cryptographic Hash are broadcast to the block chain, and the user identifier is sent to the receiving end;
The receiving end 520 includes:
Second generation unit 521, for generating application identification request according to the informative abstract on the block chain, and The application identification request is sent to the access end;
The second processing unit 522, for receiving the user identifier, according to first cryptographic Hash on the block chain The second cryptographic Hash is obtained, second cryptographic Hash is broadcast to the block chain, and handled according to first parameter.
In embodiments of the present invention, the application identification request carries the classification and quantity of the user;
The first processing units 512 are also used to:
User identifier is determined according to the classification of the user and quantity;
Hash operation is carried out to the user identifier, obtains the first operation result;
It is signed using access end private key to first operation result, obtains the first Hash of the user identifier Value.
In embodiments of the present invention, described the second processing unit 522 is also used to:
First cryptographic Hash is obtained from the block chain, and first cryptographic Hash is signed using receiving end private key Name, obtains the second cryptographic Hash.
In embodiments of the present invention, the respond request parameter further includes the second parameter;
Second generation unit 521 is also used to after being handled according to first parameter, according to the user Mark generates application information request, and application information request is sent to the access end;
The first processing units 512 are also used to be requested to determine user information according to the application information, to obtain institute State the third cryptographic Hash of user information;The third cryptographic Hash is broadcast to the block chain, and the user information is sent To the receiving end;
Described the second processing unit 522, is also used to receive the user information, obtains the third from the block chain and breathes out Uncommon value, signs to the third cryptographic Hash using the receiving end private key, obtains the 4th cryptographic Hash, by the 4th Hash Value is broadcast to the block chain, and is handled according to second parameter.
In embodiments of the present invention, the application information request carries the user identifier;
The first processing units 512 are also used to:
User information is determined according to the user identifier;
Hash operation is carried out to the user information, obtains the second operation result;
It is signed using the access end private key to second operation result, the third for obtaining the user information is breathed out Uncommon value.
In embodiments of the present invention, the access end further includes pretreatment unit, is used for:
Before generating informative abstract according to the classification of user and quantity, user information and user identifier are obtained;
User is drawn a portrait and classified in the behavioral data that access end generates, obtains the corresponding classification of user;
User information, user identifier and the corresponding classification of user are subjected to matching storage.
It should be understood that performed by each component of the information distribution system provided in an embodiment of the present invention based on block chain Function has been described in detail in a kind of information dispensing method based on block chain of above-described embodiment, no longer superfluous here It states.
Fig. 6 shows the exemplary architecture 600 of access end.
As shown in fig. 6, framework 600 may include terminal device 601,602,603, network 604 and server 605.Network 604 between terminal device 601,602,603 and server 605 to provide the medium of communication link.Network 604 may include Various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 601,602,603 and be interacted by network 604 with server 605, to receive or send out Send message etc..Various telecommunication customer end applications, such as the application of shopping class, net can be installed on terminal device 601,602,603 (merely illustrative) such as the application of page browsing device, searching class application, instant messaging tools, mailbox client, social platform softwares.
Terminal device 601,602,603 can be the various electronic equipments with display screen and supported web page browsing, packet Include but be not limited to smart phone, tablet computer, pocket computer on knee and desktop computer etc..
Server 605 can be to provide the server of various services, such as utilize terminal device 601,602,603 to user The shopping class website browsed provides the back-stage management server (merely illustrative) supported.Back-stage management server can be to reception To the data such as information query request analyze etc. processing, and by processing result (such as target push information, product letter Breath -- merely illustrative) feed back to terminal device.
It should be understood that the number of terminal device, network and server in Fig. 6 is only schematical.According to realization need It wants, can have any number of terminal device, network and server.
Below with reference to Fig. 7, it illustrates the computer systems 700 for the terminal device for being suitable for being used to realize the embodiment of the present invention Structural schematic diagram.Terminal device shown in Fig. 7 is only an example, function to the embodiment of the present invention and should not use model Shroud carrys out any restrictions.
As shown in fig. 7, computer system 700 includes central processing unit (CPU) 701, it can be read-only according to being stored in Program in memory (ROM) 702 or be loaded into the program in random access storage device (RAM) 703 from storage section 708 and Execute various movements appropriate and processing.In RAM 703, also it is stored with system 700 and operates required various programs and data. CPU 701, ROM 702 and RAM 703 are connected with each other by bus 704.Input/output (I/O) interface 705 is also connected to always Line 704.
I/O interface 705 is connected to lower component: the importation 706 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 707 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 708 including hard disk etc.; And the communications portion 709 of the network interface card including LAN card, modem etc..Communications portion 709 via such as because The network of spy's net executes communication process.Driver 710 is also connected to I/O interface 705 as needed.Detachable media 711, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 710, in order to read from thereon Computer program be mounted into storage section 708 as needed.
Particularly, disclosed embodiment, the process described above with reference to flow chart may be implemented as counting according to the present invention Calculation machine software program.For example, embodiment disclosed by the invention includes a kind of computer program product comprising be carried on computer Computer program on readable medium, the computer program include the program code for method shown in execution flow chart.? In such embodiment, which can be downloaded and installed from network by communications portion 709, and/or from can Medium 711 is dismantled to be mounted.When the computer program is executed by central processing unit (CPU) 701, system of the invention is executed The above-mentioned function of middle restriction.
It should be noted that computer-readable medium shown in the present invention can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the present invention, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In invention, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one unit of table, program segment or code, a part of said units, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in unit involved in the embodiment of the present invention can be realized by way of software, can also be by hard The mode of part is realized.Described unit also can be set in the processor, for example, can be described as: a kind of processor packet Include the first generation unit and first processing units.Wherein, the title of these units is not constituted under certain conditions to the unit The restriction of itself, for example, the first generation unit be also described as " informative abstract is generated according to the classification of user and quantity, The informative abstract is broadcast to the unit of block chain ".
As on the other hand, the present invention also provides a kind of computer-readable medium, which be can be Included in equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying equipment.Above-mentioned calculating Machine readable medium carries one or more program, when said one or multiple programs are executed by the equipment, makes Obtaining the equipment includes: to generate informative abstract according to the classification and quantity of user, and the informative abstract is broadcast to block chain;According to The application identification request determines user identifier, to obtain the first cryptographic Hash of the user identifier;Respond request is arranged to join Number, the respond request parameter include the first parameter;The respond request parameter and first cryptographic Hash are broadcast to described Block chain, and the user identifier is sent to the receiving end.
It should be understood that receiving end is identical as access end, it is only the unit that processor includes, and the function of realizing is different, Details are not described herein.
Above-mentioned specific embodiment, does not constitute a limitation on the scope of protection of the present invention.Those skilled in the art should be bright It is white, design requirement and other factors are depended on, various modifications, combination, sub-portfolio and substitution can occur.It is any Made modifications, equivalent substitutions and improvements etc. within the spirit and principles in the present invention, should be included in the scope of the present invention Within.

Claims (12)

1. a kind of information dispensing method based on block chain characterized by comprising
Access end generates informative abstract according to the classification and quantity of user, and the informative abstract is broadcast to block chain;
Receiving end generates application identification request according to the informative abstract on the block chain, and by the application identification request It is sent to the access end;
The access end determines user identifier according to the application identification request, to obtain the first Hash of the user identifier Value;Respond request parameter is set, and the respond request parameter includes the first parameter;By the respond request parameter and described first Cryptographic Hash is broadcast to the block chain, and the user identifier is sent to the receiving end;
The receiving end receives the user identifier, obtains the second Hash according to first cryptographic Hash on the block chain Value, is broadcast to the block chain for second cryptographic Hash, and handled according to first parameter.
2. the method according to claim 1, wherein it is described application identification request carry the user classification and Quantity;
User identifier is determined according to the application identification request, to obtain the first cryptographic Hash of the user identifier, comprising:
User identifier is determined according to the classification of the user and quantity;
Hash operation is carried out to the user identifier, obtains the first operation result;
It is signed using access end private key to first operation result, obtains the first cryptographic Hash of the user identifier.
3. according to the method described in claim 2, it is characterized in that, being obtained according to first cryptographic Hash on the block chain Second cryptographic Hash, comprising:
First cryptographic Hash is obtained from the block chain, is signed using receiving end private key to first cryptographic Hash, Obtain the second cryptographic Hash.
4. according to the method described in claim 3, it is characterized in that, the respond request parameter further includes the second parameter;
After being handled according to first parameter, further includes:
The receiving end generates application information request according to the user identifier, and application information request is sent to described Access end;
The access end requests to determine user information according to the application information, to obtain the third Hash of the user information Value;The third cryptographic Hash is broadcast to the block chain, and the user information is sent to the receiving end;
The receiving end receives the user information, obtains the third cryptographic Hash from the block chain, uses the receiving end Private key signs to the third cryptographic Hash, obtains the 4th cryptographic Hash, and the 4th cryptographic Hash is broadcast to the block chain, And it is handled according to second parameter.
5. according to the method described in claim 4, it is characterized in that, application information request carries the user identifier;
It is requested to determine user information according to the application information, to obtain the third cryptographic Hash of the user information, comprising:
User information is determined according to the user identifier;
Hash operation is carried out to the user information, obtains the second operation result;
It is signed using the access end private key to second operation result, obtains the third Hash of the user information Value.
6. according to the method described in claim 5, it is characterized in that, generating information according to the classification and quantity of user in access end Before abstract, further includes:
Obtain user information and user identifier;
User is drawn a portrait and classified in the behavioral data that access end generates, obtains the corresponding classification of user;
User information, user identifier and the corresponding classification of user are subjected to matching storage.
7. a kind of information distribution system based on block chain, which is characterized in that including access end and receiving end;
The access end includes:
The informative abstract is broadcast to area for generating informative abstract according to the classification and quantity of user by the first generation unit Block chain;
First processing units, for determining user identifier according to the application identification request, to obtain the user identifier First cryptographic Hash;Respond request parameter is set, and the respond request parameter includes the first parameter;By the respond request parameter and First cryptographic Hash is broadcast to the block chain, and the user identifier is sent to the receiving end;
The receiving end includes:
Second generation unit, for generating application identification request according to the informative abstract on the block chain, and will be described Application identification request is sent to the access end;
The second processing unit obtains according to first cryptographic Hash on the block chain for receiving the user identifier Second cryptographic Hash is broadcast to the block chain, and is handled according to first parameter by two cryptographic Hash.
8. system according to claim 7, which is characterized in that it is described application identification request carry the user classification and Quantity;
The first processing units are also used to:
User identifier is determined according to the classification of the user and quantity;
Hash operation is carried out to the user identifier, obtains the first operation result;
It is signed using access end private key to first operation result, obtains the first cryptographic Hash of the user identifier.
9. system according to claim 8, which is characterized in that described the second processing unit is also used to:
First cryptographic Hash is obtained from the block chain, is signed using receiving end private key to first cryptographic Hash, Obtain the second cryptographic Hash.
10. system according to claim 9, which is characterized in that the respond request parameter further includes the second parameter;
Second generation unit is also used to after being handled according to first parameter, raw according to the user identifier It is requested at application information, and application information request is sent to the access end;
The first processing units are also used to be requested to determine user information according to the application information, to obtain the user The third cryptographic Hash of information;The third cryptographic Hash is broadcast to the block chain, and the user information is sent to described Receiving end;
Described the second processing unit is also used to receive the user information, obtains the third cryptographic Hash from the block chain, makes It is signed with the receiving end private key to the third cryptographic Hash, obtains the 4th cryptographic Hash, the 4th cryptographic Hash is broadcasted It is handled to the block chain, and according to second parameter.
11. system according to claim 10, which is characterized in that the application information request carries the user identifier;
The first processing units are also used to:
User information is determined according to the user identifier;
Hash operation is carried out to the user information, obtains the second operation result;
It is signed using the access end private key to second operation result, obtains the third Hash of the user information Value.
12. system according to claim 11, which is characterized in that the access end further includes pretreatment unit, is used for:
Before generating informative abstract according to the classification of user and quantity, user information and user identifier are obtained;
User is drawn a portrait and classified in the behavioral data that access end generates, obtains the corresponding classification of user;
User information, user identifier and the corresponding classification of user are subjected to matching storage.
CN201910090502.0A 2019-01-30 2019-01-30 Information distribution method and system based on block chain Active CN109831501B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910090502.0A CN109831501B (en) 2019-01-30 2019-01-30 Information distribution method and system based on block chain
PCT/CN2019/130315 WO2020156008A1 (en) 2019-01-30 2019-12-31 Blockchain-based information distribution method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910090502.0A CN109831501B (en) 2019-01-30 2019-01-30 Information distribution method and system based on block chain

Publications (2)

Publication Number Publication Date
CN109831501A true CN109831501A (en) 2019-05-31
CN109831501B CN109831501B (en) 2020-09-29

Family

ID=66863002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910090502.0A Active CN109831501B (en) 2019-01-30 2019-01-30 Information distribution method and system based on block chain

Country Status (2)

Country Link
CN (1) CN109831501B (en)
WO (1) WO2020156008A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259070A (en) * 2019-11-28 2020-06-09 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111339206A (en) * 2020-03-11 2020-06-26 中国建设银行股份有限公司 Data sharing method and device based on block chain
WO2020156008A1 (en) * 2019-01-30 2020-08-06 京东数字科技控股有限公司 Blockchain-based information distribution method and system
CN112751850A (en) * 2020-12-29 2021-05-04 中国联合网络通信集团有限公司 Sharing method and device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112559977A (en) * 2020-12-10 2021-03-26 广州宇中网络科技有限公司 Block chain-based digital content distributed transmission management method
CN114221806B (en) * 2021-12-14 2023-11-03 深圳市电子商务安全证书管理有限公司 Block chain-based data storage method, device, computer equipment and medium

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1971075A4 (en) * 2005-12-31 2009-05-20 Huawei Tech Co Ltd An information issuing system, a public media information issuing system and an issuing method
CN103024014A (en) * 2012-12-03 2013-04-03 北京京东世纪贸易有限公司 Method and system for distributing and processing mass data passing through message queues
CN107332908A (en) * 2017-07-03 2017-11-07 网宿科技股份有限公司 A kind of data transmission method and its system
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN107451869A (en) * 2017-08-07 2017-12-08 百度在线网络技术(北京)有限公司 Method and apparatus for pushed information
CN108121498A (en) * 2016-11-28 2018-06-05 ***通信集团公司 The method and apparatus that a kind of learning records based on block chain technology preserve
US20180189878A1 (en) * 2016-12-29 2018-07-05 Coinplug, Inc. Method for providing united point service using updated status of balance database with blockchain and server using the same
CN108647966A (en) * 2018-05-09 2018-10-12 深圳市融讯科技有限公司 A kind of data interactive method and device based on block chain
CN108681891A (en) * 2018-05-24 2018-10-19 深圳前海益链网络科技有限公司 A kind of Multiple Currencies tranaction costs collection methods based on block chain
CN108846653A (en) * 2018-06-15 2018-11-20 上海交通大学 Big data secure sharing method and system based on block chain
CN108921616A (en) * 2018-07-06 2018-11-30 上海邑游网络科技有限公司 Accessing wirelessly based on block chain accesses shared, charge shared system and method
CN109102299A (en) * 2018-08-01 2018-12-28 腾讯科技(深圳)有限公司 Resource transfers data managing method, device and storage medium
CN109194628A (en) * 2018-08-16 2019-01-11 广东工业大学 Manufacturing personnel's approaches to IM, system and electronic equipment and storage medium
CN109190409A (en) * 2018-09-14 2019-01-11 北京京东金融科技控股有限公司 Record method, apparatus, equipment and the readable storage medium storing program for executing of information propagation path
CN109246137A (en) * 2018-10-23 2019-01-18 北京航空航天大学 The safety protecting method and device of naval warfare data based on block chain
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10509891B2 (en) * 2017-05-03 2019-12-17 Cisco Technology, Inc. Method and system for content and service sharing
CN107820690B (en) * 2017-08-21 2020-11-10 达闼科技成都有限公司 Information selection method and device, electronic equipment and computer readable storage medium
CN108737361B (en) * 2018-01-25 2022-01-04 阳光保险集团股份有限公司 Data verification method based on block chain
CN109831501B (en) * 2019-01-30 2020-09-29 京东数字科技控股有限公司 Information distribution method and system based on block chain

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1971075A4 (en) * 2005-12-31 2009-05-20 Huawei Tech Co Ltd An information issuing system, a public media information issuing system and an issuing method
CN103024014A (en) * 2012-12-03 2013-04-03 北京京东世纪贸易有限公司 Method and system for distributing and processing mass data passing through message queues
CN108121498A (en) * 2016-11-28 2018-06-05 ***通信集团公司 The method and apparatus that a kind of learning records based on block chain technology preserve
US20180189878A1 (en) * 2016-12-29 2018-07-05 Coinplug, Inc. Method for providing united point service using updated status of balance database with blockchain and server using the same
CN107332908A (en) * 2017-07-03 2017-11-07 网宿科技股份有限公司 A kind of data transmission method and its system
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN107451869A (en) * 2017-08-07 2017-12-08 百度在线网络技术(北京)有限公司 Method and apparatus for pushed information
CN108647966A (en) * 2018-05-09 2018-10-12 深圳市融讯科技有限公司 A kind of data interactive method and device based on block chain
CN108681891A (en) * 2018-05-24 2018-10-19 深圳前海益链网络科技有限公司 A kind of Multiple Currencies tranaction costs collection methods based on block chain
CN108846653A (en) * 2018-06-15 2018-11-20 上海交通大学 Big data secure sharing method and system based on block chain
CN108921616A (en) * 2018-07-06 2018-11-30 上海邑游网络科技有限公司 Accessing wirelessly based on block chain accesses shared, charge shared system and method
CN109102299A (en) * 2018-08-01 2018-12-28 腾讯科技(深圳)有限公司 Resource transfers data managing method, device and storage medium
CN109194628A (en) * 2018-08-16 2019-01-11 广东工业大学 Manufacturing personnel's approaches to IM, system and electronic equipment and storage medium
CN109190409A (en) * 2018-09-14 2019-01-11 北京京东金融科技控股有限公司 Record method, apparatus, equipment and the readable storage medium storing program for executing of information propagation path
CN109255255A (en) * 2018-10-22 2019-01-22 北京锐安科技有限公司 Data processing method, device, equipment and storage medium based on block chain
CN109246137A (en) * 2018-10-23 2019-01-18 北京航空航天大学 The safety protecting method and device of naval warfare data based on block chain

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020156008A1 (en) * 2019-01-30 2020-08-06 京东数字科技控股有限公司 Blockchain-based information distribution method and system
CN111259070A (en) * 2019-11-28 2020-06-09 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111259070B (en) * 2019-11-28 2024-04-19 国网山东省电力公司 Method and related device for storing and acquiring service data
CN111339206A (en) * 2020-03-11 2020-06-26 中国建设银行股份有限公司 Data sharing method and device based on block chain
CN111339206B (en) * 2020-03-11 2023-07-18 建信金融科技有限责任公司 Block chain-based data sharing method and device
CN112751850A (en) * 2020-12-29 2021-05-04 中国联合网络通信集团有限公司 Sharing method and device

Also Published As

Publication number Publication date
CN109831501B (en) 2020-09-29
WO2020156008A1 (en) 2020-08-06

Similar Documents

Publication Publication Date Title
CN109831501A (en) Information dispensing method and system based on block chain
US11423374B2 (en) Application of dynamic tokens
CN109191212A (en) Determine method, apparatus, equipment and the computer readable storage medium for sharing user
CN105279631A (en) Article distribution method and apparatus
CN105719171A (en) Association management system and method used for electronic commerce
CN109583945A (en) A kind of method and apparatus of advertising resource distribution
KR20190120940A (en) Platform for sharing culture contents based on cryptocurrency compensation and the method there0f
CN103942702A (en) System and method for carrying out e-business based on electronic business cards
Shang et al. Need for speed, but how much does it cost? Unpacking the fee‐speed relationship in Bitcoin transactions
CN111930834A (en) Block chain based commenting method and device
CN108874836A (en) The method and apparatus for shifting electronic ticket
KR20200145044A (en) The service method of online market through matching between users based on creators
KR101104557B1 (en) The system for advertisement service using the on-line contents and method for the same
CN114445128A (en) Card ticket management method and device, electronic equipment and computer readable medium
KR102260176B1 (en) System for providing incentive according to advertisement result of content and method thereof
US20130054398A1 (en) Management of direct sales activities on networked mobile computing devices
KR20140015867A (en) System and method for managing works using internet
WO2016036085A1 (en) Electronic commerce management server using url and management method therefor
WO2016036083A1 (en) Electronic commerce management server using url and management method therefor
KR20200048401A (en) A method for providing transaction services of advertisement traffic networks
KR20210022422A (en) System for generating online community based on search word
CN113763025B (en) Pricing management method and device
KR102280438B1 (en) System for transacting digital contents and method thereof
KR20000018250A (en) Realizable method of application program to internet
Bachmann et al. Deti: A decentralized ticketing management platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Patentee after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Patentee before: Jingdong Digital Technology Holding Co.,Ltd.

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Patentee after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Patentee before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

CP01 Change in the name or title of a patent holder