CN112560057B - Business social system based on block chain and IPFS technology - Google Patents

Business social system based on block chain and IPFS technology Download PDF

Info

Publication number
CN112560057B
CN112560057B CN202011488895.XA CN202011488895A CN112560057B CN 112560057 B CN112560057 B CN 112560057B CN 202011488895 A CN202011488895 A CN 202011488895A CN 112560057 B CN112560057 B CN 112560057B
Authority
CN
China
Prior art keywords
personal
enterprise
user
resume
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011488895.XA
Other languages
Chinese (zh)
Other versions
CN112560057A (en
Inventor
黄国良
刘炜
张翼
黄盛威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Great China Blockchain Technology Co ltd
Original Assignee
Shenzhen Great China Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Great China Blockchain Technology Co ltd filed Critical Shenzhen Great China Blockchain Technology Co ltd
Priority to CN202011488895.XA priority Critical patent/CN112560057B/en
Publication of CN112560057A publication Critical patent/CN112560057A/en
Application granted granted Critical
Publication of CN112560057B publication Critical patent/CN112560057B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Accounting & Taxation (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Primary Health Care (AREA)
  • Game Theory and Decision Science (AREA)
  • Data Mining & Analysis (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a business social system based on a block chain and IPFS technology, and relates to the field of block chains. A business social system based on blockchain and IPFS technology, comprising: the personal login module is used for a plurality of personal users to respectively input personal information and personal passwords to create personal accounts and simultaneously distribute a personal key pair and a personal address for the personal users, wherein the personal key pair comprises a personal public key and a personal private key; and the file encryption module is used for encrypting the personal information after the user real name verification passes through the personal public key pair to generate a resume file and uploading the resume file to the IPFS system, and the IPFS system generates a resume summary according to the resume file and links the resume summary and the timestamp to the bottom layer block chain of the library chain cloud. The method and the system can promote business social contact and improve the safety of the business social contact and the user satisfaction.

Description

Business social system based on block chain and IPFS technology
Technical Field
The invention relates to the technical field of block chains, in particular to a business social system based on a block chain and IPFS technology.
Background
Commercial socialization is a business activity in the socio-economic field, by which business and entrepreneurs build business relationships, discover, create, or practice business opportunities, share information, and seek potential business partners.
The existing commercial social software utilizing the internet technology is provided by a central service provider, users of a commercial social platform are delivered with a large amount of information every day, and a large amount of advertisements and irrelevant information prompt many users to lose the interest of using the internet for commercial social. In a plurality of network domain information, users can not spend a great deal of time to classify the information in order to distinguish junk information and useful information, and the customer satisfaction is seriously reduced.
In addition, the network is filled with various information whose authenticity is not to be verified. Although the internet platforms provide a reporting way for supervision of people and freeze and cancel illegal users, the measures still prevent new accounts from continuously releasing false information again.
In addition to the above problems, personal information of users is easily leaked due to improper management, so that users receive harassment information including calls, mails and express packages from time to time.
Therefore, there is a need for a business social system that can solve the above problems.
Disclosure of Invention
The invention aims to provide a business social system based on a block link and IPFS technology, which can promote business social interaction and improve the safety and the user satisfaction of the business social interaction.
The embodiment of the invention is realized by the following steps:
the embodiment of the application provides a business social system based on a block chain and IPFS technology, which comprises: the personal login module is used for a plurality of personal users to respectively input personal information and personal passwords to create personal accounts and simultaneously distribute personal key pairs and personal addresses for the personal users, wherein the personal key pairs comprise personal public keys and personal private keys;
the enterprise login module is used for a plurality of enterprise users to respectively input enterprise information and enterprise passwords to create enterprise accounts and distribute enterprise key pairs and enterprise addresses for the enterprise users, wherein the enterprise key pairs comprise enterprise public keys and enterprise private keys;
the user authentication module is used for carrying out user real-name authentication according to the personal information or the enterprise information;
the file encryption module is used for encrypting the personal information after the user real name verification passes through the personal public key pair to generate a resume file and uploading the resume file to an IPFS (Internet protocol file system), the IPFS generates a resume abstract according to the resume file, and the resume abstract and the timestamp are linked to a bottom layer block chain of the library chain cloud;
the business card generating module is used for selecting one or more items of contents to generate a business card file through the personal information, and chaining the business card file and the timestamp on a bottom layer block chain of the library chain cloud;
the user decryption module is used for reading the resume file in the IPFS system by the individual user through the resume abstract and decrypting the resume file by using the individual private key to acquire the individual information;
the user matching module is used for matching the resume files of the individual users with a plurality of individual users through AI data analysis and pushing the resume files to one or more other matched individual users;
the chat authority module is used for distributing pass to different individual users according to various contents in the resume files, and the pass is used for authorizing each individual user to check the resume files of other individual users;
the enterprise publishing module is used for publishing the advertisement content by the individual user, encrypting the advertisement content through the enterprise address to generate an authentication advertisement and uploading the authentication advertisement to the IPFS system, and the IPFS system generates an advertisement abstract according to the authentication advertisement and links the advertisement abstract and the timestamp to the underlying layer block chain of the library chain cloud;
the signature request module is used for submitting a signature request of the resume file to an enterprise user by the individual user, generating a digital signature by the enterprise user according to the signature request by using the individual private key and a symmetric encryption algorithm AES (advanced encryption Standard), encrypting the resume file by using a public key, and chaining the digital signature to a bottom layer block chain of the library chain cloud;
and the intelligent contract module is used for setting the resume profiles of the individual users for other individual users to check the number of the required passes, receiving the passes and providing the resume profiles of the other individual users.
In some embodiments of the present invention, the individual user or the enterprise user binds the individual address or the enterprise address through a mobile phone number.
In some embodiments of the present invention, the personal information includes any one or more of a scholarly, professional ability, work experience, and personal image, and the enterprise information includes any one or more of an enterprise profile, corporate qualifications, and corporate image.
In some embodiments of the present invention, the user authentication module is connected to the user end through an application program interface of the management end to obtain the personal information or the enterprise information for real-name authentication.
In some embodiments of the present invention, the chat permission module distributes the same number of passes according to the number of content items in the business card file, and authorizes each individual user to view part or all of the content of the business card file of other individual users according to the number of passes.
In some embodiments of the present invention, the chat permission module sells the pass to the individual user by a fee.
In some embodiments of the present invention, communication is implemented between different individual users/between each individual user and a business user by using a P2P network domain, wherein information is encrypted by acquiring the individual address and the individual key pair/the business address and the business key pair of the other party and then sent to the other party.
In some embodiments of the present invention, the business social system based on the blockchain and IPFS technology includes an enterprise index module, where the enterprise index module is used for an individual user to search different enterprise users for communication.
In some embodiments of the present invention, the enterprise indexing module is configured to index the enterprise address according to the enterprise name for the individual user.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
the embodiment of the application provides a business social system based on a block chain and IPFS technology, which comprises: a personal login module for multiple personal users to respectively input personal information and personal password to create individualsThe account number simultaneously distributes an individual key pair and an individual address for an individual user, wherein the individual key pair comprises an individual public key and an individual private key; the enterprise login module is used for a plurality of enterprise users to respectively input enterprise information and enterprise passwords to create enterprise accounts and distribute enterprise key pairs and enterprise addresses for the enterprise users, wherein the enterprise key pairs comprise enterprise public keys and enterprise private keys; the user authentication module is used for carrying out user real-name authentication according to the personal information or the enterprise information; the file encryption module is used for encrypting the personal information after the user real name verification passes through the personal public key pair to generate a resume file and uploading the resume file to an IPFS (Internet protocol file system), the IPFS generates a resume summary according to the resume file and links the resume summary and the timestamp to a bottom layer block chain of the library chain cloud; the business card generating module is used for selecting one or more contents to generate a business card file through the personal information, and chaining the business card file and the timestamp to a bottom layer module chain of the library chain cloud; the user decryption module is used for reading the resume file in the IPFS system through the resume abstract by an individual user and decrypting the resume file by using the individual private key to acquire the personal information; the user matching module is used for analyzing and matching the resume files of the individual users with a plurality of individual users through AI data and pushing the resume files to one or more other individual users matched with each other; the chat authority module is used for distributing pass to different individual users according to various contents in the resume files, and the pass is used for authorizing each individual user to check the resume files of other individual users; an enterprise publishing module for the individual user to publish the advertisement content through the aboveEnterprise addressEncrypting the advertisement content to generate an authentication advertisement and uploading the authentication advertisement to an IPFS (Internet protocol platform System), wherein the IPFS generates an advertisement abstract according to the authentication advertisement, and meanwhile, the advertisement abstract and the timestamp are linked to a bottom layer block chain of a library chain cloud; a signature request module used for submitting the signature request of the resume file to the enterprise user by the individual user, the enterprise user generates a digital signature by the individual private key according to the signature request and the symmetric encryption algorithm AES and uses the public keyEncrypting the resume file, and chaining the digital signature to a bottom layer block chain of the library chain cloud; and the intelligent contract module is used for setting the resume profiles of the individual users for other individual users to check the number of the required passes, receiving the passes and providing the resume profiles of the other individual users.
According to the embodiment of the application, the personal login module is used for logging in the personal user, so that the personal user can conveniently use the personal information and the personal password and simultaneously distribute the personal key pair and the personal address to different personal users, the enterprise login module is used for logging in the enterprise user, so that the enterprise user can conveniently use the enterprise information and the enterprise password and simultaneously distribute the enterprise key pair and the enterprise address of different enterprise users, and the safety of business social contact is improved; the user real-name authentication is carried out through the user authentication module according to the personal information or the enterprise information, so that the safety of commercial social contact is further improved; personal information is encrypted through a personal public key pair through a file encryption module to generate a resume file, so that a resume abstract is generated by using IPFS for other personal users to check, and the personal information of the personal users is prevented from being stolen; the business card generating module selects one or more items of content from the personal information to generate a business card file, so that different personal users or enterprise users can conveniently screen user information, and the development of business social contact is promoted; the user decryption module reads the resume file in the IPFS system by using the resume abstract as a certificate and decrypts the resume file by using the personal private key to acquire personal information, so that other personal users or enterprise users except the user can be prevented from viewing the personal information, and the information security is improved; resume archives of different individual users are sent to other individual users through the user matching module, so that recruitment and employment of personnel are realized by utilizing commercial social contact, and the development of the commercial social contact is promoted; the pass is distributed to other subsidized individual users through the chat authority module according to various contents in the resume file, so that information interaction among different individual users is met through the pass, the effect of providing different social services according to the information disclosure degree is achieved, and the safety of commercial social contact is improved; the enterprise publishing module is used for the individual user to publish the advertisement content, and the enterprise address is used for encrypting the advertisement content to generate the authentication advertisement, so that the enterprise assists the individual user to publish the authentication advertisement recruiter, the individual user can conveniently screen the authenticity of the advertisement, and the safety of commercial social contact is improved; the personal user submits the resume files of the personal user or other people to the enterprise through the signature request module, and the enterprise user encrypts the resume files by using the public key, so that the efficiency and the safety of commercial social contact are improved; the intelligent contract module sets the permission of resume archives for other individual users to check through the threshold of the pass, and the safety of business social contact is improved. The personal information or the enterprise information is encrypted through the personal public key pair and the enterprise public key of the personal login module and the enterprise login module, and the identities of different personal users or enterprise users are identified through the personal addresses and the enterprise information. The scheme is convenient for customers to use, and improves the safety and the efficiency, thereby improving the satisfaction degree of individuals and enterprise users.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic diagram of a business social system based on a blockchain and IPFS technology according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly, e.g., as being either fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments and features of the embodiments described below can be combined with one another without conflict.
Examples
Referring to fig. 1, fig. 1 is a schematic diagram illustrating a business social system based on a blockchain and IPFS technology according to an embodiment of the present disclosure. A business social system based on blockchain and IPFS technology, comprising: the personal login module is used for a plurality of personal users to respectively input personal information and personal passwords to create personal accounts and simultaneously distribute personal key pairs and personal addresses for the personal users, wherein the personal key pairs comprise personal public keys and personal private keys;
the enterprise login module is used for a plurality of enterprise users to respectively input enterprise information and enterprise passwords to create enterprise accounts and distribute enterprise key pairs and enterprise addresses for the enterprise users, wherein the enterprise key pairs comprise enterprise public keys and enterprise private keys;
the user authentication module is used for carrying out user real-name authentication according to the personal information or the enterprise information;
the file encryption module is used for encrypting the personal information after the user real name verification passes through the personal public key pair to generate a resume file and uploading the resume file to an IPFS (Internet protocol file system), the IPFS generates a resume abstract according to the resume file, and the resume abstract and the timestamp are linked to a bottom layer block chain of the library chain cloud;
the business card generating module is used for selecting one or more items of contents to generate a business card file through the personal information, and chaining the business card file and the timestamp on a bottom layer block chain of the library chain cloud;
the user decryption module is used for reading the resume file in the IPFS system through the resume abstract by an individual user and decrypting the resume file by using the individual private key to acquire the personal information;
the user matching module is used for analyzing and matching the resume files of the individual users with a plurality of individual users through AI data and pushing the resume files to one or more other individual users matched with each other;
the chat authority module is used for distributing pass to different individual users according to various contents in the resume files, and the pass is used for authorizing each individual user to check the resume files of other individual users;
the enterprise publishing module is used for publishing the advertisement content by the individual user, encrypting the advertisement content through the enterprise address to generate an authentication advertisement and uploading the authentication advertisement to the IPFS system, and the IPFS system generates an advertisement abstract according to the authentication advertisement and links the advertisement abstract and the timestamp to the underlying layer block chain of the library chain cloud;
the signature request module is used for submitting a signature request of the resume file to an enterprise user by the individual user, generating a digital signature by the enterprise user according to the signature request by using the individual private key and a symmetric encryption algorithm AES (advanced encryption Standard), encrypting the resume file by using a public key, and chaining the digital signature to a bottom layer block chain of the library chain cloud;
and the intelligent contract module is used for setting the resume profiles of the individual users for other individual users to check the number of the required passes, receiving the passes and providing the resume profiles of the other individual users.
In detail, the personal login module is used for a plurality of individual users to respectively input personal information and the personal module to create personal accounts and distribute personal key pairs and personal addresses for the respective personal accounts. Likewise, the enterprise login module creates an enterprise account for the enterprise user and distributes the enterprise key pair and the enterprise address. In detail, the individual key pair includes an individual public key and an individual private key, and the enterprise key pair includes an enterprise public key and an enterprise private key. Where a public key is a non-secret half of a key pair used with a public key algorithm, typically used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with a corresponding private key.
In detail, the user authentication module is in communication connection with the personal login module and the enterprise login module respectively to perform user real-name authentication according to the personal information or the enterprise information, so that the authenticated personal user and the enterprise user can upload real information. Optionally, the communication mode described in this embodiment may be a network, bluetooth, a wire, a computer program, or other modes to implement data transmission, where different modules may be implemented by using different clients.
In detail, the archive encryption module is used for encrypting the personal information after the user real name verification passes through a personal public key pair to generate the resume archive. The file encryption module can be in communication connection with the personal login module through the user authentication module, so that personal information can be acquired. In detail, the resume file is uploaded to the IPFS system, so that the IPFS system generates the resume summary according to the resume file and links the resume summary. The IPFS (inter platform File System) is a distributed network, and the Internet speed is higher, and the Internet is safer and more open by using a point-to-point hypermedia protocol. The resume abstract is generated through contents extracted from the resume archive. Optionally, the resume summary uses a CID file for data transmission. The block chain is utilized to play a role in preventing tampering. The file encryption module can be in communication connection with the personal login module, so that personal information can be acquired.
In detail, the business card generating module is used for selecting one or more items of content to generate a business card file through personal information, and performing block chaining on the business card file and the timestamp, so that the business card file is conveniently displayed to other personal users and enterprise users. The business card generating module can be in communication connection with the personal login module, so that personal information can be acquired.
In detail, the user decryption module is used for reading the resume file in the IPFS system through the resume abstract by the individual user, and decrypting the resume file by using the individual private key to acquire the individual information. The user decryption module can acquire the resume file through communication connection with the IPFS system, so that more real and safe information is acquired. The user decryption module is in communication connection with the personal login module to obtain the personal private key.
In detail, the user matching module is used for matching the resume profile of each individual user with a plurality of individual users through AI data analysis, and pushing the resume profile to one or more other individual users matched with each other. The user matching module can be in communication connection with different user sides of the user login module, so that data transmission is achieved between different individual users. Alternatively, AI data analysis may calculate reading volume through the circulation of passes between different individual users.
In detail, the chat authority module is used for distributing a pass to different individual users according to various contents in the resume profile, wherein the pass is used for authorizing each individual user to view the resume profiles of other individual users. The chat permission module can acquire the resume file through communication connection with the IPFS system, and the chat permission module can be connected with the personal login module, so that the pass is sent to different personal users.
Optionally, the enterprise publishing module may be in communication connection with the personal login module, so that the individual user can publish the advertisement content by using the enterprise publishing module after logging in. The method comprises the steps that advertisement contents are encrypted through an enterprise address to generate an authentication advertisement and the authentication advertisement is uploaded to an IPFS (Internet protocol multimedia system), the IPFS generates an advertisement abstract according to the authentication advertisement for other users to check, and meanwhile the advertisement abstract and a time stamp are backed up through an uplink database. In detail, the advertisement content published by the enterprise publishing module may include enterprise information, and optionally, the enterprise publishing module is in communication connection with the enterprise login module, so as to receive the enterprise information sent by the enterprise user.
Optionally, the personal login module may be in communication connection with the enterprise login module through the signature request module, so that the personal user submits a signature request to the enterprise user according to the resume profile. And the enterprise user generates a digital signature by the personal private key according to the signature request and a symmetric encryption algorithm AES, and encrypts the resume file by the public key. The personal login module can acquire the resume file through communication connection with the IPFS system. Optionally, after the resume archive is digitally signed, the resume archive is subjected to data transmission after encryption between different personal users or between the personal user and the enterprise user, so that the personal users can conveniently decrypt by using a personal private key, and whether a data source is safe or not is identified by using a user public key. The public key can be hashed to obtain a hash value, and the transmitted data is packaged so as to be encrypted.
In detail, the intelligent contract module is used for setting resume profiles of individual users for other individual users to check the number of required passes, so that the passes submitted by the individual users are frozen in a mortgage mode, and the resume profiles of the other individual users are checked by the individual users. The intelligent contract module can be in communication connection with my personal login modules of different user terminals to receive and send the pass, and can acquire the resume profile through communication connection with the IPFS system.
In some embodiments of the present invention, the individual user or the enterprise user binds the individual address or the enterprise address through a mobile phone number.
In detail, after the personal user or the enterprise user logs in through the personal login module or the enterprise login module, the personal address or the enterprise address is bound by the mobile phone number, so that the login and user verification module can conveniently perform real-name authentication.
In some embodiments of the present invention, the personal information comprises any one or more of a scholarly calendar, professional ability, work experience, and a personal image, and the enterprise information comprises any one or more of an enterprise profile, corporate qualifications, and corporate image.
In detail, the personal information can be basic information for the employment work, and the personal user can select various contents through the business card generating module to generate a business card file so as to be conveniently displayed to other personal users.
In some embodiments of the present invention, the user authentication module is connected to the user end through an application program interface of the management end to obtain the personal information or the enterprise information for real-name authentication.
In detail, the user authentication module is connected to the user terminal through an application program interface of the management terminal to obtain personal information input by the user terminal when the personal user or the enterprise user logs in through the user terminal. Optionally, when the user enters the system through the user side, the user logs in through the personal login module. The management personnel can realize that the user authentication module is in communication connection with the personal login module or the enterprise login module of the user side through the management side, so that the personal information or the enterprise information can be acquired.
In some embodiments of the present invention, the chat permission module distributes the same number of passes according to the number of content items in the business card file, and authorizes each individual user to view part or all of the content of the business card file of other individual users according to the number of passes.
In detail, the chat authority module distributes corresponding number of passes according to the number of items of the content in the business card files, so that other individual users can check various contents in the business card files of other people by using the passes according to the number of the passes, and the standardability and the safety of business social contact are improved.
In some embodiments of the present invention, the chat permission module sells the pass to the individual user by a fee.
In detail, the chat permission module sells the pass to the individual user by charging, which is convenient for managing and improving the development of the commercial social system.
In some embodiments of the present invention, communication between different individual users/between individual users and enterprise users is implemented by using a P2P network domain, wherein information is encrypted by acquiring the individual address and the individual key pair/the enterprise address and the enterprise key pair of the opposite party and then sent to the opposite party.
The communication is realized by utilizing the P2P network domain, the safety of economic transaction in commercial social contact is improved, and the network safety environment of the commercial social contact system is maintained. Optionally, when information is transmitted between individual users and between an individual user and an enterprise user, the individual user encrypts the sent information through the individual address and the individual key, and the enterprise user encrypts the sent information through the enterprise address and the enterprise key, so that the security of data transmission is improved.
In some embodiments of the present invention, the business social system based on the block chain and IPFS technology includes an enterprise indexing module, and the enterprise indexing module is used for an individual user to search different enterprise users to realize communication.
In detail, the individual user searches the enterprise user through the enterprise indexing module and can index by using the public items in the enterprise information. The personal login module is in communication connection with the enterprise login module through the enterprise index module, so that data transmission is achieved.
In some embodiments of the present invention, the enterprise indexing module is configured to index the enterprise address by the name of the enterprise for the individual user.
In detail, the enterprise information includes an enterprise name and an enterprise address, wherein the enterprise information is disclosed among the individual users through the individual information, so that the enterprise information is conveniently searched by other individual users.
It will be appreciated that the architecture shown in FIG. 1 is merely illustrative, and that a business social system based on blockchain and IPFS techniques may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The apparatus embodiments described above are merely illustrative and, for example, the block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams, and combinations of blocks in the block diagrams, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as separate products. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In summary, the embodiments of the present application provide a business social system based on a block chain and IPFS technology:
according to the embodiment of the application, the personal login module is used for logging in the personal user, so that the personal user can conveniently use the personal information and the personal password and simultaneously distribute the personal key pair and the personal address to different personal users, the enterprise login module is used for logging in the enterprise user, so that the enterprise user can conveniently use the enterprise information and the enterprise password and simultaneously distribute the enterprise key pair and the enterprise address of different enterprise users, and the safety of business social contact is improved; the user real-name authentication is carried out through the user authentication module according to the personal information or the enterprise information, so that the safety of commercial social contact is further improved; personal information is encrypted through a personal public key pair through a file encryption module to generate a resume file, so that a resume abstract is generated by using IPFS for other personal users to check, and the personal information of the personal users is prevented from being stolen; the business card generating module selects one or more items of content from the personal information to generate a business card file, so that different personal users or enterprise users can conveniently screen user information, and the development of business social contact is promoted; the user decryption module reads the resume file in the IPFS system by using the resume abstract as a certificate and obtains personal information through decryption of a personal private key, so that other personal users or enterprise users except the user can be prevented from viewing the personal information, and the information security is improved; resume archives of different individual users are sent to other individual users through the user matching module, so that recruitment and employment of personnel are realized by utilizing commercial social contact, and the development of the commercial social contact is promoted; pass is distributed to other subsidized individual users through the chat authority module according to various contents in the resume file, so that information interaction among different individual users is met by using the pass, the effect of providing different social services according to the information disclosure degree is realized, and the safety of commercial social contact is further improved; the enterprise publishing module is used for the individual user to publish the advertisement content, and the enterprise address is used for encrypting the advertisement content to generate the authentication advertisement, so that the enterprise assists the individual user to publish the authentication advertisement recruiter, the individual user can conveniently screen the authenticity of the advertisement, and the safety of commercial social contact is improved; the individual user submits the resume file of the individual user or others to the enterprise through the signature request module, and the enterprise user encrypts the resume file by using the public key, so that the efficiency and the safety of commercial social contact are improved; the intelligent contract module sets the authority of the resume file for other personal users to check through the threshold of the pass, and the safety of business social contact is improved. The personal information or the enterprise information is encrypted through the personal public key pair and the enterprise public key of the personal login module and the enterprise login module, and the identities of different personal users or enterprise users are identified through the personal addresses and the enterprise information. The scheme is convenient for customers to use, and improves the safety and the efficiency, thereby improving the satisfaction degree of individuals and enterprise users.
In addition, the business social system based on the block chain and the IPFS technology solves the problem of personal resume of job seekers by authenticating authenticity and tamper resistance of personal information, and time and labor cost for companies to use human resources to carry out background investigation and recruit unqualified employees are saved. The company processes with longer period such as on-duty certification or off-duty certification are saved. For users, it is convenient to encrypt personal information and read the personal information or advertisement reading materials to obtain economic return. The system changes the traditional internet user data and advertising disturbance to the user, and earns benefits from advertisers to subsidize the business model of the free user.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A business social system based on blockchain and IPFS techniques, comprising:
the personal login module is used for a plurality of personal users to respectively input personal information and personal passwords to create personal accounts and simultaneously distribute personal key pairs and personal addresses for the personal users, wherein the personal key pairs comprise personal public keys and personal private keys;
the enterprise login module is used for a plurality of enterprise users to respectively input enterprise information and an enterprise password to create an enterprise account and simultaneously distribute an enterprise key pair and an enterprise address to the enterprise users, wherein the enterprise key pair comprises an enterprise public key and an enterprise private key;
the user authentication module is used for carrying out user real-name authentication according to the personal information or the enterprise information;
the file encryption module is used for encrypting the personal information after the user real name verification passes through the personal public key pair to generate a resume file and uploading the resume file to the IPFS system, the IPFS system generates a resume abstract according to the resume file and links the resume abstract and the resume timestamp to a bottom layer block chain of the library chain cloud;
the business card generating module is used for selecting one or more contents to generate a business card file through the personal information, and chaining the business card file and the business card timestamp to a bottom layer module chain of the library chain cloud;
the user decryption module is used for reading the resume file in the IPFS system through the resume abstract by an individual user and decrypting the resume file by using the individual private key to obtain the personal information;
the user matching module is used for matching the resume files of the individual users with a plurality of individual users through AI data analysis and pushing the resume files to one or more other matched individual users;
the chat authority module is used for distributing pass to different individual users according to various contents in the resume files, and the pass is used for authorizing each individual user to check the resume files of other individual users;
the enterprise publishing module is used for enabling the individual user to publish advertisement content, encrypting the advertisement content through the enterprise address to generate an authentication advertisement and uploading the authentication advertisement to the IPFS system, and the IPFS system generates an advertisement abstract according to the authentication advertisement and links the advertisement abstract and an advertisement timestamp to a bottom layer block chain of the library chain cloud;
the signature request module is used for submitting a signature request of the resume file to an enterprise user, after the enterprise user receives the signature request, encrypting the resume file according to a symmetric encryption algorithm AES by using the personal private key to generate a digital signature, encrypting the resume file through a personal public key, and chaining the digital signature to a bottom layer block chain of the library chain cloud;
and the intelligent contract module is used for setting the resume profile of each individual user for other individual users to check the required number of the passes and receiving the passes so as to provide the resume profile for other individual users.
2. The system of claim 1, wherein the personal password or the business password is a random string generated by automatically arranging and combining a plurality of words according to a one-time random algorithm.
3. The business social system of claim 1 wherein the individual user or business user binds the individual address or the business address via a cell phone number.
4. The business social system of claim 1 wherein the personal information comprises any one or more of academic calendars, professional skills, work experience, and personal images, and the business information comprises any one or more of business profiles, corporate qualifications, and corporate images.
5. The system of claim 1, wherein the user authentication module is connected to the user terminal through an application program interface of a management terminal to obtain the personal information or the business information for real-name authentication.
6. The business social system of claim 1 wherein said chat permission module distributes the same number of said passes based on the number of content items in said business card file, authorizing each individual user to view some or all of the contents of said business card file of other individual users based on the number of said passes.
7. The system of claim 1, wherein said chat permission module sells said pass to individual users by a fee.
8. The business social system according to claim 1, wherein the communication between different individual users/between each individual user and the enterprise user is implemented by using a P2P network domain, and information is encrypted by acquiring the individual address and the individual key pair/the enterprise address and the enterprise key pair of the other party and then sent to the other party.
9. The business social system of claim 1 comprising an enterprise indexing module for individual users to search for different enterprise users to communicate with.
10. The business social system of claim 9 wherein the business indexing module is configured for individual users to index business addresses by business name.
CN202011488895.XA 2020-12-16 2020-12-16 Business social system based on block chain and IPFS technology Active CN112560057B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011488895.XA CN112560057B (en) 2020-12-16 2020-12-16 Business social system based on block chain and IPFS technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011488895.XA CN112560057B (en) 2020-12-16 2020-12-16 Business social system based on block chain and IPFS technology

Publications (2)

Publication Number Publication Date
CN112560057A CN112560057A (en) 2021-03-26
CN112560057B true CN112560057B (en) 2022-11-18

Family

ID=75064098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011488895.XA Active CN112560057B (en) 2020-12-16 2020-12-16 Business social system based on block chain and IPFS technology

Country Status (1)

Country Link
CN (1) CN112560057B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664852B (en) * 2022-12-14 2023-05-23 金钱猫科技股份有限公司 Data management method and system based on block chain technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109245993A (en) * 2018-09-07 2019-01-18 中链科技有限公司 Instant communication method and device based on block chain
JP2020129284A (en) * 2019-02-08 2020-08-27 株式会社メルカリ Program, information processing device, and information processing method
WO2020186827A1 (en) * 2019-03-21 2020-09-24 深圳壹账通智能科技有限公司 User authentication method and apparatus, computer device and computer-readable storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234478A (en) * 2017-12-29 2018-06-29 重庆小犀智能科技有限公司 A kind of personal credit information share system and method based on block chain
US10986169B2 (en) * 2018-04-19 2021-04-20 Pinx, Inc. Systems, methods and media for a distributed social media network and system of record
US20200160455A1 (en) * 2018-06-29 2020-05-21 Ashwarya Pratap Singh Methods and systems of a marketplace blockchain-based protocol platform with a trust score
CN109447671A (en) * 2018-08-23 2019-03-08 广州市久邦数码科技有限公司 A kind of advertising platform based on block chain
US11783024B2 (en) * 2019-01-31 2023-10-10 Salesforce, Inc. Systems, methods, and apparatuses for protecting consumer data privacy using solid, blockchain and IPFS integration
US10909533B2 (en) * 2019-03-13 2021-02-02 Stream Source Technologies System and methods of securely matching a buyer to a seller
CN110188109B (en) * 2019-04-03 2023-10-31 创新先进技术有限公司 Block chain-based information management method, device and equipment and storage medium
CN110191153B (en) * 2019-04-24 2022-03-22 成都派沃特科技股份有限公司 Social communication method based on block chain
CN111343001B (en) * 2020-02-07 2022-04-12 复旦大学 Social data sharing system based on block chain
CN112001683B (en) * 2020-10-27 2021-02-09 南京福佑在线电子商务有限公司 Logistics information exchange method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109245993A (en) * 2018-09-07 2019-01-18 中链科技有限公司 Instant communication method and device based on block chain
JP2020129284A (en) * 2019-02-08 2020-08-27 株式会社メルカリ Program, information processing device, and information processing method
WO2020186827A1 (en) * 2019-03-21 2020-09-24 深圳壹账通智能科技有限公司 User authentication method and apparatus, computer device and computer-readable storage medium

Also Published As

Publication number Publication date
CN112560057A (en) 2021-03-26

Similar Documents

Publication Publication Date Title
US10121143B1 (en) Method and system for blockchain-based combined identity, ownership, integrity and custody management
Windley Digital identity
CN109086585A (en) History data processing method, system and computer readable storage medium
CN111526200A (en) Data storage access method and system based on block chain and cloud platform
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN113065961A (en) Power block chain data management system
CN111291394B (en) False information management method, false information management device and storage medium
CN110719176A (en) Logistics privacy protection method and system based on block chain and readable storage medium
CN109413116A (en) A kind of believable cloud identity identifying method and system
Camenisch Information privacy?!
CN113315745A (en) Data processing method, device, equipment and medium
GB2512324A (en) Improvements in or relating to public-key certificate management
CN115456324A (en) Management method, device and system for job hunting privacy information
Bhandary et al. Securing logs of a system-an iota tangle use case
CN112560057B (en) Business social system based on block chain and IPFS technology
Sharma et al. A two-tier security solution for storing data across public cloud
CN110012024A (en) A kind of data sharing method, system, equipment and computer readable storage medium
CN109714169A (en) It is a kind of based on the credible distribution platform of data strictly authorized and its circulation method
Zhou et al. A Scalable Blockchain‐Based Integrity Verification Scheme
CN116150801B (en) Human resource management system based on block chain encryption
Sable et al. Pragmatic approach for online document verification using block-chain technology
Shi et al. Design of electronic contract architecture based on blockchain technology
US20110283108A1 (en) Method & apparatus for establishing a trusted and secure relationship between two parties connected to a network
CN112257084A (en) Personal information storage and monitoring method, system and storage medium based on block chain
CN111369251A (en) Block chain transaction supervision method based on user secondary identity structure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant