CN115529170B - Reputation management method based on block chain - Google Patents

Reputation management method based on block chain Download PDF

Info

Publication number
CN115529170B
CN115529170B CN202211130246.1A CN202211130246A CN115529170B CN 115529170 B CN115529170 B CN 115529170B CN 202211130246 A CN202211130246 A CN 202211130246A CN 115529170 B CN115529170 B CN 115529170B
Authority
CN
China
Prior art keywords
reputation
server
platform
blockchain
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211130246.1A
Other languages
Chinese (zh)
Other versions
CN115529170A (en
Inventor
李荔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Baizeng Network Technology Co ltd
Original Assignee
Shandong Baizeng Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Baizeng Network Technology Co ltd filed Critical Shandong Baizeng Network Technology Co ltd
Publication of CN115529170A publication Critical patent/CN115529170A/en
Application granted granted Critical
Publication of CN115529170B publication Critical patent/CN115529170B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

On one hand, reputation information in each application program serving as a first service end is recorded through a blockchain platform, and user privacy is protected by using asymmetric encryption, so that reputation data between the first service ends are mutually agreed and shared, original mutually-closed information can be more efficiently integrated and utilized, a dishonest cannot register in other application programs by using the same identity, and the cost of dishonest action to be borne is increased. On the other hand, a third server endorsement mechanism is added, and a relief path is provided after the second client is determined to be a malicious user. Meanwhile, the reputation data are classified through the platform type identifier, so that convenience is brought to all data users in using the reputation data, and the operation and maintenance cost is reduced.

Description

Reputation management method based on block chain
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a reputation management method, a platform and a computer readable medium based on a blockchain.
Background
Existing applications, particularly consumer-oriented applications, often require maintenance of a set of user reputation management systems to circumvent misuse of the application by malicious users. However, because the reputation management systems of the applications are independent of each other, the dishonest user is likely to continue to misuse the service in other applications after being blocked by one application, and the cost of maintaining the reputation management system is high, many small platforms cannot bear high development and maintenance costs, so that the overall utilization efficiency of the reputation management system is low.
On the other hand, the decentralised reputation management system adopting the blockchain technology can be considered, reputation data of users are managed and shared through the blockchain platform, and information leakage and data falsification risks possibly existing in the traditional decentralised system are avoided.
However, as more and more different types of applications access the blockchain platform, reputation data will become more generalized, and an application may only need one type of reputation data targeted, such as a shopping type application targeted to reputation information of a type that needs shopping.
Disclosure of Invention
The application aims at overcoming the defects of the prior art and provides a credit management method, a credit management platform and a credit management computer readable medium based on a block chain.
The application provides a credit management method based on a block chain, which comprises the following steps:
the method comprises the steps that a first client sends a reputation data packet to a first service end, wherein the reputation data packet comprises a first identity identifier and a first reputation score, and the first reputation score is generated by the first client;
the first server encrypts the first identity identifier by using a first public key to generate a second identity identifier, packages the second identity identifier and the first reputation score to a first reputation transaction, and sends the first reputation transaction to a blockchain platform, and simultaneously stores the reputation data packet; the first public key is generated and disclosed by the blockchain platform and is unique;
The blockchain platform performs validity verification on the first credit transaction according to an intelligent contract; and when the validity verification is successful, the first credit transaction is added with a platform type identifier and then stored in a storage domain and is uplink.
Preferably, the blockchain platform performs validity verification on the first reputation transaction according to the intelligent contract, including:
determining that the validity verification is successful when the first server public key address is contained in a public key address set, and determining that the validity verification is failed when the first server public key address is not contained in the public key address set;
the public key address set is preset in the intelligent contract storage domain, and the first server public key address is contained in the first credit transaction.
Preferably, the method further comprises:
the second server monitors the block chain platform;
when a new block is uplink on the blockchain platform, the second server side acquires the new block, acquires a corresponding first reputation score set in the blockchain platform according to the second identity identifier and the platform type identifier in the new block, calculates and generates a second reputation score according to the first reputation score set, and packages the second identity identifier, the platform type identifier and the second reputation score into a second reputation transaction to be sent to the blockchain platform;
Preferably, the method further comprises:
the second client sends a registration data packet to the first service end, wherein the registration data packet comprises the first identity identifier;
the first server side performs malicious user verification on the registration data packet; when the malicious user is successfully authenticated, storing the registration data packet; and discarding the registration data packet when the malicious user fails to verify.
Preferably, said performing malicious user authentication on the registration data packet includes:
the first server encrypts the first identity identifier by using the first public key to generate the second identity identifier, and obtains the corresponding second reputation score from the blockchain platform according to the second identity identifier and the platform classification identifier;
when the second reputation score is higher than a reputation threshold, determining that the malicious user is successfully authenticated; determining that the malicious user verification fails when the second reputation score is below the reputation threshold;
wherein the reputation threshold is preset.
Preferably, the method further comprises:
the second client sends an endorsement data packet to a third server, wherein the endorsement data packet comprises the first identity identifier, the platform classification identifier and a guarantee certificate;
The third server performs endorsement verification on the endorsement data packet; and when the endorsement verification is successful, generating a second identity mark and a third credit score according to the first identity mark and the guarantee certificate, packaging the second identity mark and the third credit score, transmitting the third credit score to the blockchain platform through third credit transaction, and storing the endorsement data packet.
In one aspect, the present application provides a method for reputation management based on a blockchain, the method being performed by a blockchain platform, the method comprising:
acquiring a first credit transaction sent by a first service end; the first credit transaction is generated by encrypting a first identity mark sent by a first client by the first server by using a first public key to generate a second identity mark, and packaging the second identity mark and a first credit score sent by the first client;
performing validity verification on the first credit transaction according to an intelligent contract;
and when the validity verification is successful, the first credit transaction is added with a platform type identifier and then stored in a storage domain and is uplink.
In one aspect, the application provides a reputation management platform based on a blockchain, the platform comprising:
The system comprises a first acquisition module, a second acquisition module and a first judgment module, wherein the first acquisition module is used for acquiring a reputation data packet sent by a first client, the reputation data packet comprises a first identity identifier and a first reputation score, and the first reputation score is generated by the first client;
the first encryption module is used for encrypting the first identity identifier by using a first public key to generate a second identity identifier; the first public key is generated and disclosed by the blockchain platform and is unique;
the first packing module is used for packing the second identity identifier and the first reputation score into a first reputation transaction and sending the first reputation transaction to the blockchain platform, and storing the reputation data packet;
the validity verification module is used for verifying the validity of the first credit transaction according to the intelligent contract; and when the validity verification is successful, the first credit transaction is added with a platform type identifier and then stored in a storage domain and is uplink.
In one aspect the application provides a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the method of one aspect of the application.
An aspect of the present application provides a computer readable storage medium storing a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of the above aspect.
According to the reputation management method, the platform and the computer readable medium based on the blockchain, on one hand, reputation information in each application program serving as the first service end is recorded through the blockchain platform, and user privacy is protected by using asymmetric encryption, so that reputation data between the first service ends are mutually agreed and shared, original mutually-closed information can be more efficiently integrated and utilized, a dishonest cannot register in other application programs by using the same identity, and the cost required to bear dishonest actions is increased. On the other hand, a third server endorsement mechanism is added, and a relief path is provided after the second client is determined to be a malicious user. Meanwhile, the reputation data are classified through the platform type identifier, so that convenience is brought to all data users in using the reputation data, and the operation and maintenance cost is reduced.
Drawings
In order to more clearly illustrate the embodiments of the application or the prior art solutions, the drawings which are used in the description of the embodiments or the prior art will be briefly described below, it being obvious that the drawings in the description below are only some of the embodiments described in the present application, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a schematic diagram of a device and network architecture of a blockchain-based reputation management system according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a system for reputation management based on blockchain according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an architecture development of a blockchain-based reputation management system according to an embodiment of the present application;
FIG. 4 is a flowchart of a method for reputation management based on blockchain according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a data interaction process between a second client, a first server and a blockchain platform according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a data interaction process between a second client, a third server and a blockchain platform according to an embodiment of the present application;
FIG. 7 is a schematic diagram of a data interaction process among a first client, a first server, a second server, and a blockchain platform according to an embodiment of the present application;
FIG. 8 is a flow chart of a reputation management method performed by a blockchain platform in accordance with an embodiment of the present application;
FIG. 9 is a schematic diagram of a blockchain-based reputation management platform according to an embodiment of the present application;
Fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
It is to be appreciated that the present application relates to blockchain related technology. Blockchain technology is the technology base for implementing distributed applications, which uses hash pointers instead of traditional pointers and stores transactions of digital assets in blocks, a transaction driven state machine, which are traceable and irreversible.
Referring to fig. 1, fig. 1 is a schematic diagram of an apparatus and a network architecture of a reputation management system based on blockchain according to an embodiment of the present application.
As shown in fig. 1, the network architecture may include a user terminal 10, an application server 20, a blockchain network 30.
The blockchain network 30 may include a plurality of blockchain nodes, where the plurality of blockchain nodes may interact with each other, and the plurality of blockchain nodes may include N nodes, such as node N1, node N2, … …, and node Nn.
The user terminal 10 may include n terminal nodes such as node C1, node C2, … …, and node Cn.
The application server 20 may include n service nodes, such as node S1, nodes S2, … …, and node Sn. Each service node may be one or more application programs, or may be formed by a plurality of service nodes, and meanwhile, each service node may be a light node or a full node in the blockchain network 30, where the full node is used to store all contents of an entire block, and the light node only stores block header information of the block. When it is desired to prove to the light node whether a transaction is written to the blockchain network 30, the Merkle Proof may be used, where a Path from the transaction to the root node is the Merkle Proof, also referred to as Merkle Path, and the full node sends the entire Merkle Proof to the light node, from which the light node can calculate the root hash value, and compare it with its own stored value, to verify whether the transaction is written to the blockchain. As long as all hash values are correct along the path, the description content has not been modified.
More, one blockchain node in the blockchain network 30 or one node in the user terminal 10 may be configured by a server or may be configured by a terminal device. The servers used to form the blockchain network 30 nodes may be independent physical servers, may be a server cluster or a distributed system formed by a plurality of physical servers, and may also be cloud servers that provide cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and basic cloud computing services such as big data and artificial intelligence platforms. The server used to construct the nodes of the user terminal 10 is typically a terminal device, which may be: intelligent terminals such as smart phones, tablet computers, notebook computers, desktop computers and the like. Wherein all nodes in the user terminal 10 may connect to the application server 20 via a network, such as WiFi, mobile cellular or ethernet, and then to the blockchain network 30.
It will be appreciated that because conventional centralized systems may be at risk of information leakage and data tampering, a decentralised reputation management system employing blockchain techniques may be considered to manage and share user reputation data via blockchain platform 300. However, as more and more different types of applications access blockchain platform 300, reputation data will become more generalized, and an application may only need one type of reputation data targeted, such as reputation information related to shopping behavior targeted by a shopping type application.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a reputation management system based on blockchain according to an embodiment of the present application.
A blockchain-based reputation management system, comprising a first client 100, a first server 200, and a blockchain platform 300, wherein:
the first client 100 is configured to send a reputation data packet to the first server 200, where the reputation data packet includes a first identity identifier and a first reputation score, and the first reputation score is generated by the first client 100;
the first server 200 is configured to encrypt the first identity identifier with a first public key to generate a second identity identifier, package the second identity identifier and the first reputation score to a first reputation transaction, send the first reputation transaction to the blockchain platform 300, and store the reputation data packet at the same time; the first public key is generated and disclosed by the blockchain platform 300 and is unique.
The blockchain platform 300 is configured to perform validity verification on the first reputation transaction according to an intelligent contract; and when the validity verification is successful, the first credit transaction is added with a platform type identifier and then stored in a storage domain and is uplink.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating an expansion structure of a reputation management system based on blockchain according to an embodiment of the present application.
The system further includes a second client 500, a second server 400, and a third server 600, where:
the second client 500 is configured to send a registration packet to the first server 200, where the registration packet includes the first identity identifier; the first server 200 performs malicious user verification on the registration data packet; when the malicious user is successfully authenticated, storing the registration data packet; and discarding the registration data packet when the malicious user fails to verify.
The second server 400 is configured to monitor the blockchain platform 300; when a new block is uplink on the blockchain platform 300, the second server 400 obtains the new block, obtains a corresponding first reputation score set in the blockchain platform 300 according to the second identity identifier and the platform type identifier in the new block, calculates and generates a second reputation score according to the first reputation score set, and packages the second identity identifier, the platform type identifier and the second reputation score into a second reputation transaction to be sent to the blockchain platform 300.
The third server 600 is configured to receive an endorsement data packet sent by the second client 500, and perform endorsement verification on the endorsement data packet; and when the endorsement verification is successful, generating a second identity mark and a third credit score according to the first identity mark and the guarantee certificate, packaging the second identity mark and the third credit score, transmitting the third credit score to the blockchain platform 300 through a third credit transaction, and storing the endorsement data packet.
On the one hand, the system records the reputation information in each application program serving as the first service end 200 through the blockchain platform 300 and protects the privacy of the user by using asymmetric encryption, so that the reputation data between the first service ends 200 are mutually agreed and shared, the originally mutually closed information can be more efficiently integrated and utilized, the dishonest cannot register in other application programs by using the same identity, and the cost required to bear by dishonest behavior is improved. On the other hand, the third server 600 endorsement mechanism is added, and a relief path is provided after the second client 500 is determined to be a malicious user. Meanwhile, the reputation data are classified through the platform type identifier, so that convenience is brought to all data users in using the reputation data, and the operation and maintenance cost is reduced.
Referring to fig. 4, fig. 4 is a flowchart of a reputation management method based on a blockchain according to an embodiment of the present application.
A blockchain-based reputation management method, comprising:
the first client 100 sends a reputation data packet to the first server 200, wherein the reputation data packet includes a first identity and a first reputation score, the first reputation score being generated by the first client 100;
specifically, the first server 200 may obtain the reputation data packet sent by the first client 100. The reputation data packet sent by the first client 100 to the first server 200 mainly comprises a first identity and a first reputation score.
The first identity identifier may be a unique identity identifier input by a user, such as an identity card number, a mobile phone number, and the like. The first reputation score may be generated by the first client 100 after the first client 200 performs an interactive action with other users, where the first client 100 performs comprehensive consideration evaluation according to factors such as a behavior mode, a behavior time, a behavior result and the like of other users in the interactive process, and the first client 100 may be a user having management authority in the corresponding first client 200.
Further, the first reputation score may be a scoring, such as 1-5 scores, or a grading, such as disqualification, qualification, good, excellent, etc., and further, the reputation data packet may further include data such as the behavior mode, the behavior time, the behavior result, etc.
The first server 200 encrypts the first identity identifier by using a first public key to generate a second identity identifier, packages the second identity identifier and the first reputation score into a first reputation transaction, and sends the first reputation transaction to the blockchain platform 300, and stores the reputation data packet; the first public key is generated and disclosed by the blockchain platform 300 and is unique;
specifically, the first identity identifier is encrypted by adopting asymmetric encryption, wherein the asymmetric encryption needs two keys, one is a public key and the other is a private key; the public key is used for encryption and the private key is used for decryption. The ciphertext obtained by encrypting the plaintext by using the public key can be decrypted only by using the corresponding private key and the original plaintext can be obtained, and the public key which is originally used for encryption cannot be used for decryption. Unlike symmetric encryption, which uses the same key for both encryption and decryption. The public key can be disclosed and can be released outwards at will; the private key is not disclosed.
The above process encrypts the first identity identifier by using the unique first public key disclosed by the blockchain platform 300, and packages the reputation transaction to issue to the blockchain platform 300, so that the personal information of the user cannot be deciphered in the blockchain platform 300, and the personal privacy security of the user is protected. Second, by the common unique first public key, different independent application servers can quickly and accurately check the reputation information on the blockchain platform 300.
Specifically, when the independent application server needs to check the reputation information corresponding to the user on the blockchain platform 300, the corresponding independent application server may encrypt the first identity of the user through the public key to obtain the second identity, and then the independent application server may match the reputation information on the blockchain platform 300 through the second identity.
Further, the first server 200 may initiate a first reputation transaction on the blockchain platform 300, where the first reputation transaction is used to invoke an intelligent contract in the blockchain platform 300, and a data structure for storing the identity and the mapping relationship of the reputation information is set in a storage domain of the intelligent contract. The first reputation transaction may include a second identity identifier and a first reputation score, optionally, the first reputation transaction may further include data such as a behavior mode, a behavior time, a behavior result, and the like, and the corresponding smart contract storage domain may be provided with a data structure for storing the data such as the behavior mode, the behavior time, the behavior result, and the like.
The blockchain platform 300 performs validity verification on the first reputation transaction according to an intelligent contract; and when the validity verification is successful, the first credit transaction is added with a platform type identifier and then stored in a storage domain and is uplink.
Specifically, after the blockchain platform 300 obtains the first reputation transaction sent by the first service end 200, nodes in the blockchain platform 300 collect the first reputation transaction to form a block, when the nodes reach consensus, data are verified according to the intelligent contract called by the first reputation transaction, when verification is passed, the nodes collect a certain amount of gasoline fee, the data are uploaded to a storage domain of the intelligent contract, and the block is issued to the whole blockchain platform 300 network.
It should be noted that, in the blockchain technology, the existence of the consensus algorithm ensures the credibility of the blockchain. Common consensus algorithms are numerous, such as PoW (Proof of Work), poS (Proof of equity), DPoS (Delegate Proof of Stake, proof of delegate equity), PBFT (Practical Byzantine Fault Tolerance, practical bayer fault tolerance algorithm), etc.
The job Work (POW) is the most common consensus algorithm, and a node needs to add a block Of transaction in a blockchain, so that a complex calculation problem must be solved, and the waste Of the calculation power and the electric power Of a computer is large.
Furthermore, the intelligent contract storage domain can also be provided with a data structure for storing the platform type identifier, and in the process of uploading data to the storage domain, the called intelligent contract function can set the platform type identifier preset in the function for the first credit transaction and then store the platform type identifier in the storage domain. Preferably, each platform type transaction corresponds to a storage function, the storage function is preset with a platform type identifier, and each first server 200 is only authorized to call one storage function.
The method mainly uses the blockchain technology and the intelligent contract technology to enable the originally closed and independent reputation data among all application programs to be shared in an open mode with high mutual trust and high privacy protection, and meanwhile, by presetting a platform type identifier in a function, the reputation data can be classified, so that the accessed application programs can acquire target data in a targeted and efficient mode, and the calculation management cost is reduced.
It will be appreciated that while the data stored in the blockchain platform 300 is public, invalid reputation data may also be received by malicious attacks if any application server is allowed to upload reputation information that would result in poor quality of the data in the blockchain platform 300. Therefore, it is necessary to perform validity verification on the reputation transaction issued by the server, as follows:
The blockchain platform 300 performs validity verification on the first reputation transaction according to the smart contract, including:
determining that the validity verification is successful when the public key address of the first service end 200 is included in the public key address set, and determining that the validity verification is failed when the public key address of the first service end 200 is not included in the public key address set;
the public key address set is preset in the intelligent contract storage domain, and the public key address of the first server 200 is included in the first reputation transaction.
Wherein the smart contract is a program running on the blockchain. It is a series of codes (functions) and data (states) located at a particular address on the blockchain. An intelligent contract is also an account, called a contract account. This means that they have a balance and they can conduct transactions over the network. However, they cannot be manipulated by humans, they are deployed on a network to run as programs. An individual user may interact with the smart contract by submitting a transaction to perform a function of the smart contract. Intelligent contracts can define rules like regular contracts and are enforced automatically by code. By default, smart contracts cannot be deleted and their interactions are irreversible.
Specifically, in the smart contract of the blockchain platform 300, the public address of the first server 200 meeting the specification may be stored in the smart contract storage domain in advance as the public key address set, and only the first server 200 in the public key address set may call the related function to increase the data about the reputation information in the storage domain.
Specifically, when the blockchain platform 300 receives the first reputation transaction from the first server 200 to call the intelligent contract to perform reputation data addition, the intelligent contract first traverses the public key address set in the storage domain, if the public key address of the first server 200 included in the first reputation transaction is included in the public key address set, it is indicated that the first server 200 has the authority to upload, the validity verification is successful, and the function in the intelligent contract continues to perform the addition of the reputation data in the first reputation transaction to the storage domain.
Further, the public key address set may be increased as more first service terminals 200 access to the blockchain platform 300, and of course, a certain number of administrator address sets may be preset in the intelligent contract, and when other first service terminals 200 have a need to access to the blockchain platform 300, nodes in these management address sets may initiate a transaction of calling a related function to increase the number of public key addresses of the first service terminals 200 stored in the public key address set.
It can be appreciated that in the method, although reputation data of each application program is publicly shared, the data size of the original data is large, and if the original data is not comprehensively evaluated according to the platform type, efficient evaluation processing of the original data is also a great challenge for the application program in a specific field.
The method further comprises the following steps:
the second server 400 listens to the blockchain platform 300;
specifically, the second server 400 monitors the blockchain platform 300 in real time, and when the blockchain platform 300 has a new blockchain, the second server 400 executes service logic.
It will be appreciated that new blocks may be discarded because the blockchain platform 300 may diverge and the backbone of the blockchain platform 300 has only one, longest legal chain. Further, the second server 400 may monitor the blockchain platform 300 in real time, and execute the service logic when the blockchain platform 300 has a new blockchain and the new block is confirmed by a certain number of blocks, preferably, the number of block confirmation may be more than 12 blocks.
When a new block is uplink on the blockchain platform 300, the second server 400 acquires the new block, acquires a corresponding first reputation score set in the blockchain platform 300 according to the second identity identifier and the platform type identifier in the new block, calculates and generates a second reputation score according to the first reputation score set, and packages the second identity identifier, the platform type identifier and the second reputation score into a second reputation transaction to be sent to the blockchain platform 300;
Specifically, the second reputation score may be generated by comprehensively evaluating reputation data on the blockchain platform 300, and the process of calculating to generate the second reputation score may use an evaluation model generated by machine learning training in advance to calculate the first reputation score set.
Among them, machine learning is a method of training a model by using data and then predicting using the model. First, we need to store historical data in a computer. Next, we process the data through a machine learning algorithm, a process called "training" in machine learning, and the result of the process can be used by us to predict new data, which is commonly referred to as a "model". The process of predicting new data is called "prediction" in machine learning. "training" and "predicting" are two processes of machine learning, and "model" is the intermediate output result of the process, "training" produces "model" which directs "predicting".
Further, the second reputation score may be a scoring, such as 1-100 points, or a rating, such as disqualification, qualification, good, excellent, etc.
The blockchain platform 300 performs the validation of the second reputation transaction according to the smart contract; and when the validity verification is successful, storing the second credit transaction into a storage domain and linking the second credit transaction.
Specifically, the intelligent contract storage domain may further be provided with a data structure for storing a mapping relationship among the second identity identifier, the platform type identifier and the second reputation score, so as to better distinguish the first reputation score data from the second reputation score data.
By setting the second server 400, the reputation information in the blockchain platform 300 can be specifically classified and evaluated according to the identity and the platform type, and each platform type corresponding to each identity can generate a piece of reputation comprehensive evaluation information, so that an application program in a specific field can acquire target data more specifically, and the operation and maintenance cost is reduced.
It will be appreciated that although the data stored in the blockchain platform 300 is public, invalid data may be received by malicious attacks if any application server is allowed to upload reputation comprehensive assessment information that would result in poor quality of the data in the blockchain platform 300. Therefore, the validity of the reputation comprehensive evaluation information issued by the server needs to be verified, which is described in detail as follows:
Determining that the validity verification is successful when the public key address of the second server 400 is included in the public key address set, and determining that the validity verification is failed when the public key address of the second server 400 is not included in the public key address set;
the public key address set is pre-set in the smart contract memory domain,
the second server 400 public key address is included in the second reputation transaction.
Optionally, in the intelligent contract of the blockchain platform 300, the public address of the second server 400 meeting the specification may be stored in the intelligent contract storage domain in advance into the second public key address set, and only the second server 400 in the second public key address set may call the related function to increase the data about the reputation comprehensive evaluation information in the storage domain, and the second reputation score.
Specifically, when the blockchain platform 300 receives the second reputation transaction from the second server 400 to call the intelligent contract to perform reputation comprehensive evaluation data addition, the intelligent contract first traverses the second public key address set in the storage domain, if the public key address of the second server 400 included in the second reputation transaction is included in the public key address set, it is indicated that the second server 400 has the authority to upload, the validity verification is successful, and the function in the intelligent contract continues to perform the addition of the reputation comprehensive evaluation information data in the second reputation transaction to the storage domain.
The validity verification can prevent an illegal server from uploading the comprehensive reputation evaluation information, and the validity and the safety of the data of the blockchain platform 300 are improved.
It will be appreciated that, since the registration request in the first service end 200 is open, each second client 500 user may send the registration request to the first service end 200, but some users may have multiple dishonest actions when using services provided by other applications in the first service end 200, resulting in being blacked out. In order to prevent the part of dishonest users from continuing to register for application services using other applications in the first service end 200, it is necessary to perform malicious user authentication in the registration request.
The method further comprises the following steps:
the second client 500 sends a registration data packet to the first server 200, where the registration data packet includes a first identity identifier;
specifically, after the second client 500 sends the registration packet, the first service 200 may receive the registration packet and obtain the first identity in the registration packet.
The second client 500 may be a terminal desiring to obtain the application service of the first service end 200 by sending a registration request, and the first identity may be a unique identity input by the user of the second client 500, such as an identity card number, a mobile phone number, and the like.
The first server 200 performs malicious user verification on the registration data packet; when the malicious user is successfully authenticated, storing the registration data packet; discarding the registration packet when the malicious user fails to verify;
specifically, after the first server 200 acquires the registration packet, the first server 200 may complete the verification of the malicious user according to the blockchain platform 300. Alternatively, the first service end 200 may convert the first identity identifier into the second identity identifier through the first public key, and then obtain the second reputation score on the blockchain platform 300 according to the second identity identifier/the second identity identifier and the platform classification identifier to determine whether the user is a malicious user. Optionally, the first service end 200 may also select to obtain all the first reputation score sets corresponding to the second identity identifier/the second identity identifier and the platform classification identifier on the blockchain platform 300, and then calculate and generate a comprehensive reputation score according to the user-defined evaluation model to determine whether the user is a malicious user.
Further, when the blockchain platform 300 does not have the first reputation score corresponding to the current second identity, the first service 200 may further package the first identity into the first reputation transaction for uplink, so as to register the new user to the blockchain platform 300.
Through malicious user verification, the process can prevent the user with multiple dishonest behaviors from registering in the application program of the first service end 200, and the rights and interests of the application program platform and other dishonest users are better ensured.
The specific verification process of the malicious user is detailed in the following steps:
the step of performing malicious user authentication on the registration data packet includes:
the first server 200 encrypts the first identity identifier by using the first public key to generate the second identity identifier, and obtains the corresponding second reputation score from the blockchain platform 300 according to the second identity identifier and the platform classification identifier;
when the second reputation score is higher than a reputation threshold, determining that the malicious user is successfully authenticated; determining that the malicious user verification fails when the second reputation score is below the reputation threshold;
wherein the reputation threshold is preset.
Specifically, when the second reputation score corresponding to the first identity is obtained, the first identity needs to be encrypted according to the first public key to be converted into the second identity, and then the second reputation score on the blockchain platform 300 is obtained according to the second identity.
Wherein, the reputation threshold may be a numerical range customized by each application program in the first service end 200; the platform class identifier may be a class option determined by each application program in the first service end 200 according to its own type.
Referring to fig. 5, fig. 5 is a schematic diagram of a data interaction process among a second client 500, a first server 200 and a blockchain platform 300 according to an embodiment of the application.
S501, the second client 500 sends a registration data packet;
the registration packet includes a first identity, which may be a unique identity input by the user of the second client 500, such as an identification card number or a mobile phone number.
S502, the first service end 200 generates and sends a second identity;
the first server 200 encrypts the first identity according to the first public key to generate a second identity, and then sends the second identity to the blockchain platform 300 to obtain a reputation score corresponding to the second identity.
S503, the blockchain platform 300 searches a second reputation score according to the second identity;
s504, the blockchain platform 300 returns a second reputation score;
wherein, the blockchain platform 300 returns related data to the blockchain platform 300 after querying the second reputation score corresponding to the second identity.
S505, the first service end 200 confirms that the verification is successful and stored when the second reputation score is higher than the reputation threshold.
Wherein the verification is successful when the second reputation score is higher than the reputation threshold, the second client 500 is successfully registered, otherwise the second client 500 is failed to register.
In the above process, the first public key is used to encrypt the first identity identifier, so that personal information of the user can be effectively protected, and then, each application program in the first server 200 can adjust the registered user group according to the self-service requirement user-defined platform classification identifier and the reputation threshold.
It can be appreciated that, due to the fact that the blockchain platform 300 is not able to be modified by decentralizing, a part of the second client 500 account with a low reputation score cannot be improved by the first server 200 after being determined as a malicious user, so that a relief method is needed to provide reputation endorsements for the clients, as follows:
the method further comprises the following steps:
the second client 500 sends an endorsement data packet to the third server 600, where the endorsement data packet includes the first identity identifier, the platform classification identifier, and a security certificate;
specifically, after the second client 500 sends the endorsement data packet, the third server 600 may receive the endorsement data packet and obtain the first identity identifier, the platform classification identifier, and the deposit book credential in the endorsement data packet.
Wherein the second client 500 may be a terminal desiring to increase reputation scoring in the blockchain platform 300 by sending an endorsement request.
The third server 600 performs endorsement verification on the endorsement data packet; when the endorsement verification is successful, generating a second identity mark and a third credit score according to the first identity mark and the guarantee certificate, packaging the second identity mark and the third credit score to a third credit transaction, transmitting the third credit transaction to the blockchain platform 300, and storing the endorsement data packet;
specifically, after the third server 600 obtains the endorsement data packet, the third server 600 may complete the endorsement verification according to the security certificate in the endorsement data packet. Alternatively, the third service terminal 600 may query whether the deposit provided by the second client terminal 500 is in charge through the deposit certificate, determine that the endorsement verification is successful when the deposit is in charge, and determine that the endorsement verification is failed when the deposit is not in charge.
Further, after the endorsement verification is successful, the third server 600 may determine a third reputation score according to the amount of the deposit, and package the second identity identifier generated by encrypting the first identity identifier with the first public key, the platform classification identifier provided by the second client 500, and the third reputation score together into a third reputation transaction for uplink. The value type and the value range of the third reputation score may be consistent with the first reputation score.
The blockchain platform 300 performs the validation of the third reputation transaction according to the smart contract; and when the validity verification is successful, storing the third credit transaction into a storage domain and linking the third credit transaction.
Referring to fig. 6, fig. 6 is a schematic diagram of a data interaction process between the second client 500, the third server 600 and the blockchain platform 300 according to an embodiment of the application.
S601, a second client 500 sends an endorsement data packet;
the endorsement data packet includes a first identity identifier, a platform classification identifier and a security certificate, where the first identity identifier may be a unique identity identifier input by the user of the second client 500, such as an identity card number and a mobile phone number.
S602, the third server 600 performs endorsement verification according to the guarantee certificate in the endorsement data packet;
the third server 600 may query whether the deposit provided by the second client 500 is checked out through the deposit certificate, determine that the endorsement verification is successful when the deposit is checked out, and determine that the endorsement verification fails when the deposit is not checked out.
S603, the third server 600 endorses and verifies to successfully generate a third reputation score and packages the third reputation score to a third reputation transaction;
wherein, the third server 600 may determine the third reputation score according to the amount of the deposit.
S604, the third server 600 sends a third reputation transaction to the blockchain platform 300;
the third reputation transaction may include, among other things, the second identity, the platform classification identity provided by the second client 500, and a third reputation score.
S605, the blockchain platform 300 performs validity verification, and if the verification is successful, the blockchain platform stores and uploads the blockchain.
The above manner of providing the third client with the guarantee gold through the second client 500, so that the third client submits the third reputation transaction to the blockchain platform 300 to improve the reputation score of the second client 500, can provide a reputation relief way for the second client 500, and avoid the situation of permanent blackening.
The following describes the data interaction between the first client 100, the first server 200, the second server 400, and the blockchain platform 300 as an example.
Referring to fig. 7, fig. 7 is a schematic diagram of a data interaction process among a first client 100, a first server 200, a second server 400, and a blockchain platform 300 according to an embodiment of the application.
S701, a first client 100 sends a reputation data packet;
wherein the reputation data packet comprises a first identity and a first reputation score, the first reputation score being generated by the first client 100.
S702, encrypting and generating a second identity by the first server 200;
the first server 200 encrypts the first identity according to the first public key to generate a second identity.
S703, the first service end 200 packages the second identity identifier and the first reputation score to a first reputation transaction;
s704, the first service end 200 sends a first credit transaction;
wherein the first server 200 sends the first reputation transaction to the blockchain platform 300 while storing the reputation data packet locally at the first server 200.
S705, verifying legality of the blockchain platform 300, and adding a platform type identifier and storing and uploading the platform type identifier if verification is successful;
after the blockchain platform 300 obtains the first reputation transaction sent by the first service end 200, nodes in the blockchain platform 300 collect the first reputation transaction to form a block, when the nodes reach consensus, data are verified according to the intelligent contract called by the first reputation transaction, when verification is passed, the nodes collect a certain amount of gasoline fee, then update the data into a storage domain of the intelligent contract, and issue the block to the whole blockchain platform 300 network.
S706, the second server 400 acquires the new block and generates a second credit transaction;
After the second server 400 obtains the new block, a first reputation score set corresponding to the second identity in the blockchain platform 300 is obtained according to the second identity in the new block, the first reputation score set is calculated according to the pre-trained evaluation model to generate a second reputation score, and the second identity and the second reputation score are packaged into a second reputation transaction.
S707, the second server 400 sends a second credit transaction;
s708, the blockchain platform 300 performs validity verification, and if the verification is successful, the blockchain platform stores and uploads the blockchain.
The blockchain platform 300 verifies the data according to the intelligent contract called by the second credit transaction, and when the verification passes, the node charges a certain amount of gasoline fee, updates the data to the storage domain of the intelligent contract and issues the block to the whole blockchain platform 300 network.
The above process is a data interaction process among the first client 100, the first server 200, the second server 400, and the blockchain platform 300.
In summary, according to the reputation management method based on the blockchain provided by the embodiment of the application, on one hand, reputation information in each application program serving as the first service end 200 is recorded through the blockchain platform 300, and asymmetric encryption is used for protecting user privacy, so that reputation data between the first service ends 200 are mutually agreed and shared, original mutually-closed information can be more efficiently integrated and utilized, a dishonest cannot be registered in other application programs by using the same identity, and the cost required to bear dishonest actions is increased. On the other hand, the third server 600 endorsement mechanism is added, and a relief path is provided after the second client 500 is determined to be a malicious user. Meanwhile, the reputation data are classified through the platform type identifier, so that convenience is brought to all data users in using the reputation data, and the operation and maintenance cost is reduced.
Referring to FIG. 8, FIG. 8 is a flowchart of a reputation management method performed by blockchain platform 300 in accordance with an embodiment of the present application.
S801, acquiring a first credit transaction sent by a first service end 200;
the first reputation transaction includes a second identity and a first reputation score, and the first reputation transaction is generated by encrypting a first identity sent by the first client 100 by the first server 200 using a first public key to generate a second identity, and packaging the second identity and the first reputation score sent by the first client 100.
S802, verifying the validity of the first credit transaction according to an intelligent contract;
s803, when the validity verification is successful, adding a platform type identifier to the first credit transaction, storing the first credit transaction in a storage domain and uploading the first credit transaction;
by the method provided by the application, real-time and reliable data interaction among the first client 100, the first server 200 and the blockchain platform 300 can be realized, and meanwhile, the decentralised management reputation data reduces human factor interference.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a reputation management platform based on blockchain according to an embodiment of the present application.
The voting platform 1 may comprise: a first acquisition module 11, a first encryption module 12, a first packing module 13, a validity verification module 14:
a first obtaining module 11, configured to obtain a reputation data packet sent by a first client 100, where the reputation data packet includes a first identity identifier and a first reputation score, and the first reputation score is generated by the first client 100.
A first encryption module 12, configured to encrypt the first identity identifier with a first public key to generate a second identity identifier; the first public key is generated and disclosed by the blockchain platform 300 and is unique.
The first packing module 13 is configured to pack the second identity and the first reputation score into a first reputation transaction, send the first reputation transaction to the blockchain platform 300, and store the reputation data packet.
A validity verification module 14, configured to perform validity verification on the first reputation transaction according to an intelligent contract; and when the validity verification is successful, the first credit transaction is added with a platform type identifier and then stored in a storage domain and is uplink.
Referring to fig. 10, fig. 10 is a schematic structural diagram of a computer device according to an embodiment of the application.
As shown in fig. 10, the computer device 1000 may include: processor 1001, network interface 1004, and memory 1005, in addition, computer device 1000 may further comprise: a user interface 1003, and at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface, among others. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may also optionally be at least one storage platform located remotely from the processor 1001. As shown in fig. 7, an operating system, a network communication module, a user interface module, and a device control application program may be included in a memory 1005, which is one type of computer storage medium.
In the computer device 1000 shown in FIG. 10, the network interface 1004 may provide network communication functions; while user interface 1003 is primarily used as an interface for providing input to a user; and processor 1001 may be used to invoke the device control application stored in memory 1005 to implement the description of the blockchain-based reputation management method in any of the corresponding embodiments of fig. 8 above. It should be understood that the computer device 1000 described in the present application may also perform the description of the reputation management platform 1 in the remaining embodiments, which is not described herein. In addition, the description of the beneficial effects of the same method is omitted.
Furthermore, it should be noted here that: the present application also provides a computer readable storage medium, in which a computer program executed by the reputation management platform 1 mentioned above is stored, and the computer program includes program instructions, when executed by a processor, can execute the description of the blockchain-based reputation management method in any of the embodiments corresponding to fig. 8, and therefore, a detailed description will not be given here. In addition, the description of the beneficial effects of the same method is omitted. For technical details not disclosed in the embodiments of the computer storage medium according to the present application, please refer to the description of the method embodiments of the present application.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of computer programs, which may be stored on a computer-readable storage medium, and which, when executed, may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), or the like.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or may be up to such process, method, article, or apparatus
Inherent elements. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing describes specific embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The terminology used in the one or more embodiments of the specification is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the specification. As used in this specification, one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in one or more embodiments of the present description to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
The foregoing description of the preferred embodiment(s) is (are) merely intended to illustrate the embodiment(s) of the present invention, and it is not intended to limit the embodiment(s) of the present invention to the particular embodiment(s) described.

Claims (4)

1. A blockchain-based reputation management method, comprising:
the method comprises the steps that a first client sends a reputation data packet to a first service end, wherein the reputation data packet comprises a first identity identifier and a first reputation score, and the first reputation score is generated by the first client;
the first server encrypts the first identity identifier by using a first public key to generate a second identity identifier, packages the second identity identifier and the first reputation score to a first reputation transaction, and sends the first reputation transaction to a blockchain platform, and simultaneously stores the reputation data packet; the first public key is generated and disclosed by the blockchain platform and is unique;
the blockchain platform performs validity verification on the first credit transaction according to an intelligent contract; when the validity verification is successful, the first credit transaction is added with a platform type identifier and then stored in a storage domain and is uplink; wherein, each transaction of the platform type corresponds to a storage function, the platform type identifier is preset in the storage function, and each first server is only authorized to allow one of the storage functions to be called;
The second server monitors the block chain platform;
when a new block is uplink on the blockchain platform, the second server side acquires the new block, acquires a corresponding first reputation score set in the blockchain platform according to the second identity identifier and the platform type identifier in the new block, calculates and generates a second reputation score according to the first reputation score set, and packages the second identity identifier, the platform type identifier and the second reputation score into a second reputation transaction to be sent to the blockchain platform; the second server side uses machine learning training in advance to generate an evaluation model, and the first reputation score set is calculated through the evaluation model to generate the second reputation score;
the second client sends an endorsement data packet to a third server, wherein the endorsement data packet comprises the first identity identifier, the platform type identifier and a guarantee certificate;
the third server performs endorsement verification on the endorsement data packet; when the endorsement verification is successful, the third server generates the second identity mark through the encryption of the first public key according to the first identity mark, determines a third reputation score according to the amount of the deposit, packages the third reputation score together with the platform type mark to a third reputation transaction, and sends the third reputation transaction to the blockchain platform, and stores the endorsement data packet; and the value type and the value range of the third reputation score are consistent with the first reputation score.
2. The method of claim 1, wherein the blockchain platform performs a validation of the first reputation transaction according to the smart contract, comprising:
determining that the validity verification is successful when the first server public key address is contained in a public key address set, and determining that the validity verification is failed when the first server public key address is not contained in the public key address set;
the public key address set is preset in the intelligent contract storage domain, and the first server public key address is contained in the first credit transaction.
3. The method according to claim 1, wherein the method further comprises:
the second client sends a registration data packet to the first service end, wherein the registration data packet comprises the first identity identifier;
the first server side performs malicious user verification on the registration data packet; when the malicious user is successfully authenticated, storing the registration data packet; and discarding the registration data packet when the malicious user fails to verify.
4. A method according to claim 3, wherein said malicious user authentication of said registration packet comprises:
The first server encrypts the first identity identifier by using the first public key to generate the second identity identifier, and obtains the corresponding second reputation score from the blockchain platform according to the second identity identifier and the platform type identifier;
when the second reputation score is higher than a reputation threshold, determining that the malicious user is successfully authenticated; determining that the malicious user verification fails when the second reputation score is below the reputation threshold;
wherein the reputation threshold is preset.
CN202211130246.1A 2022-08-11 2022-09-16 Reputation management method based on block chain Active CN115529170B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2022109623144 2022-08-11
CN202210962314 2022-08-11

Publications (2)

Publication Number Publication Date
CN115529170A CN115529170A (en) 2022-12-27
CN115529170B true CN115529170B (en) 2023-10-24

Family

ID=84698228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211130246.1A Active CN115529170B (en) 2022-08-11 2022-09-16 Reputation management method based on block chain

Country Status (1)

Country Link
CN (1) CN115529170B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364218A (en) * 2018-02-11 2018-08-03 中国银行股份有限公司 A kind of sharing method and device of user's collage-credit data
CN110765146A (en) * 2019-10-21 2020-02-07 深圳市炳德区块链技术有限公司 Block chain-based merchant credit value method, device, node and storage medium thereof
CN111598681A (en) * 2020-04-30 2020-08-28 深圳前海星际同辉科技有限公司 Credit evaluation method, credit evaluation system and readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109101787B (en) * 2018-07-18 2020-11-06 创新先进技术有限公司 Method and device for credit evaluation of copyright user based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108364218A (en) * 2018-02-11 2018-08-03 中国银行股份有限公司 A kind of sharing method and device of user's collage-credit data
CN110765146A (en) * 2019-10-21 2020-02-07 深圳市炳德区块链技术有限公司 Block chain-based merchant credit value method, device, node and storage medium thereof
CN111598681A (en) * 2020-04-30 2020-08-28 深圳前海星际同辉科技有限公司 Credit evaluation method, credit evaluation system and readable storage medium

Also Published As

Publication number Publication date
CN115529170A (en) 2022-12-27

Similar Documents

Publication Publication Date Title
US20210297240A1 (en) Systems and methods for distributed data storage and delivery using blockchain
EP3073670B1 (en) A system and a method for personal identification and verification
Joshi et al. Unified authentication and access control for future mobile communication‐based lightweight IoT systems using blockchain
Zhong et al. Distributed blockchain‐based authentication and authorization protocol for smart grid
Liu et al. Enabling secure and privacy preserving identity management via smart contract
CN107483585A (en) The efficient data integrality auditing system and method for safe duplicate removal are supported in cloud environment
CN101401341A (en) Secure data parser method and system
CN102782694A (en) Transaction auditing for data security devices
CN103095733A (en) Keyword cipher text retrieval method for cloud storage
Bergquist Blockchain technology and smart contracts: privacy-preserving tools
US20190288833A1 (en) System and Method for Securing Private Keys Behind a Biometric Authentication Gateway
CN107347073B (en) A kind of resource information processing method
CN109754322A (en) A kind of data service system
Akinyede et al. Development of a secure mobile e-banking system
Khanji et al. Boosting iot efficiency and security through blockchain: blockchain-based car insurance process-a case study
CN116805078A (en) Logistics information platform data intelligent management system and method based on big data
KR102517001B1 (en) System and method for processing digital signature on a blockchain network
CN115529170B (en) Reputation management method based on block chain
CN116366256A (en) Ethernet intelligent contract vulnerability information security sharing system and method thereof
Rani et al. A block chain-based approach using proof of continuous work consensus algorithm to secure the educational records
Gao et al. Trusted Cloud Service System Based on Block Chain Technology
Haga et al. IoT‐Based Autonomous Pay‐As‐You‐Go Payment System with the Contract Wallet
Yu et al. A novel fair and verifiable data trading scheme
Gagged et al. Improved secure dynamic bit standard technique for a private cloud platform to address security challenges
CN111695096B (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230921

Address after: 276000 Room 409, Building A, Global International, Beicheng New Area, Lanshan District, Linyi City, Shandong Province

Applicant after: Shandong Baizeng Network Technology Co.,Ltd.

Address before: 310000 No. 10268, Jianshe 4th Road, Guali Town, Xiaoshan District, Hangzhou, Zhejiang

Applicant before: Hangzhou Bonian Cultural Creativity Co.,Ltd.

GR01 Patent grant
GR01 Patent grant