Malicious number mark recognition method based on block chain

An identification method and block chain technology, applied in block chain applications and mobile Internet security fields, can solve problems such as data tampering, personal information being stolen, and data authenticity cannot be guaranteed.

Inactive Publication Date: 2018-11-13
CHINA UNIV OF GEOSCIENCES (WUHAN)
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, telecommunications fraud methods emerge in endlessly, and various sales harassment calls and personal information are stolen from time to time. Now we generally install a certain manufacturer’s software on the mobile phone, and then prompt when there is a call. At present, these Security software that prevents harassment requires database support, but the data between manufacturers is not synchronized in time, and the maintenance and data services of software manufacturers are constantly needed to continuously improve its functions. In a limited number of situations, it is difficult to fully prevent, and the authenticity of the data cannot be guaranteed, and the data may be tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious number mark recognition method based on block chain
  • Malicious number mark recognition method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0020] Please refer to figure 1 with figure 2 , the embodiment of the present invention discloses a method for identifying a malicious number mark based on blockchain, including several alliance chain nodes, each of which has block data stored in the alliance chain nodes, and at least two of the alliance chain nodes Connect to each other, and make the block data of the connected alliance chain nodes realize data sharing, and build a public fraud number blockchain.

[0021] After the user connects a call, judge whether the call received by the current mobile phone is a fraudulent call according to the content of the call. When the received call is a fraudulent call, the user will mark it as a malicious number to generate marking information and send it ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a malicious number mark recognition method based on a block chain. The method comprises the following steps: a public fraud number block chain is formed by mutually associating multiple alliance chain nodes, the user judges whether a phone number answered by the current mobile phone is a fraud phone according to the call content after answering a phone; when the answered phone is the fraud phone, the user generates mark information for the malicious number and sends the mark information to the associated alliance chain node; the alliance chain node counts the mark information and writes the set of the acquired mark information into the block at fixed time, thereby obtaining the block data of the alliance chain node and forming a block head to add on the public fraud number block chain, wherein the public fraud number block chain is the de-centered database and tamper-resistant, and only the adding can be performed; the public fraud number block chain is traceable and capable of possessing the time sequence certificate; the propagation of each number mark information in the alliance chain adopts the distributed structure, the update speed is fast, and the data security is greatly improved.

Description

technical field [0001] The present invention relates to the field of mobile Internet security, in particular to the field of block chain application technology, and in particular to a method for identifying malicious number marks based on block chain. Background technique [0002] At present, telecommunications fraud methods emerge in endlessly, and various sales harassment calls and personal information are stolen from time to time. Now we generally install a certain manufacturer’s software on the mobile phone, and then prompt when there is a call. At present, these Security software that prevents harassment requires database support, but the data between manufacturers is not synchronized in time, and the maintenance and data services of software manufacturers are constantly needed to continuously improve its functions. In a limited number of situations, it is difficult to fully prevent, and the authenticity of the data cannot be guaranteed, and the data may be tampered wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04L29/08H04L9/06H04W12/128
CPCH04L9/0643H04L67/1095H04W12/12H04L12/14H04M15/00H04M15/47H04W4/24
Inventor 任伟
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products