Background
The types of webcasts include the following two types: 1) live broadcasts of television signals (e.g., live broadcasts of various sporting events and literary activities) are provided on the internet by capturing television (analog) signals, converting the analog signals to digital signals, and uploading the digital signals to a website in real time for viewing, equivalent to "web tv". 2) Independent signal acquisition equipment (such as audio acquisition equipment, video acquisition equipment and the like) is erected on a live broadcast site, the signal acquisition equipment directly guides acquired signals into a broadcasting guide terminal (such as broadcasting guide equipment or a broadcasting guide platform and the like), the broadcasting guide terminal uploads the acquired real-time signals to a server through a network, and the server releases and watches websites for people to watch.
However, with the development of network live broadcast service, more and more faking behaviors occur in live broadcast (for example, false active users, false appreciation or false ordering), and when statistics of actual transactions is performed, statistical information obtained by an operator is wrong, which is not beneficial for the operator to know the real needs of users. In addition, some live broadcast participating node devices can continuously send malicious messages, and poor user experience is brought to live broadcast services.
Disclosure of Invention
Therefore, the application provides a malicious node identification method and device and electronic equipment, so as to solve the problem of how to judge whether the node equipment participating in live broadcast is a malicious user.
In order to achieve the above object, a first aspect of the present application provides a method for identifying a malicious node, where the method includes: acquiring a first broadcast message sent by a node to be confirmed from a block chain network, wherein the node to be confirmed is a participating node participating in a live broadcast service, the first broadcast message comprises a communication message and an information type, and the information type is the type of information carried in the communication message; determining the credit degree of the node to be confirmed according to the communication message and the information type; and determining whether the node to be confirmed is a malicious node or not according to the credit degree of the node to be confirmed and a user credit degree list, wherein the user credit degree list comprises the credit degrees of the participating nodes.
In some implementations, determining the credit rating of the node to be confirmed according to the communication message and the information type includes: judging whether the communication message is effective or not according to an elliptic curve signature algorithm; when the communication message is determined to be effective, determining the credibility and the malicious degree of the node to be confirmed according to the information type; or when the communication message is determined to be invalid, adding one to the malicious degree of the node to be confirmed, and keeping the credibility unchanged; and calculating and obtaining the credit degree of the node to be confirmed according to the credibility and the malicious degree.
In some specific implementations, determining the trustworthiness and the maliciousness of the node to be confirmed according to the information type includes: when the information type is determined to be the interactive information between the node to be confirmed and other participating nodes, calculating the comprehensive error of the interactive information; determining the credibility and the malicious degree of the node to be confirmed according to the comprehensive error and a preset error threshold; when the information type is determined to be the authentication information, counting the number of credible authentication identifications and malicious authentication identifications in the authentication information obtained within a preset time length; and determining the credibility and the maliciousness of the node to be confirmed according to the number of the credible authentication identifications, the maliciousness authentication identifications and the number of the participating nodes participating in the live broadcast service.
In some specific implementations, determining the credibility and the maliciousness of the node to be confirmed according to the number of the trusted authentication identifiers, the number of the malicious authentication identifiers, and the number of the participating nodes participating in the live broadcast service includes: calculating to obtain the credibility of the node to be confirmed according to the number of the credible authentication identifications and the number of the participating nodes participating in the live broadcast service; and calculating to obtain the malicious degree of the node to be confirmed according to the number of the malicious authentication identifications and the number of the participating nodes participating in the live broadcast service.
In some implementations, determining whether the node to be confirmed is a malicious node according to the credit of the node to be confirmed and the user credit list includes: determining a credit degree preset threshold value according to the credit degree of each participating node in the user credit degree list; and determining whether the node to be confirmed is a malicious node or not according to the credit degree of the node to be confirmed and a preset threshold value of the credit degree.
In some implementations, after the step of determining whether the node to be confirmed is a malicious node according to the credit of the node to be confirmed and the user credit list, the method further includes: when the node to be confirmed is determined to be a malicious node, writing the identifier of the node to be confirmed into a member certificate revocation list; and sending the member certificate revocation list to the blockchain network so that the node to be confirmed can not participate in the live broadcast service.
In some implementations, after the step of sending the member certificate revocation list to the blockchain network so that the node to be confirmed cannot participate in the live broadcast service, the method further includes: and according to the member certificate revocation list, forbidding each participating node in the member certificate revocation list to participate in the live broadcast service.
In some specific implementations, prohibiting each participating node in the member certificate revocation list from participating in the live broadcast service according to the member certificate revocation list includes: and updating the member authentication key of each participating node in the member certificate revocation list according to the member certificate revocation list, so that each participating node in the member certificate revocation list cannot participate in the live broadcast service.
In order to achieve the above object, a second aspect of the present application provides an apparatus for identifying a malicious node, including: the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first broadcast message sent by a node to be confirmed from a block chain network, the node to be confirmed is a participating node participating in a live broadcast service, the first broadcast message comprises a communication message and an information type, and the information type is the type of information carried in the communication message; the credit degree determining module is used for determining the credit degree of the node to be confirmed according to the communication message and the information type; and the identification module is used for determining whether the node to be confirmed is a malicious node or not according to the credit degree of the node to be confirmed and a user credit degree list, wherein the user credit degree list comprises the credit degree of the participating node.
In order to achieve the above object, a third aspect of the present application provides an electronic apparatus comprising: one or more processors; the storage stores one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors implement any one of the malicious node identification methods in the embodiments of the present application.
This application has following advantage: acquiring a communication message and an information type sent by a node to be confirmed participating in a live broadcast service from a block chain network, wherein the information type is the type of information carried in the communication message; determining the credit degree of the node to be confirmed according to the communication message and the information type; according to the credit degree of the node to be confirmed and the user credit degree list, whether the node to be confirmed is a malicious node or not is determined, whether each participating node participating in the live broadcast service is a malicious user or not can be effectively identified, the malicious user is prevented from sending false information to a block chain network, the efficiency of the live broadcast service is improved, an operator can obtain real user demand information, the user can be better served, and the development of the live broadcast service is facilitated.
Detailed Description
The following detailed description of embodiments of the present application will be made with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present application, are given by way of illustration and explanation only, and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 illustrates a flowchart of a method for identifying a malicious node in an embodiment of the present application. The method can be applied to a malicious node identification device. As shown in fig. 1, the method specifically includes the following steps.
Step 110, a first broadcast message sent by a node to be confirmed is obtained from the blockchain network.
The node to be confirmed is a participating node participating in a live broadcast service, the first broadcast message comprises a communication message and an information type, and the information type is the type of information carried in the communication message.
For example, the information type may be interaction information between the node to be confirmed and other participating nodes, or may be an authentication message of the node to be confirmed, and according to the information type, different types of messages may be processed in a classified manner, so as to facilitate subsequent confirmation of a malicious node. It should be noted that the information types are only examples, and may be specifically set according to actual situations, and other unexplained information types are also within the protection scope of the present application and are not described herein again.
Andstep 120, determining the credit rating of the node to be confirmed according to the communication message and the information type.
In some implementations,step 120 can be implemented by determining whether the communication message is valid based on an elliptic curve signature algorithm; when the communication message is determined to be effective, determining the credibility and the malicious degree of the node to be confirmed according to the information type; or when the communication message is determined to be invalid, adding one to the malicious degree of the node to be confirmed, and keeping the credibility unchanged; and calculating and obtaining the credit degree of the node to be confirmed according to the credibility and the malicious degree.
The Elliptic Curve Signature Algorithm (ECDSA) may use a smaller key, so as to achieve higher efficiency and provide higher security for the user.
The validity of the communication message is judged through an elliptic curve signature algorithm, the credibility and the maliciousness of the node to be confirmed are obtained through calculation under different conditions, the colleague of the user information security is guaranteed, the credibility of the node to be confirmed can be quickly determined, the efficiency of troubleshooting the malicious node is improved, a malicious user is prevented from sending false messages to a block chain network, and the efficiency of live broadcast services is improved.
In some specific implementations, determining the trustworthiness and the maliciousness of the node to be confirmed according to the information type includes: when the information type is determined to be the interactive information between the node to be confirmed and other participating nodes, calculating the comprehensive error of the interactive information; determining the credibility and the malicious degree of the node to be confirmed according to the comprehensive error and a preset error threshold; when the information type is determined to be the authentication information, counting the number of credible authentication identifications and malicious authentication identifications in the authentication information obtained within a preset time length; and determining the credibility and the maliciousness of the node to be confirmed according to the number of the credible authentication identifications, the maliciousness authentication identifications and the number of the participating nodes participating in the live broadcast service.
It should be noted that the composite error may represent the correctness of the content of the interaction information sent by the node to be confirmed, so as to ensure that the interaction information received by other nodes is real and effective, avoid that the other nodes receive useless interference information, and improve the efficiency of user interaction.
In some specific implementations, determining the credibility and the maliciousness of the node to be confirmed according to the number of the trusted authentication identifiers, the number of the malicious authentication identifiers, and the number of the participating nodes participating in the live broadcast service includes: calculating to obtain the credibility of the node to be confirmed according to the number of the credible authentication identifications and the number of the participating nodes participating in the live broadcast service; and calculating to obtain the malicious degree of the node to be confirmed according to the number of the malicious authentication identifications and the number of the participating nodes participating in the live broadcast service.
For example, when the information type is determined to be an authentication message, counting that the number of trusted authentication identifiers in the authentication message received within 10 minutes is a, the number of malicious authentication identifiers received is B, and setting the number of participating nodes participating in the live broadcast service to be K, where a, B, and K are integers greater than or equal to 1. The credibility of the node to be confirmed can be expressed as the ratio of A/K, and the maliciousness of the node to be confirmed can be expressed as the ratio of B/K. Through the calculation, the specific type of the node to be confirmed can be quickly determined, and the malicious or goodwill condition of the node to be confirmed can be determined as soon as possible, so that the confirmation speed of the malicious node is increased, and the efficiency of the live broadcast service is improved.
Andstep 130, determining whether the node to be confirmed is a malicious node according to the credit degree of the node to be confirmed and the user credit degree list.
Wherein the user credit list comprises credits of the participating nodes.
In some implementations,step 130 may be implemented by determining a credit preset threshold based on credits of each participating node in the user credit list; and determining whether the node to be confirmed is a malicious node or not according to the credit degree of the node to be confirmed and a preset threshold value of the credit degree.
The credit degree of the node to be confirmed is compared with a preset threshold value of the credit degree, whether the credit degree of the node to be confirmed meets the requirement or not is determined, whether the node to be confirmed is a malicious node or not is further determined, the judgment efficiency of the malicious node is improved, the malicious node can be rapidly processed, and the efficiency of live broadcast services is improved.
In this embodiment, a communication message and an information type sent by a node to be confirmed participating in a live broadcast service are acquired from a block chain network, where the information type is a type of information carried in the communication message; determining the credit degree of the node to be confirmed according to the communication message and the information type; according to the credit degree of the node to be confirmed and the user credit degree list, whether the node to be confirmed is a malicious node or not is determined, whether each participating node participating in the live broadcast service is a malicious user or not can be effectively identified, the malicious user is prevented from sending false information to a block chain network, the efficiency of the live broadcast service is improved, an operator can obtain real user demand information, the user can be better served, and the development of the live broadcast service is facilitated.
Fig. 2 is a flowchart illustrating a method for identifying a malicious node in another embodiment of the present application. The method can be applied to a malicious node identification device. As shown in fig. 2, the method specifically includes the following steps.
Step 210, obtaining a first broadcast message sent by a node to be confirmed from the blockchain network.
Step 220, determining the credit rating of the node to be confirmed according to the communication message and the information type.
And step 230, determining whether the node to be confirmed is a malicious node according to the credit of the node to be confirmed and the user credit list.
It should be noted that steps 210 to 230 in this embodiment are the same assteps 110 to 130 in the previous embodiment, and are not described again here.
And 240, writing the identifier of the node to be confirmed into the member certificate revocation list when the node to be confirmed is determined to be a malicious node.
It should be noted that the member certificate revocation list includes all node identifiers confirmed as malicious nodes, and by querying the member certificate revocation list, specific nodes can be quickly confirmed as malicious nodes, which is beneficial to quickly processing malicious nodes, so as to improve the efficiency of live broadcast services.
Step 250, send member certificate revocation list to blockchain network.
When other nodes in the blockchain network acquire the member certificate revocation list, specific nodes can be inquired and known to be malicious nodes, for example, by inquiring the member certificate revocation list, the nodes to be confirmed can be known to be malicious nodes, and other nodes can reject the nodes to be confirmed, so that the nodes to be confirmed can not participate in the live broadcast service, the live broadcast service is prevented from being interrupted or being subjected to information attack by the malicious nodes, and the like, and the safe and orderly process of the live broadcast service is ensured.
In some implementations, afterstep 250, further comprising: and according to the member certificate revocation list, forbidding each participating node in the member certificate revocation list to participate in the live broadcast service.
For example, when the live broadcast node acquires the member certificate revocation list, the live broadcast node may set the identifier of each participating node in the member certificate revocation list as a prohibited participating node, so as to prevent malicious nodes from affecting the normal operation of the live broadcast service, and thus, the live broadcast service can be performed efficiently and orderly.
In some specific implementations, prohibiting each participating node in the member certificate revocation list from participating in the live broadcast service according to the member certificate revocation list includes: and updating the member authentication key of each participating node in the member certificate revocation list according to the member certificate revocation list, so that each participating node in the member certificate revocation list cannot participate in the live broadcast service.
For example, the member authentication keys of each participating node in the member certificate revocation list can be replaced, and the member authentication keys of the nodes are replaced by invalid keys, so that the nodes cannot participate in the live broadcast service because the authentication messages issued in the live broadcast service cannot be correctly decrypted, the processing of malicious nodes is accelerated, the live broadcast service is prevented from being interrupted or being subjected to information attack by the malicious nodes, and the like, and the safe and orderly process of the live broadcast service is ensured.
In this embodiment, by determining whether a node to be confirmed is a malicious node according to the credit of the node to be confirmed and the user credit list, whether each participating node participating in the live broadcast service is a malicious user can be effectively identified, and when it is determined that some participating nodes are malicious users, the identities of the malicious nodes are written into the member certificate revocation list, and the member certificate revocation list is sent to the blockchain network, so that when other nodes in the blockchain network acquire the member certificate revocation list, the malicious nodes can be quickly identified, and the malicious nodes are quickly processed (for example, member authentication keys of each participating node in the member certificate revocation list are updated, etc.), thereby avoiding that the malicious users send false messages to the live broadcast chain, improving the efficiency of the live broadcast service, and enabling an operator to obtain real user demand information, so as to better serve the user and be beneficial to the development of the live broadcast service.
Fig. 3 is a block diagram showing a malicious node identification apparatus according to an embodiment of the present application. The specific implementation of the apparatus can be referred to the related description of the above method embodiment, and repeated descriptions are omitted. It should be noted that the specific implementation of the apparatus in this embodiment is not limited to the above embodiment, and other embodiments not described are also within the protection scope of the apparatus.
As shown in fig. 3, the apparatus for identifying a malicious node specifically includes: an obtainingmodule 301, configured to obtain, from a blockchain network, a first broadcast message sent by a node to be confirmed, where the node to be confirmed is a participating node participating in a live broadcast service, the first broadcast message includes a communication message and an information type, and the information type is a type of information carried in the communication message; a credit determining module 302, configured to determine a credit of a node to be confirmed according to the communication message and the information type; the identifyingmodule 303 is configured to determine whether the node to be confirmed is a malicious node according to the credit of the node to be confirmed and a user credit list, where the user credit list includes the credits of the participating nodes.
In some implementations, the credit determination module 302 includes: the judging submodule is used for judging whether the communication message is effective or not according to an elliptic curve signature algorithm; the type degree determining submodule is used for determining the credibility and the malicious degree of the node to be determined according to the information type when the communication message is determined to be effective; or when the communication message is determined to be invalid, adding one to the malicious degree of the node to be confirmed, and keeping the credibility unchanged; and the credit calculation submodule is used for calculating and obtaining the credit of the node to be confirmed according to the credibility and the malicious degree.
In some specific implementations, the determining, by the type degree determining submodule, the credibility and the maliciousness degree of the node to be confirmed according to the information type includes: when the information type is determined to be the transaction information, calculating the comprehensive error of the transaction information; determining the credibility and the malicious degree of the node to be confirmed according to the comprehensive error and a preset error threshold; when the information type is determined to be the authentication information, counting the number of credible authentication identifications and malicious authentication identifications in the authentication information obtained within a preset time length; and determining the credibility and the maliciousness of the node to be confirmed according to the number of the credible authentication identifications, the maliciousness authentication identifications and the number of the participating nodes participating in the live broadcast service.
In some specific implementations, determining the credibility and the maliciousness of the node to be confirmed according to the number of the trusted authentication identifiers, the number of the malicious authentication identifiers, and the number of the participating nodes participating in the live broadcast service includes: calculating to obtain the credibility of the node to be confirmed according to the number of the credible authentication identifications and the number of the participating nodes participating in the live broadcast service; and calculating to obtain the malicious degree of the node to be confirmed according to the number of the malicious authentication identifications and the number of the participating nodes participating in the live broadcast service.
In some implementations, the identifyingmodule 303 includes: the first determining submodule is used for determining a credit degree preset threshold value according to the credit degrees of all the participating nodes in the user credit degree list; and the second determining submodule is used for determining whether the node to be confirmed is a malicious node or not according to the credit degree of the node to be confirmed and a preset threshold value of the credit degree.
In some implementations, the identifying device of the malicious node further includes: the writing module is used for writing the identifier of the node to be confirmed into the member certificate revocation list when the node to be confirmed is determined to be a malicious node; and the sending module is used for sending the member certificate revocation list to the blockchain network so that the node to be confirmed can not participate in the live broadcast service.
In some implementations, the identifying device of the malicious node further includes: and the forbidding module is used for forbidding each participating node in the member certificate revocation list to participate in the live broadcast service according to the member certificate revocation list.
In some implementations, the disabling module is configured to update the member authentication key of each participating node in the member certificate revocation list according to the member certificate revocation list, so that each participating node in the member certificate revocation list cannot participate in the live broadcast service.
In the embodiment, a communication message and an information type sent by a node to be confirmed participating in a live broadcast service are acquired from a block chain network through an acquisition module, wherein the information type is the type of information carried in the communication message; determining the credit degree of the node to be confirmed by using a credit degree determining module according to the communication message and the information type; the identification module determines whether the node to be confirmed is a malicious node or not according to the credit degree of the node to be confirmed and the user credit degree list, can effectively identify whether each participating node participating in the live broadcast service is a malicious user or not, avoids the malicious user from sending false information to a block chain network, improves the efficiency of the live broadcast service, enables an operator to obtain real user demand information, is convenient for better serving the user, and is beneficial to the development of the live broadcast service.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, a unit that is not so closely related to solving the technical problem proposed by the present application is not introduced in the present embodiment, but it does not indicate that no other unit exists in the present embodiment.
Fig. 4 is a block diagram illustrating a block chain based live system in an embodiment of the present application, where, as shown in fig. 4, the block chain based live system includes; a live device 410, a first participant node device 420, and a second participant node device 430. The live broadcast device 410 includes a malicious node identification apparatus 411, where the malicious node identification apparatus 411 is configured to identify whether each participating node device in the block chain-based live broadcast system is a malicious node device.
It should be noted that, in the block chain based live broadcast system, there may be a plurality of participating node devices (the first participating node device and the second participating node device are merely examples), and these participating node devices may be devices used by users participating in live broadcast, such as a smart phone, a tablet computer, and the like. The above participating node devices are only examples, and may be specifically set according to specific situations, and other participating node devices for explanation are also within the protection scope of the present application, and are not described herein again.
When the live broadcast system based on the block chain confirms whether each participating node device is a malicious node, the following method can be specifically adopted.
The live device 410 publishes the live service into the live blockchain network to enable the first participant node device 420 and the second participant node device 430 to view and join the live service. The first participating node device 420 and the second participating node device 430 respectively send join messages to join the live service released by the live device 410.
It should be noted that the live broadcast service published by the live broadcast device 410 is performed in a live blockchain network, and messages can be sent and interacted between the first participating node device 420 and the second participating node device 430, as well as between other participating node devices participating in the live broadcast service. Each participating node device submits the message records to a live broadcast blockchain network through a consensus mechanism, and the validity of the message records is automatically verified through an intelligent contract in the live broadcast blockchain network by using an authentication public key. When each participating node device joins the live broadcast blockchain network, the identifying device 411 of the malicious node in the live broadcast device 410 allocates an initial credit to the user corresponding to the participating node device. And then, calculating and obtaining the credit degree of the user corresponding to each participating node device through a formula (1).
The method comprises the following steps that Yi represents the credit degree of a user i corresponding to a participating node device i, M represents the credibility of the participating node device i, and N represents the malicious degree of the participating node device i; mi represents the number of trusted messages sent by the participating node device i, and Ni represents the number of malicious/false messages sent by the participating node device i. M ═ Mi +1, N ═ Ni +1, and the initial values of Mi and Ni are 1. For the participating node device newly joining the live broadcast blockchain network, since the number of times of sending malicious/false messages in the live broadcast blockchain network is 0, the initial credit of the participating node device can be calculated to be 5 according to the formula (1). When the number of times of sending the trusted message sent by the participating node device increases, the credit degree of the participating node device becomes higher; as the number of malicious or false messages sent by a participating node device increases, the credit rating of the participating node device may become lower.
When a participating node device sends a message to the live blockchain network, the message may be an interaction message between the participating node devices, or may be an authentication message sent by the participating node devices to the live device 410.
When the live broadcast device 410 acquires a broadcast message sent by a certain participating node device (e.g., a first participating node device 420) from a live broadcast blockchain network, first, the signature of the broadcast message is verified, and whether the broadcast message is valid is determined (e.g., whether the broadcast message is complete and valid is determined by using an elliptic curve signature algorithm, and if the broadcast message is invalid, Ni of the first participating node device 420 is added by 1); and when the broadcast message is determined to be a valid message, obtaining a message type through analysis, wherein the message type represents whether the communication information carried in the broadcast message is interactive information or authentication information.
Upon determining that the information type is interaction information between the node to be confirmed and other participating nodes (e.g., interaction information between the first participating node device 420 and the second participating node device 430), the identifying means 411 of the malicious node in the live device 410 calculates a composite error of the interaction information; when the aggregate error is within an allowable range of the preset error threshold (e.g., the aggregate error is less than or equal to the preset error threshold), the trustworthiness M of the first participating node device 420 is determined to be Mi +1, otherwise, when the aggregate error is greater than the preset error threshold, the maliciousness N of the first participating node device 420 is determined to be Ni + 1.
When the information type is determined to be the authentication message sent by the first participating node device 420 to the live broadcast device 410, counting the number of trusted authentication identifiers and the number of malicious authentication identifiers in the authentication message obtained within a preset time length; when the number of trusted authentication identities is greater than half of the total number of participating nodes participating in the live broadcast service (e.g., the total number of participating nodes participating in the live broadcast service is 30, then when the number of trusted authentication identities is greater than 15), determining that the trustworthiness M of the first participating node device 420 is Mi + 1; otherwise, the degree of maliciousness N of the first participating node device 420 is determined to be Ni + 1.
From the above statistics of the various situations, and the calculations using equation (1), the latest credits for the various participating node devices (e.g., first participating node device 420) may be obtained. Then, the identifying means 411 of the malicious node in the live device 410 may obtain the user credit list according to the latest credit of each participating node device. When a certain latest credit in the user credit list is lower than a preset credit threshold (for example, the preset credit threshold is 5), it indicates that the participating node device corresponding to the latest information is a malicious node, and the identifying device 411 of the malicious node needs to write the identifier of the malicious node into the member certificate revocation list, and update the member authentication key of the malicious node (for example, replace the member authentication key of the malicious node with an invalid key), so that each node in the block link network knows that the malicious node has been prohibited from participating in the live broadcast service.
In this embodiment, a communication message and an information type sent by a node to be confirmed participating in a live broadcast service are acquired from a live broadcast blockchain network, where the information type is a type of information carried in the communication message; determining the credit degree of the node to be confirmed according to the communication message and the information type; according to the credit degree of the node to be confirmed and the user credit degree list, whether the node to be confirmed is a malicious node or not is determined, whether each participating node participating in the live broadcast service is a malicious user or not can be effectively identified, the malicious user is prevented from sending false information to a live broadcast block link network, the efficiency of the live broadcast service is improved, an operator can obtain real user demand information, the user can be better served, and the development of the live broadcast service is facilitated.
Fig. 5 is a block diagram illustrating an exemplary hardware architecture of an electronic device capable of implementing the malicious node identification method and apparatus according to an embodiment of the present disclosure.
As shown in fig. 5, the electronic device 500 includes an input device 501, an input interface 502, a central processor 503, a memory 504, an output interface 505, an output device 506, and a bus 507. The input interface 502, the central processing unit 503, the memory 504, and the output interface 505 are connected to each other through a bus 507, and the input device 501 and the output device 506 are connected to the bus 507 through the input interface 502 and the output interface 505, respectively, and further connected to other components of the electronic device 500.
Specifically, the input device 501 receives input information from the outside and transmits the input information to the central processor 503 through the input interface 502; the central processor 503 processes input information based on computer-executable instructions stored in the memory 504 to generate output information, temporarily or permanently stores the output information in the memory 504, and then transmits the output information to the output device 506 through the output interface 505; the output device 506 outputs the output information to the outside of the electronic device 500 for use by the user.
In one embodiment, the electronic device shown in fig. 5 may be implemented as a system for identifying a malicious node, and the system for identifying a malicious node may include: a memory configured to store a program; a processor configured to execute the program stored in the memory to perform the method for identifying a malicious node described in the above embodiments.
The above are merely exemplary embodiments of the present application and are not intended to limit the scope of the present application. In general, the various embodiments of the application may be implemented in hardware or special purpose circuits, software, logic or any combination thereof. For example, some aspects may be implemented in hardware, while other aspects may be implemented in firmware or software which may be executed by a controller, microprocessor or other computing device, although the application is not limited thereto.
Embodiments of the application may be implemented by a data processor of a mobile device executing computer program instructions, for example in a processor entity, or by hardware, or by a combination of software and hardware. The computer program instructions may be assembly instructions, Instruction Set Architecture (ISA) instructions, machine related instructions, microcode, firmware instructions, state setting data, or source code or object code written in any combination of one or more programming languages.
Any logic flow block diagrams in the figures of this application may represent program steps, or may represent interconnected logic circuits, modules, and functions, or may represent a combination of program steps and logic circuits, modules, and functions. The computer program may be stored on a memory. The memory may be of any type suitable to the local technical environment and may be implemented using any suitable data storage technology, such as, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), optical storage devices and systems (digital versatile disks, DVDs, or CD discs), etc. The computer readable medium may include a non-transitory storage medium. The data processor may be of any type suitable to the local technical environment, such as but not limited to general purpose computers, special purpose computers, microprocessors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), programmable logic devices (FGPAs), and processors based on a multi-core processor architecture.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present application, and that the present application is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the application, and these changes and modifications are to be considered as the scope of the application.