Enterprise data signature method and device based on block chain

文档序号:1649981 发布日期:2019-12-24 浏览:17次 中文

阅读说明:本技术 基于区块链的企业数据签名方法及装置 (Enterprise data signature method and device based on block chain ) 是由 刘哲 傅洁 胡伦良 张海斌 于 2018-06-14 设计创作,主要内容包括:本发明提出基于区块链的企业数据签名方法及装置。方法包括:区块链控制中心接收来自第一企业用户的数据提交员的区块链企业用户注册请求,为数据提交员分配公钥私钥对;接收来自第一企业用户的数据审核员的区块链企业用户注册请求,为数据审核员分配公钥私钥对;接收第一企业用户的数据提交员发来的第一次签名后的数据,将该第一次签名后的数据发送给第一企业用户的数据审核员;接收第一企业用户的数据审核员发来的第二次签名后的数据,将第二次签名后的数据提交到区块链节点。本发明提高了基于区块链的企业数据签名的可靠性。(The invention provides an enterprise data signature method and device based on a block chain. The method comprises the following steps: the method comprises the steps that a blockchain control center receives a blockchain enterprise user registration request from a data submitter of a first enterprise user, and distributes a public key and a private key pair for the data submitter; receiving a block chain enterprise user registration request from a data auditor of a first enterprise user, and distributing a public key and a private key pair for the data auditor; receiving data which is signed for the first time and sent by a data submitter of a first enterprise user, and sending the data which is signed for the first time to a data auditor of the first enterprise user; and receiving the data signed for the second time sent by the data auditor of the first enterprise user, and submitting the data signed for the second time to the block link point. The invention improves the reliability of enterprise data signature based on the block chain.)

1. An enterprise data signature method based on a block chain is characterized by comprising the following steps:

the method comprises the steps that a blockchain control center receives a blockchain enterprise user registration request from a data submitter of a first enterprise user, and distributes a public key and a private key pair for the data submitter;

the method comprises the steps that a blockchain control center receives a blockchain enterprise user registration request from a data auditor of a first enterprise user, and distributes a public key and a private key pair for the data auditor;

the block chain control center receives data which is signed for the first time and sent by a data submitter of a first enterprise user, and sends the data which is signed for the first time to a data auditor of the first enterprise user, wherein the data which is signed for the first time is as follows: the data submitting personnel adopts the own public key to sign the original data to obtain the signature;

the block chain control center receives data signed for the second time sent by a data auditor of the first enterprise user, and submits the data signed for the second time to the block chain node, wherein the data signed for the second time is as follows: and the data auditor adopts the own public key to sign the data signed for the first time to obtain the signature result.

2. The method of claim 1, wherein the block chain control center further comprising after submitting the second signed data to a block chain node:

the block chain control center receives a block data acquisition request from a second enterprise user, inquires block data meeting the request condition, and sends the address of the inquired block data and private keys of a data auditor and a data submitter of the block data to a client of the second enterprise user, so that: and the second enterprise user decrypts the block data by using the private keys of the data auditor and the data submitter to obtain the original data.

3. The method of claim 1, wherein the block chain control center further comprises, after receiving the second signed data from the first enterprise user's data auditor, prior to uploading the second signed data to the block chain node:

and the block chain control center adopts public keys of a data auditor and a data submitter to verify whether the second signature and the first signature are correct, and if so, the action of submitting the data subjected to the second signature to the block chain link points is executed.

4. The method of claim 1 or 3, wherein the block chain control center further comprises, after receiving the second signed data from the first enterprise user's data auditor, prior to submitting the second signed data to the block chain node:

and the block chain control center encapsulates the data subjected to the second signature, and adds an enterprise data mark in an encapsulation head.

5. The method of claim 1, wherein assigning a public-private key pair to a data submitter comprises:

generation of two prime numbers p using a random function1、q1Wherein p is1>100,q1>100;

Calculating N1=p1*q1

Calculating L1=lcm(p1-1,q1-1), where lcm is the least common multiple operator;

calculation satisfies 1<E1<L1And gcd (E)1,L1) Condition 1E1Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D1<L1And E1*D1mod L1Condition D11Wherein mod is a remainder operator;

determining a public key ═ (E)1,N1) Private key ═ D1,N1);

The distributing public key and private key pairs for the data auditor comprises the following steps:

generation of two prime numbers p using a random function2、q2Wherein p is2>100,q2>100;

Calculating N2=p2*q2

Calculating L2=lcm(p2-1,q2-1), where lcm is the least common multiple operator;

calculation satisfies 1<E2<L2And gcd (E)2,L2) Condition 1E2Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D2<L2And E2*D2mod L2Condition D12Wherein mod is a remainder operator;

determining a public key ═ (E)2,N2) Private key ═ D2,N2)。

6. An enterprise data signing device based on a block chain is characterized in that the device comprises:

the registration processing module is used for receiving a block chain enterprise user registration request from a data submitter of a first enterprise user and distributing a public key and a private key pair for the data submitter; receiving a block chain enterprise user registration request from a data auditor of a first enterprise user, and distributing a public key and a private key pair for the data auditor;

the data processing and submitting module is used for receiving the data which is signed for the first time and sent by the data submitter of the first enterprise user, and sending the data which is signed for the first time to the data auditor of the first enterprise user, wherein the data which is signed for the first time is as follows: the data submitting personnel adopts the own public key to sign the original data to obtain the signature; receiving second-time signed data sent by a data auditor of a first enterprise user, and submitting the second-time signed data to a block link point, wherein the second-time signed data are as follows: and the data auditor adopts the own public key to sign the data signed for the first time to obtain the signature result.

7. The apparatus of claim 6, further comprising: the block data request processing module is used for receiving a block data acquisition request from a second enterprise user, inquiring block data meeting request conditions, and sending the address of the inquired block data and private keys of a data auditor and a data submitter of the block data to a client of the second enterprise user so as to enable: and the second enterprise user decrypts the block data by using the private keys of the data auditor and the data submitter to obtain the original data.

8. The apparatus of claim 6, wherein the data processing and submission module is further configured to receive the second signed data from the data auditor of the first enterprise user,

and verifying whether the second signature and the first signature are correct or not by adopting public keys of a data auditor and a data submitter, and if so, executing the action of uploading the data subjected to the second signature to the block chain node.

9. The apparatus of claim 6 or 8, wherein the data processing and submission module is further configured to receive the second signed data from the data auditor of the first enterprise user,

and packaging the data subjected to the second signature, and adding an enterprise data mark in a packaging head.

10. The apparatus of claim 6, wherein the registration processing module assigns a public key and private key pair to the data submitter comprises:

generation of two prime numbers p using a random function1、q1Wherein p is1>100,q1>100;

Calculating N1=p1*q1

Calculating L1=lcm(p1-1,q1-1), where lcm is the least common multiple operator;

calculation satisfies 1<E1<L1And gcd (E)1,L1) Condition 1E1Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D1<L1And E1*D1mod L1Condition D11Wherein mod is a remainder operator;

determining a public key ═ (E)1,N1) Private key ═ D1,N1);

The registration processing module distributes public key and private key pairs for the data auditor, and the method comprises the following steps:

generation of two prime numbers p using a random function2、q2Wherein p is2>100,q2>100;

Calculating N2=p2*q2

Calculating L2=lcm(p2-1,q2-1), where lcm is the least common multiple operator;

calculation satisfies 1<E2<L2And gcd (E)2,L2) Condition 1E2Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D2<L2And E2*D2mod L2Condition D12Wherein mod is a remainder operator;

determining a public key ═ (E)2,N2) Private key ═ D2,N2)。

Technical Field

The invention relates to the technical field of block chains, in particular to an enterprise data signature method and device based on a block chain.

Background

The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system.

In a block chain distributed network, communication among nodes and trust achievement need to rely on a digital signature technology, and identity confirmation and information authenticity and integrity verification are mainly realized.

The blockchain is a distributed system of P2P, and common digital signatures include symmetric encryption and asymmetric encryption, and ownership of data is possessed only by holding a secret key. In block chain data transaction, data can be transacted with a correct key regardless of the true identities of the two parties to the transaction.

This unique digital signature technique is disadvantageous when the owner of the data is an enterprise user. Such as employee logoff or other reasons for the unique key, there is a risk that the enterprise loses ownership of the data.

Disclosure of Invention

The invention provides an enterprise data signature method and device based on a block chain, and aims to improve the reliability of enterprise data signatures based on the block chain.

The technical scheme of the invention is realized as follows:

an enterprise data signature method based on a block chain comprises the following steps:

the method comprises the steps that a blockchain control center receives a blockchain enterprise user registration request from a data submitter of a first enterprise user, and distributes a public key and a private key pair for the data submitter;

the method comprises the steps that a blockchain control center receives a blockchain enterprise user registration request from a data auditor of a first enterprise user, and distributes a public key and a private key pair for the data auditor;

the block chain control center receives data which is signed for the first time and sent by a data submitter of a first enterprise user, and sends the data which is signed for the first time to a data auditor of the first enterprise user, wherein the data which is signed for the first time is as follows: the data submitting personnel adopts the own public key to sign the original data to obtain the signature;

the block chain control center receives data signed for the second time sent by a data auditor of the first enterprise user, and submits the data signed for the second time to the block chain node, wherein the data signed for the second time is as follows: and the data auditor adopts the own public key to sign the data signed for the first time to obtain the signature result.

After the block chain control center submits the data after the second signature to the block chain link point, the method further comprises the following steps:

the block chain control center receives a block data acquisition request from a second enterprise user, inquires block data meeting the request condition, and sends the address of the inquired block data and private keys of a data auditor and a data submitter of the block data to a client of the second enterprise user, so that: and the second enterprise user decrypts the block data by using the private keys of the data auditor and the data submitter to obtain the original data.

The block chain control center further includes, after receiving the data signed for the second time sent by the data auditor of the first enterprise user, uploading the data signed for the second time to the block chain node:

and the block chain control center adopts public keys of a data auditor and a data submitter to verify whether the second signature and the first signature are correct, and if so, the action of submitting the data subjected to the second signature to the block chain link points is executed.

After receiving the data signed for the second time sent by the data auditor of the first enterprise user, the block chain control center further includes, before submitting the data signed for the second time to the block chain node:

and the block chain control center encapsulates the data subjected to the second signature, and adds an enterprise data mark in an encapsulation head.

The distributing public key and private key pairs for the data submitters comprises:

generation of two prime numbers p using a random function1、q1Wherein p is1>100,q1>100;

Calculating N1=p1*q1

Calculating L1=lcm(p1-1,q1-1), where lcm is the least common multiple operator;

calculation satisfies 1<E1<L1And gcd (E)1,L1) Condition 1E1Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D1<L1And E1*D1mod L1Condition D11Wherein mod is a remainder operator;

determining a public key ═ (E)1,N1) Private key ═ D1,N1);

The distributing public key and private key pairs for the data auditor comprises the following steps:

generation of two prime numbers p using a random function2、q2Wherein p is2>100,q2>100;

Calculating N2=p2*q2

Calculating L2=lcm(p2-1,q2-1), where lcm is the least common multiple operator;

calculation satisfies 1<E2<L2And gcd (E)2,L2) Condition 1E2Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D2<L2And E2*D2mod L2Condition D12Wherein mod is a remainder operator;

determining a public key ═ (E)2,N2) Private key ═ D2,N2)。

An enterprise data signing device based on a block chain, the device comprising:

the registration processing module is used for receiving a block chain enterprise user registration request from a data submitter of a first enterprise user and distributing a public key and a private key pair for the data submitter; receiving a block chain enterprise user registration request from a data auditor of a first enterprise user, and distributing a public key and a private key pair for the data auditor;

the data processing and submitting module is used for receiving the data which is signed for the first time and sent by the data submitter of the first enterprise user, and sending the data which is signed for the first time to the data auditor of the first enterprise user, wherein the data which is signed for the first time is as follows: the data submitting personnel adopts the own public key to sign the original data to obtain the signature; receiving second-time signed data sent by a data auditor of a first enterprise user, and submitting the second-time signed data to a block link point, wherein the second-time signed data are as follows: and the data auditor adopts the own public key to sign the data signed for the first time to obtain the signature result.

The apparatus further comprises: the block data request processing module is used for receiving a block data acquisition request from a second enterprise user, inquiring block data meeting request conditions, and sending the address of the inquired block data and private keys of a data auditor and a data submitter of the block data to a client of the second enterprise user so as to enable: and the second enterprise user decrypts the block data by using the private keys of the data auditor and the data submitter to obtain the original data.

The data processing and submitting module is further configured to receive the second signed data from the data auditor of the first enterprise user,

and verifying whether the second signature and the first signature are correct or not by adopting public keys of a data auditor and a data submitter, and if so, executing the action of uploading the data subjected to the second signature to the block chain node.

The data processing and submitting module is further configured to receive the second signed data from the data auditor of the first enterprise user,

and packaging the data subjected to the second signature, and adding an enterprise data mark in a packaging head.

The registration processing module distributes a public key and a private key pair for the data submitter, and comprises the following steps:

generation of two prime numbers p using a random function1、q1Wherein p is1>100,q1>100;

Calculating N1=p1*q1

Calculating L1=lcm(p1-1,q1-1), where lcm is the least common multiple operator;

calculation satisfies 1<E1<L1And gcd (E)1,L1) Condition 1E1Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D1<L1And E1*D1mod L1Condition D11Wherein mod is a remainder operator;

determining a public key ═ (E)1,N1) Private key ═ D1,N1);

The registration processing module distributes public key and private key pairs for the data auditor, and the method comprises the following steps:

generation of two prime numbers p using a random function2、q2Wherein p is2>100,q2>100;

Calculating N2=p2*q2

Calculating L2=lcm(p2-1,q2-1), where lcm is the least common multiple operator;

calculation satisfies 1<E2<L2And gcd (E)2,L2) Condition 1E2Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D2<L2And E2*D2mod L2Condition D12Wherein mod is a remainder operator;

determining a public key ═ (E)2,N2) Private key ═ D2,N2)。

According to the invention, the data submitter role and the data auditor role are set for the enterprise user, and different secret key pairs are allocated to the two roles, so that the data is subjected to signature twice and then submitted to the block chain node, and the reliability of the block data of the enterprise user is ensured.

Drawings

The following drawings are only schematic illustrations and explanations of the present invention, and do not limit the scope of the present invention.

Fig. 1 is a flowchart of an enterprise data signing method based on a block chain according to an embodiment of the present invention;

FIG. 2 is a flowchart of a block chain-based enterprise data signing method according to another embodiment of the present invention;

FIG. 3 is a flowchart of a method for decrypting blockchain data according to an embodiment of the present invention;

fig. 4 is a schematic structural diagram of an enterprise data signing apparatus based on a block chain according to an embodiment of the present invention.

Detailed Description

In order to more clearly understand the technical features, objects, and effects of the present invention, embodiments of the present invention will now be described with reference to the accompanying drawings.

Fig. 1 is a flowchart of an enterprise data signing method based on a block chain according to an embodiment of the present invention, which includes the following specific steps:

step 101: the blockchain control center receives a blockchain enterprise user registration request from a data submitter of a first enterprise user and distributes a public key and a private key pair to the data submitter.

Step 102: the blockchain control center receives a blockchain enterprise user registration request from a data auditor of the first enterprise user, and distributes a public key and a private key pair to the data auditor.

Step 103: the block chain control center receives data which is signed for the first time and sent by a data submitter of a first enterprise user, and sends the data which is signed for the first time to a data auditor of the first enterprise user, wherein the data which is signed for the first time is as follows: and the data submitter signs the original data by adopting the own public key to obtain the signature.

Step 104: the block chain control center receives data signed for the second time sent by a data auditor of the first enterprise user, and submits the data signed for the second time to the block chain node, wherein the data signed for the second time is as follows: and the data auditor adopts the own public key to sign the data signed for the first time to obtain the signature result.

Step 105: and the block chain control center receives a block data acquisition request from a second enterprise user, inquires block data meeting the request condition, and sends the address of the inquired block data and private keys of a data auditor and a data submitter of the block data to a client of the second enterprise user.

Step 106: and the second enterprise user decrypts the block data by using the private keys of the data auditor and the data submitter to obtain the original data.

Fig. 2 is a flowchart of an enterprise data signing method based on a block chain according to another embodiment of the present invention, which includes the following specific steps:

step 201: the client of the enterprise user A sends a block chain enterprise user registration request to a block chain control center, wherein the request carries registration information of a data submitter, and the registration information comprises: enterprise user a identification, data submitter role indicia, and data submitter user name, password, etc.

Step 202: and the blockchain control center receives the request, generates a public key and private key pair for the data submitter, sends the public key and private key pair to the data submitter through a client of the enterprise user A, and adds the enterprise user A identification, the registration information of the data submitter and the public key and private key pair of the data submitter into the blockchain enterprise user list as a new enterprise user table item.

Step 203: the client of the enterprise user A sends a block chain enterprise user registration request to a block chain control center, wherein the request carries registration information of a data auditor, and the registration information comprises: the enterprise user A identification, the role mark of the data auditor, the user name and the password of the data auditor and the like.

Step 204: and the blockchain control center receives the request, generates a public key and private key pair for the data auditor, sends the public key and private key pair to the data auditor through the client of the enterprise user A, meanwhile, the blockchain control center searches a corresponding enterprise user table item in the blockchain enterprise user list according to the enterprise user A identification, and adds the registration information of the data auditor and the public key and private key pair of the data auditor into the table item.

The public key and private key pairs of the data submitter and the data auditor can be generated by adopting the following algorithm:

01: two prime numbers p, q are generated using a random function, where p >100 and q > 100.

02: n ═ p × q was calculated.

03: l ═ lcm (p-1, q-1) is calculated, where lcm is the least common multiple operator.

04: e satisfying the condition of 1< E < L and gcd (E, L) ═ 1 is calculated, where gcd is the greatest common divisor operator.

05: d satisfying the condition of 1< D < L and E × D mod L ═ 1 is calculated, where mod is the remainder operator.

06: the public key is determined as (E, N) and the private key as (D, N).

Step 205: when enterprise user A wants to submit data to the blockchain, the data submitter uses its public key to the original data D on the client of enterprise user A0Signing for the first time to obtain data Du1Logging in a block chain control center by adopting a user name and a password of the user to log in the data Du1Sending the data D to a block chain control center which sends the data D to a data processing centeru1And saving the data into a data list of the first signature completion of the enterprise user A.

Step 206: the data auditor logs in the block chain control center by adopting the user name and the password of the data auditor through the client of the enterprise user A, and obtains data D from the block chain control centeru1And obtaining the public key of the data submitter from the block chain control center, and adopting the public key of the data submitter to verify Du1If the signature is correct, the data auditor adopts the own public key pair Du1Carrying out second signature to obtain data Du2D isu2And sending the data to a block chain control center.

If the data auditorDetermination Du1If the signature is incorrect for the first time, the subsequent process is not executed.

Step 207: the block chain control center searches the public keys of the data auditor and the data submitter in the block chain enterprise user list according to the enterprise user A identification, and adopts the public keys of the data auditor and the data submitter to verify Du2Whether the second signature and the first signature are correct or not, if so, comparing D according to a predefined block chain data formatu2And encapsulating, adding an enterprise data mark in an encapsulation head, submitting the encapsulated data to a block link point, and storing the address of the data in a corresponding enterprise user table entry.

If the blockchain control center determines Du2If the signature is incorrect for the second or first time, the subsequent process is not executed.

Fig. 3 is a flowchart of a block chain data decryption method according to an embodiment of the present invention, which includes the following steps:

step 301: a client of an enterprise user B sends a block data acquisition request to a block chain control center, wherein the request carries block data request conditions as follows: data type, data content, etc.

Step 302: and the block chain control center receives the acquisition request, inquires block data meeting conditions, and sends the address of the inquired block data and private keys of a data auditor and a data submitter of the block data to a client of the enterprise user B.

Step 303: and the client of the enterprise user B acquires the block data according to the address of the block data, analyzes the packaging head of the block data, judges whether the packaging head contains an enterprise data mark, and if so, confirms that the block data is valid.

Step 304: and the client of the enterprise user B decrypts the block data for the first time by using the private key of the data auditor to obtain the data signed for the first time.

Step 305: and the client of the enterprise user B decrypts the data signed for the first time by using the private key of the data auditor to obtain the original data.

Fig. 4 is a schematic structural diagram of an enterprise data signing apparatus based on a block chain according to an embodiment of the present invention, where the apparatus mainly includes: a registration processing module 41, a data processing and submitting module 42, and a block data request processing module 43, wherein:

a registration processing module 41, configured to receive a blockchain enterprise user registration request from a data submitter of a first enterprise user, and allocate a public key and a private key pair to the data submitter; and receiving a block chain enterprise user registration request from a data auditor of the first enterprise user, and distributing a public key and private key pair for the data auditor.

The data processing and submitting module 42 is configured to receive the first signed data sent by the data submitter of the first enterprise user, and send the first signed data to the data auditor of the first enterprise user, where the first signed data is: the data submitting personnel adopts the own public key to sign the original data to obtain the signature; receiving second-time signed data sent by a data auditor of a first enterprise user, and submitting the second-time signed data to a block link point, wherein the second-time signed data are as follows: and the data auditor adopts the own public key to sign the data signed for the first time to obtain the signature result.

A block data request processing module 43, configured to receive a block data obtaining request from a second enterprise user, query block data meeting a request condition, and send an address of the queried block data and private keys of a data auditor and a data submitter of the block data to a client of the second enterprise user, so that: and the second enterprise user decrypts the block data by using the private keys of the data auditor and the data submitter to obtain the original data.

In practical applications, the data processing and submitting module 42 is further configured to verify whether the second signature and the first signature are correct by using public keys of the data auditor and the data submitter after receiving the second signed data sent by the data auditor of the first enterprise user, and if so, execute the action of uploading the second signed data to the block chain node.

In practical applications, the data processing and submitting module 42 is further configured to package the second signed data sent by the data auditor of the first enterprise user, and add an enterprise data flag to the package header.

In practical applications, the registration processing module 41 allocates a public key and a private key pair to the data submitter, including:

generation of two prime numbers p using a random function1、q1Wherein p is1>100,q1>100;

Calculating N1=p1*q1

Calculating L1=lcm(p1-1,q1-1), where lcm is the least common multiple operator;

calculation satisfies 1<E1<L1And gcd (E)1,L1) Condition 1E1Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D1<L1And E1*D1mod L1Condition D11Wherein mod is a remainder operator;

determining a public key ═ (E)1,N1) Private key ═ D1,N1);

The registration processing module 41 allocates a public key and a private key pair to the data auditor, and includes:

generation of two prime numbers p using a random function2、q2Wherein p is2>100,q2>100;

Calculating N2=p2*q2

Calculating L2=lcm(p2-1,q2-1), where lcm is the least common multiple operator;

calculation satisfies 1<E2<L2And gcd (E)2,L2) Condition 1E2Wherein, gcd is the operator for solving the greatest common divisor;

calculation satisfies 1<D2<L2And E2*D2mod L2Condition D12Wherein mod is a remainder operator;

determining a public key ═ (E)2,N2) Private key ═ D2,N2)。

The invention has the following beneficial technical effects:

according to the method and the device, the role of a data submitter and the role of a data auditor are set for the enterprise user, and different secret key pairs are distributed to the two roles, so that the data are subjected to signature twice and then submitted to the block chain nodes, the risk that the enterprise is possibly subjected to data ownership loss due to unique signature is avoided, and the reliability of the block data of the enterprise user is ensured.

The above-listed detailed description is only a specific description of a possible embodiment of the present invention and is not intended to limit the scope of the present invention, and equivalent embodiments or modifications such as combinations, divisions or repetitions of the features without departing from the technical spirit of the present invention are included in the scope of the present invention.

12页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于区块链的散列算法支付加密方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!