CN111245799A - Information monitoring method and device and readable storage medium - Google Patents

Information monitoring method and device and readable storage medium Download PDF

Info

Publication number
CN111245799A
CN111245799A CN202010003191.2A CN202010003191A CN111245799A CN 111245799 A CN111245799 A CN 111245799A CN 202010003191 A CN202010003191 A CN 202010003191A CN 111245799 A CN111245799 A CN 111245799A
Authority
CN
China
Prior art keywords
information
user
terminal node
operation data
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010003191.2A
Other languages
Chinese (zh)
Other versions
CN111245799B (en
Inventor
王星雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010003191.2A priority Critical patent/CN111245799B/en
Publication of CN111245799A publication Critical patent/CN111245799A/en
Application granted granted Critical
Publication of CN111245799B publication Critical patent/CN111245799B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses an information monitoring method, an information monitoring device and a computer readable storage medium, wherein the information monitoring method comprises the following steps: receiving information, wherein the information is information sent by an instant messaging application; judging whether the source of the information is legal or not under the condition that the information comprises sensitive information; in the event that the source of the information is illegal, a processing action is taken. The embodiment of the invention can improve the privacy of the user and the property safety guarantee.

Description

Information monitoring method and device and readable storage medium
Technical Field
The present application relates to the field of block chain technologies, and in particular, to an information monitoring method and apparatus, and a readable storage medium.
Background
Instant messaging applications such as WeChat and QQ have become important ways of people to connect in daily life. However, with the advent of text forwarding information, video Artificial Intelligence (AI) face exchange, and speech synthesis information, one user may pretend to be another user to send information to a third user. After receiving the information, the user can only subjectively determine the information source, so that the reliability of the information source cannot be accurately determined, and the privacy and property safety guarantee of the user is reduced.
Disclosure of Invention
The embodiment of the invention discloses an information monitoring method, an information monitoring device and a readable storage medium, which are used for improving the privacy of a user and guaranteeing the property safety.
A first aspect discloses an information monitoring method applied to a monitoring node in a blockchain network, the method including:
receiving information, wherein the information is information sent by an instant messaging application;
judging whether the source of the information is legal or not under the condition that the information comprises sensitive information;
in case the source of the information is illegal, a handling measure is taken.
As a possible implementation, the receiving information includes:
receiving information from a first terminal node, wherein the information is information sent by the first terminal node to a second terminal node, and the first terminal node and the second terminal node are two different terminal nodes in the block chain network;
the taking of the treatment measures comprises:
discarding the information; or
And sending prompt information for reminding the user of paying attention to the risk of the account of the first user to the second terminal node.
As a possible implementation, the receiving information includes:
receiving a request from a second terminal node for determining whether a source of information is legal, wherein the information is the information from a first terminal node received by the second terminal node, and the first terminal node and the second terminal node are two different terminal nodes in the block chain network;
the taking of the treatment measures comprises:
and sending prompt information for reminding the user that the source of the information is suspicious to the second terminal node.
As a possible implementation, the determining whether the source of the information is legal includes:
acquiring historical operation data of a first user after consensus processing from the blockchain network, wherein the first user is a current user of the instant messaging application in the first terminal node;
acquiring current operation data corresponding to the information;
and judging whether the first user is a legal user or not according to the historical operation data and the current operation data, and determining that the source of the information is illegal under the condition that the first user is an illegal user.
As a possible implementation manner, the determining whether the first user is a valid user according to the historical operation data and the current operation data includes:
judging whether the historical operation data is matched with the current operation data;
and under the condition that the historical operation data and the current operation data are not matched, determining that the first user is an illegal user.
As a possible implementation, the determining whether the source of the information is legal includes:
under the condition that the first terminal node is not a third terminal node, judging whether a first user uses the instant messaging application on the third terminal node, wherein the third terminal node is a common terminal node of the first user, and the first user is a current user of the instant messaging application in the first terminal node;
confirming that the source of the information is illegal if the first user uses the instant messaging application on the third terminal node.
As a possible implementation manner, the acquiring historical operation data of the first user after the consensus processing from the blockchain network includes:
acquiring a public key of the first user according to the corresponding relation between the users and the public key;
and acquiring historical operation data of the first user after consensus processing from the blockchain network according to the public key of the first user.
A second aspect discloses an information monitoring apparatus, comprising:
the receiving unit is used for receiving information, wherein the information is information sent by the instant messaging application;
the judging unit is used for judging whether the source of the information is legal or not under the condition that the information comprises sensitive information;
an taking unit for taking a processing measure in case that a source of the information is illegal.
As a possible implementation manner, the receiving unit is specifically configured to receive information from a first terminal node, where the information is information sent by the first terminal node to a second terminal node, and the first terminal node and the second terminal node are two different terminal nodes in the blockchain network;
the adoption unit is specifically configured to:
discarding the information; or
And sending prompt information for reminding the user of paying attention to the risk of the account of the first user to the second terminal node.
As a possible implementation manner, the receiving unit is specifically configured to receive a request from a second terminal node for determining whether a source of information is legal, where the information is information received by the second terminal node from a first terminal node, and the first terminal node and the second terminal node are two different terminal nodes in the blockchain network;
the taking unit is specifically configured to send, to the second terminal node, prompt information for prompting a user that a source of the information is suspicious.
As a possible implementation manner, the determining unit is specifically configured to:
acquiring historical operation data of a first user after consensus processing from the blockchain network, wherein the first user is a current user of the instant messaging application in the first terminal node;
acquiring current operation data corresponding to the information;
and judging whether the first user is a legal user or not according to the historical operation data and the current operation data, and determining that the source of the information is illegal under the condition that the first user is an illegal user.
As a possible implementation manner, the determining unit determines whether the first user is a valid user according to the historical operation data and the current operation data, and includes:
judging whether the historical operation data is matched with the current operation data;
and under the condition that the historical operation data and the current operation data are not matched, determining that the first user is an illegal user.
As a possible implementation manner, the determining unit is specifically configured to:
under the condition that the first terminal node is not a third terminal node, judging whether a first user uses the instant messaging application on the third terminal node, wherein the third terminal node is a common terminal node of the first user, and the first user is a current user of the instant messaging application in the first terminal node;
confirming that the source of the information is illegal if the first user uses the instant messaging application on the third terminal node.
As a possible implementation manner, the acquiring, by the determining unit, historical operation data of the first user after the consensus process from the blockchain network includes:
acquiring a public key of the first user according to the corresponding relation between the users and the public key;
and acquiring historical operation data of the first user after consensus processing from the blockchain network according to the public key of the first user.
A third aspect discloses an information monitoring apparatus, which includes a processor and a memory, the processor and the memory being coupled, wherein the memory is configured to store computer instructions, and the processor is configured to execute the computer instructions, so that the information monitoring apparatus executes the information monitoring method disclosed in the first aspect or any embodiment of the first aspect.
A fourth aspect discloses a computer-readable storage medium having stored therein a computer program or computer instructions which, when executed by a computer device, cause the computer device to implement the information monitoring method as disclosed in the first aspect or any one of the embodiments of the first aspect.
In the embodiment of the invention, information is received, the information is information sent by instant messaging application, whether the source of the information is legal or not is judged under the condition that the information comprises sensitive information, and processing measures are taken under the condition that the source of the information is illegal. Therefore, before the user receives the information, whether the information source is legal or not can be determined, or after the user receives the information, the reliability of the information source does not need to be subjectively determined by the user, and therefore privacy and property safety guarantee of the user can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of an information monitoring method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a part of operation data uploaded by a terminal node to a blockchain network according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating another information monitoring method disclosed in the embodiments of the present invention;
FIG. 5 is a flow chart illustrating a further information monitoring method according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a method for storing operation data via a blockchain network according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of an information monitoring apparatus according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of another information monitoring apparatus disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below in conjunction with the appended drawings in the embodiments of the present invention, and it should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, indicate the presence of the described features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is to be understood that the terminology used in the embodiments of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein is meant to encompass any and all possible combinations of one or more of the associated listed items.
The embodiment of the invention discloses an information monitoring method, an information monitoring device and a readable storage medium, which are used for improving the privacy of a user and guaranteeing the property safety. The following are detailed below.
In order to better understand the information monitoring method and apparatus disclosed in the embodiments of the present invention, a network architecture of the embodiments of the present invention is described below. The embodiment of the invention provides an information monitoring scheme based on a block chain. The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, and is essentially a decentralized database. Referring to fig. 1, fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention. As shown in fig. 1, the network architecture may include a terminal node 101, a terminal node 102, a blockchain network 103, and a monitoring node 104. Wherein:
the instant messaging application of the terminal node 101 may send information to the instant messaging application of the terminal node 102, and the terminal node 102 may interact with the monitoring node 104 based on the client. For example, the user of the terminal node 101 may send information to the instant messaging application "wechat" of the terminal node 102 by using the instant messaging application "wechat", and the terminal node 102 interacts with the monitoring node 104 (in this case, the monitoring node may be a background server of the wechat) based on the instant messaging application "wechat" to implement a chat function of the "wechat". The end nodes 101 and 102 may be any electronic devices running an instant messaging application, wherein the electronic devices may include, but are not limited to, wearable devices, head-mounted devices, medical health platforms, personal computers, server computers, hand-held or laptop devices, mobile devices (such as mobile phones, Personal Digital Assistants (PDAs), media players, etc.), multiprocessor systems, consumer electronics, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The blockchain network 103 includes a plurality of nodes, and each node may be any type of computing device in an access network, such as a server, a user terminal, and a client. Each node corresponds to an identity code and is used for uniquely identifying the block chain node in the block chain network. Information connection can exist among a plurality of nodes, and information transmission can be carried out among the nodes through the information connection. Communications between nodes may be based on any wired and wireless network, including, but not limited to, the internet, wide area networks, metropolitan area networks, local area networks, Virtual Private Networks (VPNs), wireless communication networks, and the like. For example, when any node in the blockchain network 103 receives operation data uploaded by the terminal node 101 or the terminal node 102, other nodes acquire the operation data according to the consensus algorithm and store the operation data, so that the data stored on all nodes in the blockchain network 103 are consistent. In an embodiment of the present invention, the operation data stored by the blockchain network 103 is also referred to as historical operation data.
Terminal node 101 and terminal node 102 may join blockchain network 103 and become nodes in blockchain network 103. The terminal nodes 101 and 102 may upload, in real time or at regular time, operation data of users used at the terminal nodes and node parameters of the terminal nodes, such as Internet Protocol (IP), node model, node brand, and the like, of the terminal nodes themselves to the blockchain network.
When monitoring information, the monitoring node 104 may receive information from the terminal node 102, where the information is information sent by the terminal node 101 to the terminal node 102, and the monitoring node 104 may determine whether a source of the information is legal according to operation data acquired from the terminal node 101 and historical operation data acquired from the blockchain network 102, and take a processing measure when the source of the information is illegal.
In one implementation, the monitoring node 104 may also be a node in the blockchain network 103. At this time, when monitoring information, the monitoring node 104 may obtain current operation data and historical operation data from the blockchain network to determine whether the source of the information is legal, and take a processing measure when the source of the information is illegal.
Referring to fig. 2, fig. 2 is a schematic flow chart of an information monitoring method according to an embodiment of the present invention based on the network architecture shown in fig. 1. The first terminal node and the second terminal node may be nodes in a blockchain network, and the monitoring node may be one node in the blockchain network. As shown in fig. 2, the information monitoring method is applied to a monitoring node in a blockchain network, and may include the following steps.
201. The monitoring node receives the information.
And the monitoring node receives information, wherein the information is information sent by the instant messaging application.
In a first implementation, the information received by the monitoring node may be information from an instant messaging application of the first terminal node, which is information sent by the instant messaging application of the first terminal node to an instant messaging application of the second terminal node.
In a second implementation, the information received by the monitoring node may also be information received from the second terminal node and a request for information to determine whether the source of the information is legitimate. The second terminal node receives the information of the instant messaging application from the first terminal node, and then sends a request for determining whether the source of the information is legal or not to the monitoring node. The first terminal node and the second terminal node are two different terminal nodes in the blockchain network. The information may be text information, voice information, video information, and the like.
202. If the information includes sensitive information, the monitoring node determines whether the source of the information is legal, and if the source of the information is illegal, step 203 is executed.
After receiving the information, the monitoring node may determine whether the received information includes sensitive information, continue to determine whether the source of the information is legal if the information includes sensitive information, and execute step 203 if the source of the information is illegal.
Specifically, the monitoring node may make a determination according to the type of the received information. For example, if the information is text information, the monitoring node can perform word segmentation operation on the text information, and screen out sensitive words according to word bank comparison; if the information is audio and video information, the monitoring node can extract sensitive information in a voice recognition mode. The sensitive information may include information such as fund information, personal identification information of the claiming user, pornography, violence, and the like, and the keyword may be words such as bank card, account transfer, red envelope, identification card, name, address, telephone, family member, and the like.
When judging whether the source of the information is legal or not, the monitoring node firstly acquires historical operation data of a first user from the block chain network. The first user is a user of the instant messaging application of the first terminal node, and the historical operation data of the first user is operation data uploaded by the first terminal node and stored on the block chain network.
Specifically, the monitoring node may obtain historical operation data of the first user from the blockchain network according to the public key of the first user. Since the historical operation data in the block chain network is uploaded by the first terminal node through the private key signature, the public keys correspond to the private keys one to one, and only the public key corresponding to the private key can be verified through the operation data uploaded through the private key signature. Therefore, the historical operation data uploaded by the private key signature of the first user can be acquired in the blockchain network through the public key of the first user.
Referring to fig. 3, fig. 3 is a schematic diagram of a part of operation data uploaded to a blockchain network by a terminal node according to an embodiment of the present invention. Historical operation data which can be acquired by the monitoring node from the block chain network comprise equipment data such as the equipment model, the equipment brand, the chip ID and the storage ID of the first terminal node, and the operation data further comprise operation records of the first user on the first terminal node, including but not limited to user operation data such as click force, operation frequency, operation habits and pressing angles, acquired by the first terminal node through modes such as fingerprint acquisition, behavior acquisition and audio and video acquisition under a screen. The first terminal node may count historical operation data of the first user within a period of time closest to the current time, and use, as the operation data of the upload blockchain network, operation data in which the number/frequency of occurrence of each operation data of all user operation data is greater than (or greater than or equal to) the first threshold. The first threshold value may be set differently according to different requirements in practical applications. For example, if the number/frequency of occurrences of the first fingerprint information collected by the first terminal node is much greater than (or greater than or equal to) the second fingerprint information, the first fingerprint information is uploaded to the blockchain network as the fingerprint information of the first user, so that a data collection error caused by the fact that a third user uses the first terminal node occasionally is avoided. Other operation data such as click force, operation frequency, operation habit, pressing angle and other user operation data can be counted and uploaded to the block chain network according to a statistical method of fingerprint information.
The monitoring node may determine whether the source of the information is legal according to historical operation data in the blockchain network and current operation data corresponding to the information from the first terminal node, where the current operation data corresponding to the information is current operation data of a user of the information, acquired by the monitoring node from the first terminal node.
In a first implementation, a monitoring node first obtains historical fingerprint information in historical operation data of a first user after consensus processing from a block chain network, where the first user is a currently used user of an instant messaging application in a first terminal node, and then obtains current fingerprint information of the first user for the information from the first terminal node. The monitoring node can judge whether the first user is a legal user according to the historical fingerprint information and the current fingerprint information, and under the condition that the first user is an illegal user, the source of the information is determined to be illegal.
The monitoring node can judge whether the historical fingerprint information is matched with the current fingerprint information or not, and under the condition that the historical fingerprint information is not matched with the current fingerprint information, the first user is determined to be an illegal user, so that the source of the information is determined to be illegal. For example, a matching probability of the historical fingerprint information and the current fingerprint information may be calculated, the matching probability may be the same or similar probability, and in the case that the probability is less than (or less than or equal to) the second threshold, it may be determined that the source of the information is illegal.
In a second implementation, the monitoring node first obtains any historical operation data, including historical click force, historical operation frequency, historical operation habit and historical press angle, in the historical operation data of the first user after consensus processing from the blockchain network, and then obtains any current operation data, including click force, operation frequency, operation habit and press angle, in the current operation data of the first user for information from the first terminal node. The monitoring node can judge whether the first user is a legal user according to any one of the historical operation data and the corresponding current operation data, and under the condition that the first user is an illegal user, the source of the information is determined to be illegal.
The monitoring node can judge whether any historical operation data is matched with the corresponding current operation data, and under the condition that any historical operation data is not matched with the corresponding current operation data, the first user is determined to be an illegal user, so that the source of the information is determined to be illegal. For example, the matching probability of the historical click strength and the current click strength may be calculated, the matching probability may be the same or similar probability, and when the probability is smaller than (or smaller than or equal to) the third threshold, it may be determined that the source of the information is illegal; the matching probability of the historical operating frequency and the current operating frequency can also be calculated, and when the probability is smaller than (or smaller than or equal to) the fourth threshold value, the source of the information can be determined to be illegal; the matching probability of the historical compression angle and the current compression angle can also be calculated, and when the probability is smaller than (or smaller than or equal to) the fifth threshold value, the source of the information can be determined to be illegal.
In a third implementation, the monitoring node may detect whether the first terminal node is a third terminal node, and determine whether the first user uses the instant messaging application on the third terminal node when detecting that the first terminal node is not the third terminal node. The third terminal node is a common terminal node of the first user, and the first user is a current user of the instant messaging application in the first terminal node. In case the first user uses the instant messaging application on the third terminal node, the source of the confirmation message is illegal. The monitoring node can detect whether the first user uses the instant messaging application on the third terminal node or not, can also detect the installation and operation information of the instant messaging application on the third terminal node, and if the installation and operation of the instant messaging application on the third terminal node are normal, the source of the information is determined to be illegal; when the first user and the second user are in a video call, the monitoring node can also detect whether the first terminal node has an unauthorized third-party application (app) or abnormal conditions such as running of a non-app process, and when the first terminal node is detected to have the unauthorized app or the running of the non-app process, the source of the information is determined to be illegal.
In a fourth implementation, the monitoring node may obtain historical communication information of a second user and other users of the instant messaging application in the second terminal node from the blockchain network, and then query whether the first user exists in the historical communication information according to the historical communication information, and determine that the identity of the first user is abnormal when the first user does not exist in the historical communication information, thereby determining that the source of the information received by the second terminal node is illegal.
It should be noted that, without being limited to the above four implementation manners, step 403 may also include other implementation manners, which are not described herein again.
203. And the monitoring node takes processing measures.
And the monitoring node can take processing measures when judging that the source of the information is illegal.
In a first implementation, the monitoring node receives information from the first terminal node. Under the condition that the source of the information is illegal, the monitoring node can discard the information and can also send prompt information for reminding the user of the risk of the account of the first user to the second terminal node; in case the origin of the information is legal, the monitoring node may send the information from the first terminal node to the second terminal node.
In a second implementation, the information received by the monitoring node from the second terminal node contains the information and a request for determining whether the source of the information is legitimate. Under the condition that the source of the information is illegal, the monitoring node can send prompt information for reminding the user that the source of the information is suspicious to the second terminal node; in the case where the source of the information is legitimate, the monitoring node may not do so.
It should be noted that, the implementation is not limited to the above two implementations, and step 203 may also include other implementations, which are not described herein again.
In an embodiment, the instant messaging application account of the first terminal node may be bound to a terminal number of the first terminal node, and the instant messaging application account of the second terminal node may be bound to a terminal number of the second terminal node. The monitoring node monitors information sent by the instant messaging application of the first terminal node, and when the monitored information contains sensitive information and the source of the information is legal, sensitive information such as account transfer, red envelope and the like can be received only by a specific terminal number and an instant messaging application account number allowed by the monitoring node.
In one embodiment, under the condition that the second terminal node sends information about funds such as account transfer, red envelope and the like to the first terminal node, the monitoring node judges that the identity of the first user is suspicious, timely sends prompt information to the second user, collects terminal node IDs of the first user and the second user for storage and temporarily freezes the occurred account transfer funds, and unfreezes the occurred account transfer funds after the second user passes the next authentication; and if the authentication of the second user is not passed, continuously freezing the occurred transfer funds, and tracing according to the collected terminal node IDs of the first user and the second user.
The monitoring node may send, to the second terminal node, a prompt message for prompting the user that the source of the information is suspicious, when determining that the source of the information is illegal. The prompt information may be a text prompt or a voice prompt.
The monitoring node can determine that the source of the information received by the second terminal node is illegal in various modes, and different prompt messages can be generated when the source of the information is illegal in different modes. For example, when the monitoring node detects that the first terminal node has a non-authenticated app or a non-app process running, the prompt message sent to the second terminal node may be "the account of the opposite party does not have normal chat and use behaviors, and may be plug-in software"; when the monitoring node detects that the first terminal node is not the commonly used terminal node of the first user and the instant messaging application in the commonly used terminal node of the first user logs in and runs normally, the prompt message sent to the second terminal node may be that the opposite account does not log in the commonly used device, or may be that the prompt message is sent to the instant messaging application in the commonly used terminal node where the first user currently logs in, and the prompt message may be that a stranger logs in your account in another place, please modify a password or log in the current device again; when the monitoring node detects that the first user does not exist in the historical communication record of the second user, the prompt message may be "the account of the other party rarely communicates, and there may be a risk".
In the information monitoring method described in fig. 5, the method is described from the perspective of a monitoring node in a blockchain network. The monitoring node receives the information, judges whether the source of the information is legal or not under the condition that the information comprises sensitive information, and takes a processing measure under the condition that the source of the information is illegal. Therefore, the received information can be monitored through the monitoring node in the block chain network, and under the condition that the information comprises sensitive information and has an illegal source, particularly when the property safety problem of the user is involved, prompt information for reminding the user that the source of the information is suspicious can be timely sent. Therefore, the privacy and property security of the user can be improved.
Referring to fig. 4, fig. 4 is a schematic flow chart of another information monitoring method according to an embodiment of the present invention based on the network architecture shown in fig. 1. The first terminal node and the second terminal node may be nodes in a blockchain network, and the monitoring node may be one node in the blockchain network. As shown in fig. 4, the information monitoring method is applied to a monitoring node in a blockchain network, and may include the following steps.
401. The monitoring node receives information from the first terminal node.
Before monitoring information, a monitoring node receives information from a first terminal node, wherein the information is information to be sent by an instant messaging application of the first terminal node to an instant messaging application of a second terminal node. The first terminal node and the second terminal node are two different terminal nodes in the block chain network. The information may be text information, voice information, video information, and the like.
402. If the information includes sensitive information, the monitoring node determines whether the source of the information is legal, and if the source of the information is illegal, step 403 is executed.
Step 402 is the same as step 202, and please refer to step 202 for detailed description, which is not repeated herein.
403. The monitoring node discards the information or sends a prompt message to the second terminal node.
Under the condition that the source of the information is illegal, the monitoring node can discard the information and can also send prompt information for reminding the user of the risk of the account of the first user to the second terminal node; in case the origin of the information is legal, the monitoring node may send the information from the first terminal node to the second terminal node.
Referring to fig. 5, fig. 5 is a schematic flow chart of another information monitoring method according to an embodiment of the present invention based on the network architecture shown in fig. 1. The first terminal node and the second terminal node may be nodes in a blockchain network, and the monitoring node may be one node in the blockchain network. As shown in fig. 5, the information monitoring method applied to the second terminal node in the blockchain network may include the following steps.
501. The second terminal node receives information from the instant messaging application in the first terminal node.
The second terminal node may receive information from the instant messaging application in the first terminal node, where the second terminal node may be any terminal node except the first terminal node in the block chain network, and the information may be text information, voice information, video information, and the like.
502. The second terminal node determines whether the information includes sensitive information, and if the information includes sensitive information, step 503 is performed.
After the second terminal node receives the information from the instant messaging application in the first terminal node, whether the received information contains sensitive information or not can be judged, and the judgment can be carried out according to the type of the received information. For example, if the information is text information, the second terminal node may perform word segmentation operation on the text information, and screen out sensitive words according to word bank comparison; if the information is audio and video information, the second terminal node can extract sensitive information in a voice recognition mode. The sensitive information may include information such as fund information, personal identification information of the claiming user, pornography, violence, and the like, and the keyword may be words such as bank card, account transfer, red envelope, identification card, name, address, telephone, family member, and the like. In case the first terminal node detects that the received information comprises sensitive information, step 503 is performed.
503. The second terminal node sends a monitoring request for information to a monitoring node in the blockchain network.
And under the condition that the second terminal node detects that the received information comprises sensitive information, immediately sending a monitoring request to a monitoring node in the block chain network, wherein the monitoring request is used for indicating the monitoring node to determine whether the source of the information is legal or not.
504. The monitoring node determines whether the source of the information is legal, and if it is determined that the source of the information is illegal, step 505 is performed.
And after receiving a monitoring request for determining whether the source of the information is legal from the second terminal node, the monitoring node judges whether the source of the information is legal. In case the source of the information is illegal, step 505 is performed.
505. And the monitoring node sends prompt information for reminding the user that the source of the user information is suspicious to the second terminal node.
The monitoring node may send, to the second terminal node, a prompt message for prompting the user that the source of the information is suspicious, when determining that the source of the information is illegal. The prompt information may be a text prompt or a voice prompt.
The monitoring node can determine that the source of the information received by the second terminal node is illegal in various modes, and different prompt messages can be generated when the source of the information is illegal in different modes. For example, when the monitoring node detects that the first terminal node has a non-authenticated app or a non-app process running, the prompt message may be "the account does not have normal chat and use behaviors, and may be plug-in software"; when the monitoring node detects that the first terminal node is not the commonly used terminal node of the first user and the instant messaging application in the commonly used terminal node of the first user logs in and runs normally, the prompt message may be that the account of the other party does not log in the commonly used device, or the prompt message may be sent to the instant messaging application in the commonly used terminal node where the first user currently logs in, and the prompt message may be that a stranger logs in your account in a different place, please modify a password or log in the current device again; when the monitoring node detects that the first user does not exist in the historical communication record of the second user, the prompt message may be "the account of the other party rarely communicates, and there may be a risk".
The second terminal node may receive a prompt from the monitoring node to alert the user that the source of the information is suspect. When the prompt information is a text prompt, the second terminal node may display the text prompt to the second user on the display screen; and when the prompt information is a voice prompt, the second terminal node can play the voice prompt to the second user through electronic equipment such as a loudspeaker or a sound box.
In the information monitoring method described in fig. 5, the method is described from the perspective of a second terminal node, where the second terminal node receives information from an instant messaging application in a first terminal node, determines whether the information includes sensitive information, and sends a monitoring request to a monitoring node in a blockchain network when the information includes the sensitive information, where the monitoring request is used to request the monitoring node to determine whether an information source is legal, and sends prompt information for prompting a user that the information source is suspicious to the second terminal node when it is determined that the information source is illegal, and the second terminal node receives the prompt information. Therefore, whether the received information comprises sensitive information or not can be judged through the second terminal node in the block chain network, a monitoring request is sent to the monitoring node in the block chain network under the condition that the information comprises the sensitive information, the monitoring node judges whether the source of the information is legal or not, and prompt information for reminding a user that the source of the information is suspicious can be timely sent under the condition that the source of the information is illegal, particularly when the property safety problem of the user is involved. Therefore, the privacy and property security of the user can be improved.
Referring to fig. 6, fig. 6 is a flow chart illustrating a method for storing operation data through a blockchain network according to an embodiment of the present invention based on the network architecture shown in fig. 1. Wherein the first terminal node may be the terminal node 101 in fig. 1, the blockchain network may be the blockchain network 103 in fig. 1, and the monitoring node may be the monitoring node 104 in fig. 1. As shown in fig. 6, the storage method may include the following steps.
601. The first terminal node joins the blockchain network.
First, a first terminal node creates a first key pair using an asymmetric encryption algorithm. Wherein the first key pair comprises a first public key and a first private key. In the embodiment of the invention, a first private key is used for a first terminal node to sign current operation data when the operation data of a first user is uploaded to a block chain network so as to indicate that the current operation data belongs to the first user, wherein the first user is a user of instant messaging application of the first terminal node; the first public key is used to verify operational data signed by the first private key and uploaded into the blockchain network. After the first key pair is created, the first terminal node may upload a first public key in the first key pair to the blockchain network, so that other nodes in the blockchain network may receive the public key of the first user, and may screen out operation data uploaded by the first terminal node from historical operation data stored in the blockchain network according to the public key of the first user; the first terminal node also sends the first public key to the monitoring node so that the monitoring node establishes the association between the first public key and the account of the first user. And the first private key is kept by the first terminal node.
After the first terminal node completes creation of the first key pair and uploads the first public key to the blockchain network, it indicates that the first terminal node has joined the blockchain network and completes identity registration in the blockchain network, and becomes a node in the blockchain network.
602. Operation data of a first user is acquired.
The first terminal node signs an intelligent contract using the operation data, and the intelligent contract comprises the first terminal node uploading the operation data of the first user to the blockchain network so that the blockchain network stores the operation data. When the first user completes the signing of the intelligent contract, the first terminal node is qualified to upload the operation data and view the historical operation data in the blockchain network.
The first terminal node may upload operation data including an equipment model, an equipment brand, an Identity (ID) of a chip, a storage ID, other information, and the like of the first terminal node shown in fig. 3 to the blockchain network, where the operation data may further include operation records of the first user on the first terminal node, including but not limited to click force, operation frequency, operation habits, a pressing angle, and the like, acquired by the first terminal node through modes of fingerprint acquisition, behavior acquisition, audio/video acquisition, and the like, and may vectorize the acquired operation data in a certain mode and upload the vectorized operation data to the blockchain network.
The operation data uploaded by the first terminal node to the first user may be collected and uploaded at a fixed time, may be collected and uploaded in real time, and may also be collected and uploaded at a time specified by research and development personnel, and the fixed time may be a frequency preset in an intelligent contract, for example, the operation data of the user is acquired every 30 minutes, or the operation data of the first user is collected and uploaded at the same time every day, and the like.
603. And the first terminal node uploads the acquired operation data to the blockchain network.
The first terminal node uses the private key of the first user to sign the operation data of the first user and uploads the operation data to the block chain network, so that the block chain network stores the operation data of the first user.
After the first terminal node obtains the operation data, the first terminal node signs the operation data by using a first private key to generate first data. The first end node then broadcasts the first data to other nodes in the blockchain network so that the blockchain network stores the first data via peer-to-peer (P2P) communication, consensus algorithm. In one implementation, other nodes in the blockchain network receive the first data, wherein the node with the highest computation speed packs the first data into the latest block in advance, and broadcasts the latest block, so that other nodes in the blockchain network receive the latest block. After receiving the block, any node compares the operation data of the block with the operation data stored by the node, sends a copy of operation data approved by the node to the block chain network, and finally, the operation data stored by all nodes in the block chain network are consistent through network expansion iteration.
When information monitoring is needed, the monitoring node can acquire historical operation data uploaded by the first user from the block chain network, and therefore whether the received information source is legal or not is verified according to the historical operation data.
The second terminal node and the monitoring node may also join the blockchain network and become one node in the blockchain network according to steps 601 to 603.
In storing operation data as described in fig. 6, the method is based on storing operation data over a blockchain network. Therefore, the operation data stored by the block link network has non-tamper property, so that the reliability of the operation data is improved, and the privacy protection of the user can be improved.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an information monitoring apparatus according to an embodiment of the present invention. Wherein, the information monitoring device can be a node of the block chain network. As shown in fig. 7, the information monitoring apparatus may include:
a receiving unit 701, configured to receive information, where the information is information sent by an instant messaging application;
a determining unit 702, configured to determine whether a source of the information is legal or not when the information includes sensitive information;
an taking unit 703 is used for taking a processing measure in case that the source of the information is illegal.
In an embodiment, the receiving unit 701 is specifically configured to receive information from a first terminal node, where the information is information sent by the first terminal node to a second terminal node, and the first terminal node and the second terminal node are two different terminal nodes in a blockchain network;
the taking unit 703 is specifically configured to:
discarding the information; or
And sending prompt information for reminding the user of paying attention to the risk of the account of the first user to the second terminal node.
In an embodiment, the receiving unit 701 is specifically configured to receive a request from a second terminal node to determine whether a source of information is legal, where the information is information received by the second terminal node from a first terminal node, and the first terminal node and the second terminal node are two different terminal nodes in a blockchain network;
the taking unit 703 is specifically configured to send, to the second terminal node, prompt information for prompting that the source of the user information is suspicious.
In an embodiment, the determining unit 702 is specifically configured to:
acquiring historical operation data of a first user after consensus processing from a blockchain network, wherein the first user is a current user of the instant messaging application in a first terminal node;
acquiring current operation data corresponding to the information;
and judging whether the first user is a legal user or not according to the historical operation data and the current operation data, and determining that the source of the information is illegal under the condition that the first user is an illegal user.
In one embodiment, the determining unit 702 determines whether the first user is a legal user according to the historical operation data and the current operation data, including:
judging whether the historical operation data is matched with the current operation data;
and under the condition that the historical operation data and the current operation data are not matched, determining that the first user is an illegal user.
In an embodiment, the determining unit 702 is specifically configured to:
under the condition that the first terminal node is not a third terminal node, judging whether the first user uses the instant messaging application on the third terminal node, wherein the third terminal node is a common terminal node of the first user, and the first user is a current user of the instant messaging application in the first terminal node;
in case the first user uses the instant messaging application on the third terminal node, the source of the confirmation message is illegal.
In one embodiment, the determining unit 702 obtaining the historical operation data of the first user after the consensus process from the blockchain network includes:
acquiring a public key of a first user according to the corresponding relation between the users and the public key;
and acquiring historical operation data of the first user after the consensus processing from the blockchain network according to the public key of the first user.
The detailed descriptions of the receiving unit 701, the determining unit 702, and the taking unit 703 may be directly obtained by referring to the related descriptions in the method embodiment shown in fig. 2, which is not repeated herein.
Referring to fig. 8, fig. 8 is a schematic structural diagram of another information monitoring apparatus according to an embodiment of the present disclosure. It should be noted that the block link node in the embodiment of the present invention may be a conventional server capable of assuming services and guaranteeing service capabilities, or may be a terminal device capable of assuming services and guaranteeing service capabilities, which is registered in the block chain and has a processor, a hard disk, a memory, and a system bus structure. The embodiments of the present invention are not particularly limited.
As shown in fig. 8, the block link point may include: a memory 801, a transceiver 802, and a processor 803 coupled to the memory 801 and the transceiver 802. The memory 801 is used to store computer programs comprising program instructions, the processor 803 is used to execute the program instructions stored by the memory 801, and the transceiver 802 is used to communicate with other devices under the control of the processor 803. The information monitoring method may be performed according to program instructions when the processor 803 executes the instructions.
The processor 803 may be a Central Processing Unit (CPU), a general purpose processor, a Digital Signal Processor (DSP), an application-specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, templates, and circuits described in connection with the disclosure. The processor 803 may also be a combination of specialized computing functionality, e.g., comprising one or more microprocessors, DSPs, and microprocessors. The transceiver 802 may be a communication interface, transceiver circuitry, etc., where the communication interface is generic and may include one or more interfaces, such as an interface between a block chain link point and a terminal.
Optionally, the block link point may further include a bus 804, wherein the memory 801, the transceiver 802, and the processor 803 may be connected to each other by the bus 804. The bus 804 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 804 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 8, but this is not intended to represent only one bus or type of bus.
In addition to the memory 801, the transceiver 802, the processor 803 and the bus 804 shown in fig. 8, the block link node in the embodiment may also include other hardware according to the actual function of the block link node, which is not described in detail herein.
The embodiment of the invention also discloses a storage medium, wherein a program is stored on the storage medium, and when the program runs, the method for storing the operation data shown in fig. 2 and the information monitoring method shown in fig. 4-5 are realized.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above-mentioned embodiments, objects, technical solutions and advantages of the present application are further described in detail, it should be understood that the above-mentioned embodiments are only examples of the present application, and are not intended to limit the scope of the present application, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present application should be included in the scope of the present application.

Claims (10)

1. An information monitoring method, applied to a monitoring node in a blockchain network, includes:
receiving information, wherein the information is information sent by an instant messaging application;
judging whether the source of the information is legal or not under the condition that the information comprises sensitive information;
in case the source of the information is illegal, a handling measure is taken.
2. The method of claim 1, wherein the receiving information comprises:
receiving information from a first terminal node, wherein the information is information sent by the first terminal node to a second terminal node, and the first terminal node and the second terminal node are two different terminal nodes in the block chain network;
the taking of the treatment measures comprises:
discarding the information; or
And sending prompt information for reminding the user of paying attention to the risk of the account of the first user to the second terminal node.
3. The method of claim 1, wherein the receiving information comprises:
receiving a request from a second terminal node for determining whether a source of information is legal, wherein the information is the information from a first terminal node received by the second terminal node, and the first terminal node and the second terminal node are two different terminal nodes in the block chain network;
the taking of the treatment measures comprises:
and sending prompt information for reminding the user that the source of the information is suspicious to the second terminal node.
4. The method of claim 2 or 3, wherein said determining whether the source of the information is legitimate comprises:
acquiring historical operation data of the first user after consensus processing from the blockchain network, wherein the first user is a current user of the instant messaging application in the first terminal node;
acquiring current operation data corresponding to the information;
and judging whether the first user is a legal user or not according to the historical operation data and the current operation data, and determining that the source of the information is illegal under the condition that the first user is an illegal user.
5. The method of claim 4, wherein said determining whether the first user is a valid user based on the historical operational data and the current operational data comprises:
judging whether the historical operation data is matched with the current operation data;
and under the condition that the historical operation data and the current operation data are not matched, determining that the first user is an illegal user.
6. The method of claim 2 or 3, wherein said determining whether the source of the information is legitimate comprises:
under the condition that the first terminal node is not a third terminal node, judging whether a first user uses the instant messaging application on the third terminal node, wherein the third terminal node is a common terminal node of the first user, and the first user is a current user of the instant messaging application in the first terminal node;
confirming that the source of the information is illegal if the first user uses the instant messaging application on the third terminal node.
7. The method of claim 4, wherein the obtaining the historical operation data of the first user after the consensus processing from the blockchain network comprises:
acquiring a public key of the first user according to the corresponding relation between the users and the public key;
and acquiring historical operation data of the first user after consensus processing from the blockchain network according to the public key of the first user.
8. An information monitoring device, comprising:
the receiving unit is used for receiving information, wherein the information is information sent by the instant messaging application;
the judging unit is used for judging whether the source of the information is legal or not under the condition that the information comprises sensitive information;
an taking unit for taking a processing measure in case that a source of the information is illegal.
9. An information monitoring apparatus comprising a processor and a memory coupled to the processor and the memory, wherein the memory is configured to store computer instructions and the processor is configured to execute the computer instructions to cause the information monitoring apparatus to implement the method of any one of claims 1-7.
10. A computer-readable storage medium, in which a computer program or computer instructions are stored which, when executed by a computer device, cause the computer device to carry out the method according to any one of claims 1 to 7.
CN202010003191.2A 2020-01-02 2020-01-02 Information monitoring method and device and readable storage medium Active CN111245799B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010003191.2A CN111245799B (en) 2020-01-02 2020-01-02 Information monitoring method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010003191.2A CN111245799B (en) 2020-01-02 2020-01-02 Information monitoring method and device and readable storage medium

Publications (2)

Publication Number Publication Date
CN111245799A true CN111245799A (en) 2020-06-05
CN111245799B CN111245799B (en) 2022-01-11

Family

ID=70874267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010003191.2A Active CN111245799B (en) 2020-01-02 2020-01-02 Information monitoring method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN111245799B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113315786A (en) * 2021-06-25 2021-08-27 郑州信源信息技术股份有限公司 Security authentication method and system
CN115134169A (en) * 2022-08-29 2022-09-30 北京中科金财科技股份有限公司 Block chain data management method and system

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004095204A2 (en) * 2003-03-24 2004-11-04 Yahoo! Inc. System and method for exchanging messages between an instant messaging user and an e-mail user
WO2008065344A1 (en) * 2006-12-01 2008-06-05 David Irvine Anonymous authentication
CN103457802A (en) * 2013-09-09 2013-12-18 中国农业银行股份有限公司 Information transmission system and method
CN104468102A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Method and device for operation management of network account
CN104506382A (en) * 2014-12-17 2015-04-08 百度在线网络技术(北京)有限公司 Message monitoring method and system
CN105591743A (en) * 2014-10-23 2016-05-18 腾讯科技(深圳)有限公司 Method and device for carrying out identity authentication through equipment operation features of user terminal
CN106301778A (en) * 2015-05-19 2017-01-04 中兴通讯股份有限公司 Auth method, device, system and user terminal
US20170085601A1 (en) * 2013-10-29 2017-03-23 At&T Mobility Ii Llc Method and apparatus for communicating between communication devices
CN106685797A (en) * 2016-07-09 2017-05-17 东莞市华睿电子科技有限公司 Method for verifying identity based on instant communication
CN106850416A (en) * 2017-03-31 2017-06-13 努比亚技术有限公司 Message processing apparatus and method
CN107040494A (en) * 2015-07-29 2017-08-11 深圳市腾讯计算机系统有限公司 User account exception prevention method and system
CN109245993A (en) * 2018-09-07 2019-01-18 中链科技有限公司 Instant communication method and device based on block chain
CN109299955A (en) * 2018-09-14 2019-02-01 北京京东金融科技控股有限公司 Recording method, device, equipment and the computer readable storage medium of information
CN109918167A (en) * 2019-03-15 2019-06-21 Oppo广东移动通信有限公司 Laying method, device, terminal device, the computer readable storage medium of handle icon

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004095204A2 (en) * 2003-03-24 2004-11-04 Yahoo! Inc. System and method for exchanging messages between an instant messaging user and an e-mail user
WO2008065344A1 (en) * 2006-12-01 2008-06-05 David Irvine Anonymous authentication
CN103457802A (en) * 2013-09-09 2013-12-18 中国农业银行股份有限公司 Information transmission system and method
CN104468102A (en) * 2013-09-12 2015-03-25 深圳市腾讯计算机系统有限公司 Method and device for operation management of network account
US20170085601A1 (en) * 2013-10-29 2017-03-23 At&T Mobility Ii Llc Method and apparatus for communicating between communication devices
CN105591743A (en) * 2014-10-23 2016-05-18 腾讯科技(深圳)有限公司 Method and device for carrying out identity authentication through equipment operation features of user terminal
CN104506382A (en) * 2014-12-17 2015-04-08 百度在线网络技术(北京)有限公司 Message monitoring method and system
CN106301778A (en) * 2015-05-19 2017-01-04 中兴通讯股份有限公司 Auth method, device, system and user terminal
CN107040494A (en) * 2015-07-29 2017-08-11 深圳市腾讯计算机系统有限公司 User account exception prevention method and system
CN106685797A (en) * 2016-07-09 2017-05-17 东莞市华睿电子科技有限公司 Method for verifying identity based on instant communication
CN106850416A (en) * 2017-03-31 2017-06-13 努比亚技术有限公司 Message processing apparatus and method
CN109245993A (en) * 2018-09-07 2019-01-18 中链科技有限公司 Instant communication method and device based on block chain
CN109299955A (en) * 2018-09-14 2019-02-01 北京京东金融科技控股有限公司 Recording method, device, equipment and the computer readable storage medium of information
CN109918167A (en) * 2019-03-15 2019-06-21 Oppo广东移动通信有限公司 Laying method, device, terminal device, the computer readable storage medium of handle icon

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113315786A (en) * 2021-06-25 2021-08-27 郑州信源信息技术股份有限公司 Security authentication method and system
CN115134169A (en) * 2022-08-29 2022-09-30 北京中科金财科技股份有限公司 Block chain data management method and system
CN115134169B (en) * 2022-08-29 2022-11-15 北京中科金财科技股份有限公司 Block chain data management method and system

Also Published As

Publication number Publication date
CN111245799B (en) 2022-01-11

Similar Documents

Publication Publication Date Title
CN112446785B (en) Cross-chain transaction method, system, device, equipment and storage medium
CN110012005B (en) Method and device for identifying abnormal data, electronic equipment and storage medium
US20210377258A1 (en) Attributed network enabled by search and retreival of privity data from a registry and packaging of the privity data into a digital registration certificate for attributing the data of the attributed network
CN111245799B (en) Information monitoring method and device and readable storage medium
Peng et al. Behavioral malware detection in delay tolerant networks
WO2020093723A1 (en) Blockchain-based health data verification method and device, and server
CN112953971A (en) Network security traffic intrusion detection method and system
US11057392B2 (en) Data security method utilizing mesh network dynamic scoring
CN111163114A (en) Method and apparatus for detecting network attacks
WO2009023683A2 (en) Methods and systems for transmitting a data attribute from an authenticated system
WO2022057106A1 (en) Credibility verification system for digital asset data packet
CN111586013B (en) Network intrusion detection method, device, node terminal and storage medium
WO2015076715A1 (en) Method and system for synchronization of two databases in a lawful interception network by comparing checksum values
CN113518075A (en) Phishing early warning method and device, electronic equipment and storage medium
CN110149210A (en) A kind of data transmission method and device
CN116055157A (en) Block chain-based environment monitoring data sharing method and system
CN115037542A (en) Abnormal mail detection method and device
AT&T behavior.dvi
CN112291262B (en) Method and system for establishing account terminal guarantee derivative relationship in zero trust environment
TWI744810B (en) Speaking end device, receiving end device and cloud server of user data fingerprint verification operation
US20210349867A1 (en) System and methods for receiving, processing and storing rich time series data
CN115277083B (en) Data transmission control method, device, system and computer equipment
CN114499949B (en) Device binding method and device, electronic device and computer readable medium
CN116684207B (en) Method, device, equipment and medium for processing monitoring data based on blockchain
CN111459899B (en) Log sharing method and device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024191

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant