CN112131478A - Transaction detection method and device - Google Patents

Transaction detection method and device Download PDF

Info

Publication number
CN112131478A
CN112131478A CN202011041344.9A CN202011041344A CN112131478A CN 112131478 A CN112131478 A CN 112131478A CN 202011041344 A CN202011041344 A CN 202011041344A CN 112131478 A CN112131478 A CN 112131478A
Authority
CN
China
Prior art keywords
transaction
service module
end application
sensitive
transaction data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011041344.9A
Other languages
Chinese (zh)
Other versions
CN112131478B (en
Inventor
石玉凤
孙海波
王�义
金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Beijing Haiyi Tongzhan Information Technology Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Beijing Haiyi Tongzhan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd, Beijing Haiyi Tongzhan Information Technology Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN202011041344.9A priority Critical patent/CN112131478B/en
Priority claimed from CN202011041344.9A external-priority patent/CN112131478B/en
Publication of CN112131478A publication Critical patent/CN112131478A/en
Application granted granted Critical
Publication of CN112131478B publication Critical patent/CN112131478B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The embodiment of the application provides a transaction detection method and a device, which are applied to nodes in a block chain system, wherein the nodes in the block chain system comprise a front-end application, an agent service module and a bottom service module, and the method comprises the following steps: the front-end application sends a transaction uplink request to the proxy service module, wherein the transaction uplink request comprises transaction data of a transaction to be processed; if the transaction data of the transaction to be processed does not contain the sensitive words, the proxy service module sends a transaction uplink instruction to the bottom service module; the bottom layer service module writes the transaction data of the transaction to be processed into the block chain system. Compared with the prior art, the method and the device have the advantages that before the transaction data are linked, the transaction data are detected according to the sensitive words, and the transaction data with the sensitive words which do not accord with the specification are not written into the blockchain system, so that the function that the blockchain system can filter the transaction data with the content which does not accord with the specification is realized.

Description

Transaction detection method and device
Technical Field
The invention relates to the technical field of block chains, in particular to a transaction detection method and device.
Background
The block chain refers to a traceable and non-falsifiable distributed accounting mechanism realized by a cryptography technology, a point-to-point network, a consensus mechanism and a block chain type data structure organized according to time sequence. The block chain back-end as a service (BaaS) platform can quickly create, deploy, run, and monitor a block chain application program.
In the prior art, the Baas platform can realize the functions of establishing a network, managing an account book, deploying an electronic contract and the like. On the Baas platform, an enterprise organization user may invoke an electronic contract to submit transaction data to the blockchain or to query transaction data from the chain.
However, when transaction data submitted to a chain by an enterprise organization by calling an electronic contract is received, the existing Baas platform only needs to detect whether the transaction data meets the rules of the electronic contract, and does not need to detect the specific content of the transaction data, so that a blockchain system such as the Baas platform cannot filter the transaction data whose content does not meet the specification.
Disclosure of Invention
The embodiment of the application provides a transaction detection method and a transaction detection device, which are used for solving the problem that a block chain system in the prior art cannot filter transaction data with contents not meeting the specification.
In a first aspect, an embodiment of the present application provides a transaction detection method, which is applied to a node in a blockchain system, where the node in the blockchain system includes a front-end application, an agent service module, and a bottom service module, and the method includes:
the front-end application sends an uplink transaction request to the proxy service module, wherein the uplink transaction request comprises transaction data of a transaction to be processed;
if the transaction data of the transaction to be processed does not contain the sensitive words, the proxy service module sends an uplink transaction instruction to the bottom layer service module;
and the bottom layer service module writes the transaction data of the transaction to be processed into the blockchain system.
In an optional implementation manner, a node in the blockchain system further includes a back-end service module corresponding to the front-end application;
the front-end application sending a trade uplink request to the proxy service module, including:
and the front-end application calls the back-end service module to send the trade uplink request to the proxy service module.
In an optional embodiment, after the underlying service module writes the transaction data of the pending transaction to the blockchain system, the method further comprises:
and the agent service module sends a first message to the front-end application, wherein the first message is used for indicating that the transaction data of the transaction to be processed is successfully written into the blockchain system.
In an optional embodiment, after the front-end application sends a uplink transaction request to the proxy service module, the method further includes:
and if the transaction data of the transaction to be processed contains the sensitive words, the proxy service module sends a second message to the front-end application, wherein the second message is used for indicating the sensitive words in the transaction data of the transaction to be processed.
In an optional embodiment, the method further comprises:
the front-end application sends a query request to the proxy service module, wherein the query request comprises an identifier of a transaction to be queried;
the proxy service module sends a query instruction to the bottom layer service module according to the query request;
the bottom layer service module acquires the transaction data of the transaction to be inquired according to the inquiry instruction;
and the bottom layer service module sends the transaction data of the transaction to be inquired to the agent service module.
In an optional embodiment, after the underlying service module sends the transaction data of the transaction to be queried to the agent service module, the method further includes:
and if the transaction data of the transaction to be inquired does not contain the sensitive words, the proxy service module sends the transaction data of the transaction to be inquired to the front-end application.
In an optional embodiment, after the underlying service module sends the transaction data of the transaction to be queried to the agent service module, the method further includes:
and if the transaction data of the transaction to be inquired contains the sensitive words, the proxy service module executes sensitive transaction processing operation.
In an alternative embodiment, the sensitive transaction processing operation comprises: recording the transaction to be inquired as a sensitive transaction, sending a sensitive transaction prompt to the front-end application, and accumulating the times of the behavior of calling the sensitive transaction by the user by using the front-end application.
In an optional embodiment, after the proxy service module performs the sensitive transaction processing operation, the method further comprises:
if the number of times of the user using the front-end application to invoke the behavior of the sensitive transaction exceeds a threshold value, the proxy service module sends a forbidden indication to the front-end application, wherein the forbidden indication contains account information of the user;
the front-end application stops receiving uplink transaction requests and/or inquiry requests input by the user.
In an optional embodiment, the stopping of the front-end application from receiving the user-entered uplink transaction request and/or inquiry request includes:
and the front-end application stops receiving the trade uplink request and/or the query request input by the user by calling a back-end service module corresponding to the front-end application.
In an optional embodiment, the method further comprises:
the proxy service module receives a sensitive word change request sent by a management node;
and the proxy service module adds or deletes the sensitive words in a sensitive word bank in the proxy service module according to the sensitive word changing request.
In an optional embodiment, the method further comprises:
the front-end application sends a sensitive word adding request to the proxy service module, wherein the sensitive word adding request comprises a sensitive word;
and the proxy service module adds the sensitive words in a sensitive word bank in the proxy service module.
In a second aspect, an embodiment of the present application provides a transaction detection apparatus, where the transaction detection apparatus is a node in a blockchain system, and the transaction detection apparatus includes: the system comprises a front-end application, an agent service module and a bottom service module;
the front-end application is used for sending an uplink transaction request to the proxy service module, wherein the uplink transaction request comprises transaction data of a transaction to be processed;
the agent service module is used for sending an uplink transaction instruction to the bottom service module if the transaction data of the transaction to be processed does not contain sensitive words;
and the bottom layer service module is used for writing the transaction data of the transaction to be processed into the blockchain system.
In an optional implementation manner, the transaction detection apparatus further includes a back-end service module corresponding to the front-end application;
the front-end application is specifically configured to invoke the back-end service module to send the transaction uplink request to the proxy service module.
In an optional embodiment, the proxy service module is further configured to send a first message to the front-end application, where the first message is used to indicate that the transaction data of the pending transaction is successfully written into the blockchain system.
In an optional implementation manner, the agent service module is further configured to send a second message to the front-end application if the transaction data of the to-be-processed transaction includes the sensitive word, where the second message is used to indicate the sensitive word in the transaction data of the to-be-processed transaction.
In an optional embodiment, the front-end application is further configured to send a query request to the proxy service module, where the query request includes an identifier of a transaction to be queried;
the proxy service module is also used for sending a query instruction to the bottom layer service module according to the query request;
the bottom layer service module is also used for acquiring the transaction data of the transaction to be inquired according to the inquiry instruction; and sending the transaction data of the transaction to be inquired to the agent service module.
In an optional implementation manner, the proxy service module is further configured to send the transaction data of the transaction to be queried to the front-end application if the transaction data of the transaction to be queried does not include the sensitive word.
In an optional implementation manner, the agent service module is further configured to execute a sensitive transaction processing operation if the transaction data of the transaction to be queried includes the sensitive word.
In an alternative embodiment, the sensitive transaction processing operation comprises: recording the transaction to be inquired as a sensitive transaction, sending a sensitive transaction prompt to the front-end application, and accumulating the times of the behavior of calling the sensitive transaction by the user by using the front-end application.
In an optional implementation manner, the proxy service module is further configured to send a disabling indication to the front-end application if the number of times that the user uses the front-end application to invoke the behavior of the sensitive transaction exceeds a threshold, where the disabling indication includes account information of the user;
the front-end application is further configured to stop receiving the uplink transaction request and/or the query request input by the user.
In an optional implementation manner, the front-end application is specifically configured to stop receiving the uplink transaction request and/or the query request input by the user by invoking a back-end service module corresponding to the front-end application.
In an optional implementation manner, the proxy service module is further configured to receive a sensitive word change request sent by a management node; and adding or deleting the sensitive words in a sensitive word bank in the proxy service module according to the sensitive word changing request.
In an optional implementation manner, the front-end application is further configured to send a sensitive word addition request to the proxy service module, where the sensitive word addition request includes a sensitive word;
the proxy service module is also used for adding the sensitive words in a sensitive word bank in the proxy service module.
In a third aspect, the present application further provides an electronic device, including:
a memory and a processor;
the memory for storing executable instructions of the processor;
the processor is configured to perform the method of the first aspect via execution of the executable instructions.
In a fourth aspect, the present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program of instructions for implementing any one of the possible methods of the first aspect when executed by a processor.
The transaction detection method and device provided by the embodiment of the application are applied to nodes in a block chain system, wherein the nodes in the block chain system comprise a front-end application, an agent service module and a bottom service module, and the method comprises the following steps: the front-end application sends a transaction uplink request to the proxy service module, wherein the transaction uplink request comprises transaction data of a transaction to be processed; if the transaction data of the transaction to be processed does not contain the sensitive words, the proxy service module sends a transaction uplink instruction to the bottom service module; the bottom layer service module writes the transaction data of the transaction to be processed into the block chain system. Compared with the prior art, the method and the device have the advantages that before the transaction data are linked, the transaction data are detected according to the sensitive words, and the transaction data with the sensitive words which do not accord with the specification are not written into the blockchain system, so that the function that the blockchain system can filter the transaction data with the content which does not accord with the specification is realized.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the following briefly introduces the drawings needed to be used in the description of the embodiments or the prior art, and obviously, the drawings in the following description are some embodiments of the present invention, and those skilled in the art can obtain other drawings according to the drawings without inventive labor.
Fig. 1 is a schematic view of an application scenario of a transaction detection method according to an embodiment of the present application;
fig. 2 is a signaling interaction diagram of a transaction detection method according to an embodiment of the present application;
fig. 3 is a signaling interaction diagram of another transaction detection method provided in an embodiment of the present application;
fig. 4 is a signaling interaction diagram of another transaction detection method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The block chain refers to a traceable and non-falsifiable distributed accounting mechanism realized by a cryptography technology, a point-to-point network, a consensus mechanism and a block chain type data structure organized according to time sequence. The block chain back-end as a service (BaaS) platform can quickly create, deploy, run, and monitor a block chain application program.
In the prior art, the Baas platform can realize the functions of establishing a network, managing an account book, deploying an electronic contract and the like. On the Baas platform, an enterprise organization user may invoke an electronic contract to submit transaction data to the blockchain or to query transaction data from the chain. However, when transaction data submitted to a chain by an enterprise organization by calling an electronic contract is received, the existing Baas platform only needs to detect whether the transaction data meets the rules of the electronic contract, and does not need to detect the specific content of the transaction data, thereby causing the problem that a blockchain system such as the Baas platform cannot filter the transaction data whose content does not meet the specification.
In order to solve the above problems, the present application provides a transaction detection method and apparatus, which avoid storing transaction data that does not conform to the content specification in a blockchain system by detecting sensitive words in the transaction data, thereby implementing that the blockchain system does not have to filter the transaction data that does not conform to the content specification.
The following explains an application scenario of the present application.
Fig. 1 is a schematic view of an application scenario of a transaction detection method according to an embodiment of the present application. As shown in fig. 1, terminal device 101, terminal device 102, terminal device 103, terminal device 104, etc. constitute a block chain system. When a user writes transaction data into the blockchain system through the terminal device 101, the terminal device 101 may perform sensitive word detection on the transaction data input by the user, and only if the transaction data does not contain sensitive words, the terminal device 101 may write the transaction data into the blockchain system.
The terminal device 101, the terminal device 102, the terminal device 103, and the terminal device 104 may be a node in a block chain system. The terminal device may be a mobile phone (mobile phone), a tablet computer (pad), a computer with a wireless transceiving function, a Virtual Reality (VR) terminal device, an Augmented Reality (AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in remote surgery (remote medical supply), a wireless terminal in smart grid (smart grid), a wireless terminal in smart home (smart home), and the like. In the embodiment of the present application, the apparatus for implementing the function of the terminal may be a terminal device, or may be an apparatus capable of supporting the terminal to implement the function, for example, a chip system, and the apparatus may be installed in the terminal device. In the embodiment of the present application, the chip system may be composed of a chip, and may also include a chip and other discrete devices.
It should be noted that the application scenario of the technical solution of the present application may be the scenario in fig. 1, but is not limited to this, and may also be applied to other scenarios requiring transaction detection.
It can be understood that the above-mentioned transaction detection method can be implemented by the transaction detection device provided in the embodiment of the present application, and the transaction detection device may be a part or all of a certain device, and specifically may be a node in a blockchain system, for example, the terminal device or a chip of the terminal device.
In the following, a transaction detection device integrated or installed with a relevant execution code is taken as an example, and is used as a node in a blockchain system, and a technical solution of the embodiment of the present application is described in detail with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 2 is a signaling interaction diagram of a transaction detection method according to an embodiment of the present application, which relates to a specific process of how to perform transaction detection during a transaction data uplink process. The execution subject of the application is a transaction detection device, which can be a node in a blockchain system, wherein the node in the blockchain system comprises a front-end application, an agent service module and a bottom service module. As shown in fig. 2, the method includes:
s201, the front-end application sends an uplink transaction request to the proxy service module, where the uplink transaction request includes transaction data of a pending transaction.
The front-end application may be an application that supports uploading transaction data to the blockchain system. The proxy service module may be a service module that manages requests initiated by the front-end application.
In the application, when a user needs to store transaction data of a pending transaction on a blockchain system, the user can trigger sending of an uplink transaction request to a proxy service module by operating on a front-end application.
The embodiment of the application does not limit the type of the transaction data of the transaction to be processed, and the type of the transaction data can be determined according to actual conditions.
In some embodiments, the uplink transaction request input by the user may further include identification or account information of the user, and the proxy service module may verify whether the user has an authority to write the transaction data into the blockchain system by verifying the identification or account information of the user.
It should be appreciated that in some embodiments, nodes in the blockchain system also include back-end service modules corresponding to the front-end applications. The back-end service module is used for processing the operation triggered by the user on the page of the front-end application. For example, the front-end application may specifically send the uplink transaction request to the proxy service module by calling the back-end service module.
S202, if the transaction data of the transaction to be processed does not contain the sensitive words, the proxy service module sends an uplink transaction indication to the bottom layer service module.
In this step, after the proxy service module receives the transaction uplink request sent by the front-end application, the proxy service module may perform sensitive word detection on the transaction data of the transaction to be processed, and if the transaction data of the transaction to be processed does not include the sensitive word, the proxy service module sends a transaction uplink instruction to the bottom layer service module to instruct the bottom layer service module to write the transaction data into the blockchain system.
The bottom layer service module is used for writing and inquiring transaction data on the blockchain system.
It should be understood that the sensitive words may be pre-arranged specific words, such as words with a tendency to violence, non-civilized words, words with a tendency to become sensitive politically, etc.
In some embodiments, the proxy service module may sense a thesaurus of words. The sensitive word lexicon is updated in a plurality of ways.
For example, the proxy service module may receive a sensitive word change request sent by the management node, and then, the proxy service module adds or deletes a sensitive word in a sensitive word library in the proxy service module according to the sensitive word change request.
Illustratively, the front-end application sends a sensitive word adding request to the proxy service module, wherein the sensitive word adding request comprises a sensitive word. Subsequently, the proxy service module adds the sensitive words in a sensitive word bank in the proxy service module.
For example, the proxy service module may also periodically and actively acquire common sensitive words from the network, so as to periodically update the sensitive word bank.
In some embodiments, before writing the transaction data of the transaction to be processed into the blockchain system, the proxy service module may further detect whether the transaction data satisfies a rule of the electronic contract, and only when the transaction data of the transaction to be processed does not include the sensitive word and satisfies the rule of the electronic contract, the proxy service module sends the uplink transaction indication to the underlying service module.
In some optional embodiments, if the transaction data of the to-be-processed transaction includes the sensitive word, the proxy service module sends a second message to the front-end application, where the second message is used to indicate the sensitive word in the transaction data of the to-be-processed transaction. For example, if the transaction data of the pending transaction contains the sensitive word, the proxy service module may send a second message with "the transaction contains the sensitive word" from the front-end application.
S203, the bottom layer service module writes the transaction data of the transaction to be processed into the blockchain system.
In the embodiment of the present application, there is no limitation on the bottom service module writing the transaction data of the transaction to be processed into the blockchain system, and a common manner may be adopted.
In some optional embodiments, after the underlying service module writes the transaction data of the pending transaction into the blockchain system, the proxy service module sends a first message to the front-end application, where the first message is used to indicate that the transaction data of the pending transaction is successfully written into the blockchain system.
The transaction detection method provided by the embodiment of the application is applied to nodes in a blockchain system, wherein the nodes in the blockchain system comprise a front-end application, an agent service module and a bottom service module, and the method comprises the following steps: the front-end application sends a transaction uplink request to the proxy service module, wherein the transaction uplink request comprises transaction data of a transaction to be processed; if the transaction data of the transaction to be processed does not contain the sensitive words, the proxy service module sends a transaction uplink instruction to the bottom service module; the bottom layer service module writes the transaction data of the transaction to be processed into the block chain system. Compared with the prior art, the method and the device have the advantages that before the transaction data are linked, the transaction data are detected according to the sensitive words, and the transaction data with the sensitive words which do not accord with the specification are not written into the blockchain system, so that the function that the blockchain system can filter the transaction data with the content which does not accord with the specification is realized.
On the basis of the above embodiment, a process of detecting that the transaction data includes the sensitive word is described below. Fig. 3 is a signaling interaction diagram of another transaction detection method provided in an embodiment of the present application, as shown in fig. 3, the method includes:
s301, the front-end application sends an uplink transaction request to the proxy service module, wherein the uplink transaction request comprises transaction data of the transaction to be processed.
S302, the agent service module judges whether the transaction data of the transaction to be processed contains sensitive words.
If so, step S305 is executed, and if not, step S303 is executed.
S303, the proxy service module sends the trade uplink indication to the bottom service module.
S304, the bottom layer service module writes the transaction data of the transaction to be processed into the block chain system.
The technical terms, technical effects, technical features and alternative embodiments of S301 to S304 can be understood by referring to S201 to S203 shown in fig. 2, and repeated descriptions thereof will not be repeated here.
S305, the proxy service module sends a second message to the front-end application, wherein the second message is used for indicating the sensitive words in the transaction data of the transaction to be processed.
In this step, if it is detected that the transaction data of the transaction to be processed includes the sensitive word, the proxy service module sends a second message to the front-end application, where the second message is used to indicate the sensitive word in the transaction data of the transaction to be processed.
It should be appreciated that the front-end application receiving the second message may display the second message on a display component of a node in the blockchain system. For example, the sensitive words may be displayed on a display screen of a node in the blockchain system, and the positions of the sensitive words are marked, so as to remind the user to modify the transaction data to meet the quality requirement of the content.
In the transaction detection method provided by the application, when the transaction data of the transaction to be processed contains the sensitive words, the proxy service module sends a second message to the front-end application to send an error prompt to the user, so that the user can find the sensitive words in the transaction data of the transaction to be processed in time and modify the sensitive words in time, and the content quality of the transaction data recorded on the blockchain system is improved.
On the basis of the above embodiment, since the sensitive words may change over time, the transaction data that has been linked up may also have the sensitive words in the subsequent query process. Therefore, the transaction detection method provided in the embodiment of the present application performs sensitive word detection in the process of transaction data link, as well as in the process of transaction data query. The following describes how to perform the sensitive word detection process in the transaction data query process. Fig. 4 is a signaling interaction diagram of another transaction detection method provided in an embodiment of the present application, as shown in fig. 4, the method includes:
s401, the front-end application sends a query request to the proxy service module, wherein the query request comprises the identification of the transaction to be queried.
In this step, the user may input an inquiry instruction to the proxy service module through the front-end application in addition to the uplink transaction request to the proxy service module through the front-end application, so as to inquire the transaction data stored in the blockchain system.
The transaction to be queried is not limited in the embodiment of the present application, and the transaction data of the blockchain system may be written into the node in the blockchain system, or the transaction data of the blockchain system may be written into the nodes in other blockchain systems.
S402, the agent service module sends a query instruction to the bottom layer service module according to the query request.
In some embodiments, the query indication may further include an identifier of the user or account information of the user, so that the proxy service module verifies whether the user has the query right. If the agent service module inquires that the user has the right to inquire the transaction data, the agent service module can send an inquiry instruction to the bottom layer service module according to the inquiry request.
Wherein the query indication may also contain an identification of the transaction to be queried.
And S403, the bottom layer service module acquires the transaction data of the transaction to be inquired according to the inquiry instruction.
In some embodiments, the underlying service module may obtain transaction data of the transaction to be queried from the transaction data stored in the blockchain system according to the identification of the transaction to be queried.
S404, the bottom layer service module sends the transaction data of the transaction to be inquired to the agent service module.
S405, the agent service module judges whether the transaction data of the transaction to be inquired contains sensitive words.
If so, step S407 is executed, and if not, step S406 is executed.
It should be noted that, in the embodiment of the present application, the manner of determining whether the transaction data of the transaction to be queried includes the sensitive word may refer to the manner of determining whether the transaction data of the transaction to be processed includes the sensitive word in the embodiment, which is not described herein again.
S406, the agent service module sends the transaction data of the transaction to be inquired to the front-end application.
S407, the agent service module executes sensitive transaction processing operation.
Wherein the sensitive transaction processing operations include: recording the transaction to be inquired as a sensitive transaction, sending a sensitive transaction prompt to the front-end application, and accumulating the times of the behavior of calling the sensitive transaction by the user using the front-end application.
It should be noted that, if the transaction data of the transaction to be queried includes a sensitive word, the proxy service module may execute one sensitive transaction processing operation or multiple sensitive transaction processing operations, which is not limited in the present application.
S408, if the number of times of the user using the front-end application to invoke the sensitive transaction exceeds a threshold value, the proxy service module sends a forbidden indication to the front-end application, wherein the forbidden indication contains account information of the user.
Wherein the disabling indication sent by the sensitive transaction server may further contain an identification of the disabled user.
S409, the front-end application stops receiving the uplink transaction request and/or inquiry request input by the user.
The embodiments of the present application are not limited to how to stop receiving user-entered uplink transaction requests and/or inquiry requests, and may, for example,
for example, the front-end application may invoke the proxy service module to suspend the user, and then the proxy service module may update the user's status to a suspended status, and the node in the blockchain system stops receiving the ul requests and/or query indications input by the user.
In other embodiments, after receiving the indication from the management node, the proxy service module may also reactivate the user so that the node in the blockchain system re-executes the ul request and/or the query indication entered by the user.
In the transaction detection method provided by the embodiment of the application, the front-end application sends a query request to the proxy service module, and the query request includes the identification of the transaction to be queried. And the proxy service module sends a query instruction to the bottom layer service module according to the query request. And the bottom layer service module acquires the transaction data of the transaction to be inquired according to the inquiry instruction. And the bottom layer service module sends the transaction data of the transaction to be inquired to the agent service module. And if the transaction data of the transaction to be inquired does not contain the sensitive words, the proxy service module sends the transaction data of the transaction to be inquired to the front-end application. And if the transaction data of the transaction to be inquired contains the sensitive words, the proxy service module executes sensitive transaction processing operation. Compared with the prior art, the sensitive word verification process is added when the transaction data is inquired, so that the inquired transaction data can not contain the latest sensitive words, and the content of the transaction data can meet the latest standard.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
The embodiments of the present application further provide a transaction detection apparatus, which may be implemented by software, hardware, or a combination of the two, and may be, for example, a node in the blockchain system in the foregoing embodiments, to execute the transaction detection method in the foregoing embodiments. The transaction detection device includes: the system comprises a front-end application, a proxy service module and a bottom service module.
And the front-end application is used for sending an uplink transaction request to the proxy service module, wherein the uplink transaction request comprises transaction data of the transaction to be processed.
And the proxy service module is used for sending the uplink transaction indication to the bottom service module if the transaction data of the transaction to be processed does not contain the sensitive words.
And the bottom layer service module is used for writing the transaction data of the transaction to be processed into the blockchain system.
In an optional implementation manner, the transaction detection device further includes a back-end service module corresponding to the front-end application.
The front-end application is specifically used for calling the back-end service module to send a transaction uplink request to the proxy service module.
In an optional embodiment, the proxy service module is further configured to send a first message to the front-end application, where the first message is used to indicate that the transaction data of the pending transaction is successfully written into the blockchain system.
In an optional implementation manner, the agent service module is further configured to send a second message to the front-end application if the transaction data of the to-be-processed transaction includes the sensitive word, where the second message is used to indicate the sensitive word in the transaction data of the to-be-processed transaction.
In an optional implementation, the front-end application is further configured to send a query request to the proxy service module, where the query request includes an identifier of a transaction to be queried.
And the proxy service module is also used for sending a query instruction to the bottom layer service module according to the query request.
The bottom layer service module is also used for acquiring transaction data of the transaction to be inquired according to the inquiry instruction; and sending the transaction data of the transaction to be inquired to the agent service module.
In an optional implementation manner, the agent service module is further configured to send the transaction data of the transaction to be queried to the front-end application if the transaction data of the transaction to be queried does not include the sensitive word.
In an optional implementation manner, the agent service module is further configured to execute a sensitive transaction processing operation if the transaction data of the transaction to be queried includes a sensitive word.
In an alternative embodiment, the sensitive transaction processing operation comprises: recording the transaction to be inquired as a sensitive transaction, sending a sensitive transaction prompt to the front-end application, and accumulating the times of the behavior of calling the sensitive transaction by the user using the front-end application.
In an optional implementation manner, the proxy service module is further configured to send a disabling instruction to the front-end application if the number of times that the user uses the front-end application to invoke the behavior of the sensitive transaction exceeds a threshold, where the disabling instruction includes account information of the user;
the front-end application is also used for stopping receiving the trade uplink request and/or the inquiry request input by the user.
In an optional implementation manner, the front-end application is specifically configured to stop receiving the uplink transaction request and/or the query request input by the user by invoking the back-end service module corresponding to the front-end application.
In an optional implementation manner, the proxy service module is further configured to receive a sensitive word change request sent by the management node; and adding or deleting the sensitive words in a sensitive word library in the proxy service module according to the sensitive word change request.
In an optional implementation manner, the front-end application is further configured to send a sensitive word addition request to the proxy service module, where the sensitive word addition request includes a sensitive word;
and the proxy service module is also used for adding sensitive words in a sensitive word bank in the proxy service module.
It should be noted that the transaction detection device provided in the embodiment of the present application may be used to execute the method provided in any of the above embodiments, and the specific implementation manner and the technical effect are similar, and are not described herein again.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 5, the electronic device may include: at least one processor 501 and memory 502. Fig. 5 shows an electronic device as an example of a processor.
The memory 502 is used for storing programs. In particular, the program may include program code including computer operating instructions.
Memory 502 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The processor 501 is configured to execute computer-executable instructions stored in the memory 502 to implement the transaction detection method described above;
the processor 501 may be a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement the embodiments of the present Application.
Alternatively, in a specific implementation, if the communication interface, the memory 502 and the processor 501 are implemented independently, the communication interface, the memory 502 and the processor 501 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. Buses may be classified as address buses, data buses, control buses, etc., but do not represent only one bus or type of bus.
Alternatively, in a specific implementation, if the communication interface, the memory 502 and the processor 501 are integrated into a chip, the communication interface, the memory 502 and the processor 501 may complete communication through an internal interface.
The embodiment of the application also provides a chip which comprises a processor and an interface. Wherein the interface is used for inputting and outputting data or instructions processed by the processor. The processor is configured to perform the methods provided in the above method embodiments. The chip can be applied to a transaction detection device.
The present application also provides a computer-readable storage medium, which may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, are specifically, the computer-readable storage medium stores program information, and the program information is used in the transaction detection method.
Embodiments of the present application also provide a program, which when executed by a processor, is configured to perform the transaction detection method provided by the above method embodiments.
Embodiments of the present application also provide a program product, such as a computer-readable storage medium, having stored therein instructions, which, when executed on a computer, cause the computer to execute the transaction detection method provided by the above method embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the invention are brought about in whole or in part when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (15)

1. A transaction detection method is applied to a node in a blockchain system, wherein the node in the blockchain system comprises a front-end application, a proxy service module and a bottom service module, and the method comprises the following steps:
the front-end application sends an uplink transaction request to the proxy service module, wherein the uplink transaction request comprises transaction data of a transaction to be processed;
if the transaction data of the transaction to be processed does not contain the sensitive words, the proxy service module sends an uplink transaction instruction to the bottom layer service module;
and the bottom layer service module writes the transaction data of the transaction to be processed into the blockchain system.
2. The method according to claim 1, wherein the nodes in the blockchain system further include a back-end service module corresponding to the front-end application;
the front-end application sending a trade uplink request to the proxy service module, including:
and the front-end application calls the back-end service module to send the trade uplink request to the proxy service module.
3. The method of claim 1, wherein after the underlying service module writes transaction data for the pending transaction to the blockchain system, the method further comprises:
and the agent service module sends a first message to the front-end application, wherein the first message is used for indicating that the transaction data of the transaction to be processed is successfully written into the blockchain system.
4. The method according to any of claims 1-3, wherein after the front-end application sends a uplink transaction request to the proxy service module, the method further comprises:
and if the transaction data of the transaction to be processed contains the sensitive words, the proxy service module sends a second message to the front-end application, wherein the second message is used for indicating the sensitive words in the transaction data of the transaction to be processed.
5. The method of claim 1, further comprising:
the front-end application sends a query request to the proxy service module, wherein the query request comprises an identifier of a transaction to be queried;
the proxy service module sends a query instruction to the bottom layer service module according to the query request;
the bottom layer service module acquires the transaction data of the transaction to be inquired according to the inquiry instruction;
and the bottom layer service module sends the transaction data of the transaction to be inquired to the agent service module.
6. The method of claim 5, wherein after the underlying service module sends the transaction data of the transaction to be queried to the proxy service module, the method further comprises:
and if the transaction data of the transaction to be inquired does not contain the sensitive words, the proxy service module sends the transaction data of the transaction to be inquired to the front-end application.
7. The method of claim 5, wherein after the underlying service module sends the transaction data of the transaction to be queried to the proxy service module, the method further comprises:
and if the transaction data of the transaction to be inquired contains the sensitive words, the proxy service module executes sensitive transaction processing operation.
8. The method of claim 7, wherein the sensitive transaction processing operation comprises: recording the transaction to be inquired as a sensitive transaction, sending a sensitive transaction prompt to the front-end application, and accumulating the times of the behavior of calling the sensitive transaction by the user by using the front-end application.
9. The method of claim 8, wherein after the proxy service module performs sensitive transaction processing operations, the method further comprises:
if the number of times of the user using the front-end application to invoke the behavior of the sensitive transaction exceeds a threshold value, the proxy service module sends a forbidden indication to the front-end application, wherein the forbidden indication contains account information of the user;
the front-end application stops receiving uplink transaction requests and/or inquiry requests input by the user.
10. The method of claim 9, wherein the front-end application ceasing to receive the user-entered uplink transaction request and/or inquiry request comprises:
and the front-end application stops receiving the trade uplink request and/or the query request input by the user by calling a back-end service module corresponding to the front-end application.
11. The method of claim 1, further comprising:
the proxy service module receives a sensitive word change request sent by a management node;
and the proxy service module adds or deletes the sensitive words in a sensitive word bank in the proxy service module according to the sensitive word changing request.
12. The method of claim 1, further comprising:
the front-end application sends a sensitive word adding request to the proxy service module, wherein the sensitive word adding request comprises a sensitive word;
and the proxy service module adds the sensitive words in a sensitive word bank in the proxy service module.
13. A transaction detection device, wherein the transaction detection device is a node in a blockchain system, the transaction detection device comprising: the system comprises a front-end application, an agent service module and a bottom service module;
the front-end application is used for sending an uplink transaction request to the proxy service module, wherein the uplink transaction request comprises transaction data of a transaction to be processed;
the agent service module is used for sending an uplink transaction instruction to the bottom service module if the transaction data of the transaction to be processed does not contain sensitive words;
and the bottom layer service module is used for writing the transaction data of the transaction to be processed into the blockchain system.
14. An electronic device, comprising: a memory and a processor;
the memory for storing executable instructions of the processor;
the processor is configured to perform the method of any of claims 1-12 via execution of the executable instructions.
15. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-12.
CN202011041344.9A 2020-09-28 Transaction detection method and device Active CN112131478B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011041344.9A CN112131478B (en) 2020-09-28 Transaction detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011041344.9A CN112131478B (en) 2020-09-28 Transaction detection method and device

Publications (2)

Publication Number Publication Date
CN112131478A true CN112131478A (en) 2020-12-25
CN112131478B CN112131478B (en) 2024-05-17

Family

ID=

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469811A (en) * 2021-07-05 2021-10-01 支付宝(杭州)信息技术有限公司 Block chain transaction processing method and device
CN113495927A (en) * 2021-09-06 2021-10-12 支付宝(杭州)信息技术有限公司 Block management method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846752A (en) * 2018-06-06 2018-11-20 北京京东金融科技控股有限公司 Data processing method, system, block platform chain and readable storage medium storing program for executing
US20200119910A1 (en) * 2018-10-16 2020-04-16 International Business Machines Corporation Selective exchange of transaction data
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium
US20210167972A1 (en) * 2019-01-09 2021-06-03 Tencent Technology (Shenzhen) Company Limited Method for issuing digital certificate, digital certificate issuing center, and medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846752A (en) * 2018-06-06 2018-11-20 北京京东金融科技控股有限公司 Data processing method, system, block platform chain and readable storage medium storing program for executing
US20200119910A1 (en) * 2018-10-16 2020-04-16 International Business Machines Corporation Selective exchange of transaction data
US20210167972A1 (en) * 2019-01-09 2021-06-03 Tencent Technology (Shenzhen) Company Limited Method for issuing digital certificate, digital certificate issuing center, and medium
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469811A (en) * 2021-07-05 2021-10-01 支付宝(杭州)信息技术有限公司 Block chain transaction processing method and device
CN113495927A (en) * 2021-09-06 2021-10-12 支付宝(杭州)信息技术有限公司 Block management method and device
CN114817399A (en) * 2021-09-06 2022-07-29 支付宝(杭州)信息技术有限公司 Block management method and device
WO2023029743A1 (en) * 2021-09-06 2023-03-09 支付宝(杭州)信息技术有限公司 Block management

Similar Documents

Publication Publication Date Title
CN109309712B (en) Data transmission method based on interface asynchronous call, server and storage medium
CN109885786B (en) Data caching processing method and device, electronic equipment and readable storage medium
US11153291B2 (en) Non-disruptive system for verifying default passwords have been changed without causing security lockouts
CN107798405B (en) Medical service reservation method, medical service reservation device, storage medium and computer equipment
CN109600254B (en) Method for generating full-link log and related system
CN108228842B (en) Docker mirror image library file storage method, terminal, device and storage medium
EP3964996A1 (en) Database access method and device
CN111159298B (en) Service request processing method and device, electronic equipment and storage medium
CN113157491A (en) Data backup method and device, communication equipment and storage medium
CN115114042A (en) Storage data access method and device, electronic equipment and storage medium
CN112131478B (en) Transaction detection method and device
CN112131478A (en) Transaction detection method and device
CN110275772B (en) Data processing method and related equipment thereof
CN111159160A (en) Version rollback method and device, electronic equipment and storage medium
CN115827778A (en) Data acquisition method and device, electronic equipment and storage medium
CN112835762B (en) Data processing method and device, storage medium and electronic equipment
CN115170152A (en) Data distribution method, device, equipment and storage medium
CN108959405B (en) Strong consistency reading method of data and terminal equipment
CN114416402A (en) Information transmission method, terminal device and storage medium
CN110765426A (en) Equipment permission setting method, device, equipment and computer storage medium
CN108345431B (en) Data reading method and device
CN113157405A (en) Method and device for retrying breakpoint of business process
CN110874238A (en) Online service updating method and device
CN107209882B (en) Multi-stage de-registration for managed devices
US9619306B2 (en) Information processing device, control method thereof, and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Technology Information Technology Co.,Ltd.

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: Jingdong Shuke Haiyi Information Technology Co.,Ltd.

Applicant before: Jingdong Technology Holding Co.,Ltd.

Address after: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Shuke Haiyi Information Technology Co.,Ltd.

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Beijing Economic and Technological Development Zone, Beijing 100176

Applicant before: BEIJING HAIYI TONGZHAN INFORMATION TECHNOLOGY Co.,Ltd.

Applicant before: Jingdong Digital Technology Holding Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant