CN117557269A - Intelligent contract transaction security management and control method and system based on identity authentication - Google Patents

Intelligent contract transaction security management and control method and system based on identity authentication Download PDF

Info

Publication number
CN117557269A
CN117557269A CN202311675338.2A CN202311675338A CN117557269A CN 117557269 A CN117557269 A CN 117557269A CN 202311675338 A CN202311675338 A CN 202311675338A CN 117557269 A CN117557269 A CN 117557269A
Authority
CN
China
Prior art keywords
verification
password
edge node
user
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311675338.2A
Other languages
Chinese (zh)
Inventor
朱名生
徐兵
王磊
兰春嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lingshuzhonghe Information Technology Co ltd
Original Assignee
Shanghai Lingshuzhonghe Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lingshuzhonghe Information Technology Co ltd filed Critical Shanghai Lingshuzhonghe Information Technology Co ltd
Priority to CN202311675338.2A priority Critical patent/CN117557269A/en
Publication of CN117557269A publication Critical patent/CN117557269A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application provides an intelligent contract transaction security management and control method and system based on identity authentication, and relates to the technical field of transaction security, wherein the method comprises the following steps: firstly receiving application information of a user, then carrying out initial analysis to obtain an analysis result, then generating a unique identification ID, sending the unique identification ID to a cloud center, executing task pairing, establishing temporary authentication connection if task pairing is completed within a preset period, reading verification data of the user, and completing contract transaction based on the temporary authentication connection if verification is passed. The utility model provides a lack unified mechanism and manage, lead to the control harder, cause privacy to leak in a large number, infringe, unable difference be in blacklist user, lead to the lower problem of security. Task pairing is performed through the unique identification ID, and then temporary connection is established through identity verification, so that safe execution of the intelligent contract is ensured.

Description

Intelligent contract transaction security management and control method and system based on identity authentication
Technical Field
The application relates to the technical field of transaction security, in particular to an intelligent contract transaction security management and control method and system based on identity authentication.
Background
With the development of big data and artificial intelligence technology, personal privacy protection problems become more and more prominent, if insufficient protection measures are not available, the information can be utilized by lawbreakers, at present, monitoring installation and information preservation are basically managed by individuals, and a unified mechanism or platform is lacked for management, so that monitoring is randomly placed, and the problem is caused. The intelligent contract transaction safety management and control method based on the identity authentication is a protective measure aiming at intelligent contract transaction safety.
However, in the process of implementing the technical scheme of the invention in the embodiment of the application, the inventor of the application finds that at least the following technical problems exist in the above technology:
basic information is managed by individuals, and lack of unified mechanisms for management leads to difficult monitoring, causes massive leakage and infringement of personal privacy, cannot distinguish the problem of blacklist users, and leads to lower security.
Disclosure of Invention
The utility model provides a lack unified mechanism and manage, lead to the control harder, cause privacy to leak in a large number, infringe, unable difference be in blacklist user, lead to the lower problem of security.
In view of the above problems, the present application provides an intelligent contract transaction security management and control method and system based on identity authentication, and in a first aspect, the present application provides an intelligent contract transaction security management and control method based on identity authentication, where the method includes: receiving application information of a user, and carrying out initial analysis on the application information to generate an initial analysis result, wherein the initial analysis result comprises transaction task information, transaction party information and user account information, and a receiving main body of the application information is edge node equipment; generating a unique identification ID according to the transaction task information and the transaction party information, transmitting the unique identification ID to a cloud center, and executing task pairing; if task pairing is completed within a preset time period, authentication is passed, and temporary authentication connection among the cloud center, the current edge node equipment and the paired edge node equipment is established; reading input verification data of a user, dividing the input verification data into an independent password and a combined password, verifying the independent password based on current edge node equipment, combining a calculated value with the combined password, and sending the combined password to the cloud center; performing newly added combined password combination verification of the current edge node equipment and the paired edge node equipment through the cloud center; and if the combined verification is passed, completing the contract transaction based on the temporary authentication connection.
In a second aspect, the present application provides an intelligent contract transaction security management and control system based on identity authentication, the system comprising: the analysis result generation module is used for receiving application information of a user, carrying out initial analysis on the application information and generating an initial analysis result, wherein the initial analysis result comprises transaction task information, transaction party information and user account information, and a receiving main body of the application information is edge node equipment; the task pairing execution module is used for generating a unique identifier ID according to the transaction task information and the transaction party information, sending the unique identifier ID to a cloud center and executing task pairing; the temporary authentication connection establishment module is used for establishing temporary authentication connection of the cloud center, the current edge node equipment and the paired edge node equipment if task pairing is completed within a preset time period; the verification data reading module is used for reading input verification data of a user, dividing the input verification data into an independent password and a combined password, carrying out independent password verification based on current edge node equipment, combining a calculated value with the combined password and sending the combined password to the cloud center; the newly added combination verification module is used for carrying out newly added combination password combination verification of the current edge node equipment and the paired edge node equipment through the cloud center; and the contract transaction completion module is used for completing the contract transaction based on the temporary authentication connection if the combination verification is passed.
In a third aspect, the present application provides an electronic device comprising: a processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of the first aspects.
In a fourth aspect, the present application provides a computer readable storage medium storing computer instructions for causing a processor to perform the steps of the method of any one of the first aspects above. One or more technical solutions provided in the present application have at least the following technical effects or advantages:
the application provides an intelligent contract transaction security management and control method and system based on identity authentication, and relates to the technical field of transaction security, wherein the method comprises the following steps: firstly receiving application information of a user, then carrying out initial analysis to obtain an analysis result, then generating a unique identification ID, sending the analysis result to a transportation center, executing task pairing, establishing temporary authentication connection if the task pairing is completed within a preset period, reading verification data of the user, and completing contract transaction based on the temporary authentication connection if the verification is passed.
The utility model provides a lack unified mechanism and manage, lead to the control harder, cause privacy to leak in a large number, infringe, unable difference be in blacklist user, lead to the lower problem of security. Task pairing is performed through the unique identification ID, and then temporary connection is established through identity verification, so that safe execution of the intelligent contract is ensured.
The foregoing description is merely an overview of the technical solutions of the present application, and may be implemented according to the content of the specification in order to make the technical means of the present application more clearly understood, and in order to make the above-mentioned and other objects, features and advantages of the present application more clearly understood, the following detailed description of the present application will be given.
Drawings
For a clearer description of the technical solutions of the present application or of the prior art, the drawings used in the description of the embodiments or of the prior art will be briefly described below, it being obvious that the drawings in the description below are only exemplary and that other drawings can be obtained, without inventive effort, by a person skilled in the art from the drawings provided.
FIG. 1 is a schematic flow chart of an intelligent contract transaction security management and control method based on identity authentication according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a method for performing authentication management in an intelligent contract transaction security management and control method based on identity authentication according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of a method for performing verification compensation of combined verification according to an updated verification level in an intelligent contract transaction security management and control method based on identity authentication according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a system for controlling security of intelligent contract transactions based on identity authentication according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an exemplary electronic device of the present application. Reference numerals illustrate: the system comprises an analysis result generation module 10, a task pairing execution module 20, a temporary authentication connection establishment module 30, a verification data reading module 40, a newly added combination verification module 50, a contract transaction completion module 60, an electronic device 300, a memory 301, a processor 302, a communication interface 303 and a bus architecture 304.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings of the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The utility model provides a lack unified mechanism and manage, lead to the control harder, cause privacy to leak in a large number, infringe, unable difference be in blacklist user, lead to the lower problem of security. Task pairing is performed through the unique identification ID, and then temporary connection is established through identity verification, so that safe execution of the intelligent contract is ensured.
For a better understanding of the foregoing technical solutions, the following detailed description will be given with reference to the accompanying drawings and specific embodiments of the present invention:
example 1
The intelligent contract transaction security management and control method based on identity authentication as shown in fig. 1 comprises the following steps:
receiving application information of a user, and carrying out initial analysis on the application information to generate an initial analysis result, wherein the initial analysis result comprises transaction task information, transaction party information and user account information, and a receiving main body of the application information is edge node equipment;
specifically, the edge node device receives user application information and performs initial analysis on the application information to generate an initial analysis result containing transaction task information, transaction party information and user account information. Receiving application information: the edge node device receives application information from the user. Such information may include transaction requests, transaction details, transaction party information, and the like. Initial analysis: the edge node device performs preliminary analysis on the received application information. Including checking the format of the information, verifying the integrity of the information, checking the validity of the information, etc. Generating an initial analysis result: the result of the initial parsing will form a structured data containing transaction task information, transaction party information, and user account information. Storage and transmission: the generated initial parsing result may be stored in an appropriate storage device or transmitted to other desired nodes or systems through a secure network connection. The edge node device plays roles in receiving, analyzing and primarily processing application information in the process, and is beneficial to follow-up more complex transaction processing and smooth operation of user account management.
Generating a unique identification ID according to the transaction task information and the transaction party information, transmitting the unique identification ID to a cloud center, and executing task pairing;
specifically, a unique identification ID is generated according to the transaction task information and the transaction party information, and the unique identification ID is sent to the cloud center to execute task pairing. Generating a unique identification ID: after generating the initial analysis result, the system generates a unique identification ID according to the transaction task information and the transaction party information. This unique identification ID is used to identify this particular transaction task and party. Transmitting the unique identification ID to the cloud center: the generated unique identification ID is sent to the cloud center. The cloud center is the core of the whole system and is responsible for coordinating and managing all transaction tasks and transaction parties. Task pairing: after receiving the unique identification ID, the cloud center pairs the unique transaction task with the transaction party according to a certain algorithm or rule. Performing task pairing: once the transaction task and transaction party are successfully paired, execution of the transaction begins. By sending the unique identification ID to the cloud center and performing task pairing, fairness, security, and traceability of the transaction can be ensured. Meanwhile, by utilizing the cooperative work of the edge node equipment and the cloud center, the transaction efficiency and the overall performance of the system can be improved.
If task pairing is completed within a preset time period, authentication is passed, and temporary authentication connection among the cloud center, the current edge node equipment and the paired edge node equipment is established;
specifically, if task pairing is successfully completed within a predetermined period of time, the system will authenticate pass and further establish a temporary authentication connection between the cloud center, the current edge node device, and the paired edge node device. Task pairing is completed: if the task pairing is completed successfully within a predetermined period of time, the system will record this result and prepare for the next operation. Authentication is passed: since the task pairing has completed successfully, the system will authenticate the process as legitimate and valid. Including checking and verifying the legitimacy, security, correctness, etc. of the transaction. Establishing a temporary authentication connection: after the authentication is passed, the system establishes a temporary authentication connection between the cloud center, the current edge node device, and the paired edge node device. This connection is used for further data exchange, instruction transmission or status feedback. Data exchange and instruction transmission: through the temporary authentication connection, the cloud center may send data or instructions to the current edge node device and the paired edge node device, or receive data or status feedback sent by these devices. This may involve further processing, verification, or other manipulation of the transaction. Connection is closed: once the transaction is completed or the temporary authentication connection is no longer needed, the connection may be closed. At the same time, the relevant data and records are also saved and archived for later querying and management. By completing task pairing and establishing temporary authentication connection within a preset time period, the synergy and efficiency of the whole system can be improved, and smooth transaction and stable operation of the system are ensured. At the same time, this architecture also helps to protect user privacy, prevent fraud, and maintain the security of the system.
Reading input verification data of a user, dividing the input verification data into an independent password and a combined password, verifying the independent password based on current edge node equipment, combining a calculated value with the combined password, and sending the combined password to the cloud center;
specifically, after receiving the input verification data of the user, the system divides the input verification data into an independent password and a combined password, verifies the independent password based on the current edge node device, combines the calculated value and the combined password, and sends the combined value and the calculated value to the cloud center. Reading user input: the system may receive and read user input verification data, which may include user entered passwords, transaction information, or other sensitive data. Segmentation data: the system will split the input authentication data into an independent password and a combined password. The independent password may be a password separately set by the user for verifying the identity of the user; the combined password may be a complex password formed by combining a plurality of passwords or other information, and is used for improving the security of the system. Independent password verification: based on the current edge node device, the system will verify the independent password. Including checking the format, length, complexity, etc. of the password, and calculating the password using a predefined algorithm or hash function. Sending to a cloud center: once the combination of the calculated value and the combined password is completed, the system sends this result to the cloud center. The cloud center may further process the results, such as for data storage, comparison, or other operations. By reading the steps of user input, dividing data, independent password verification, combined password and the like, the security and efficiency of the system can be improved, the privacy of the user can be protected, and unauthorized access can be prevented. Meanwhile, the reliability and performance of the system can be further enhanced by utilizing the cooperative work of the edge node equipment and the cloud center.
Performing newly added combined password combination verification of the current edge node equipment and the paired edge node equipment through the cloud center;
specifically, through the cloud center, the newly added combination password combination of the current edge node device and the paired edge node device can be verified. Receiving a new combination password combination: the current edge node device and the paired edge node device may send the newly added combination password combination to the cloud center. The new combination password combination may be formed by combining passwords or other sensitive information newly set by the user. Verifying the combination password combination: the cloud center verifies the received combination password combination. This includes checking the format, length, complexity, etc. of the combination of passwords, and calculating the combination of passwords using a predefined algorithm or hash function. By verification: if the combined password combination verification passes, the cloud center stores or updates the combined password combination verification into corresponding storage equipment, and informs the current edge node equipment and the paired edge node equipment of the verification result. Treatment results: and the current edge node equipment and the paired edge node equipment perform corresponding processing according to the verification result sent by the cloud center. For example, if the verification passes, the system may continue to perform subsequent transactions or operations, and if the verification does not pass, the system may prompt the user to reenter the password or perform other authentication operations. By carrying out newly added combined password combination verification of the current edge node equipment and the paired edge node equipment in the cloud center, the security and efficiency of the system can be improved, and only legal users and equipment can operate and trade. Meanwhile, the reliability and performance of the system can be enhanced by utilizing the centralized management and verification functions of the cloud center.
And if the combined verification is passed, completing the contract transaction based on the temporary authentication connection.
Specifically, if the combined password combination verification passes, the system may complete the contract transaction based on the temporary authentication connection. The verification is as follows: through verification by the cloud center, if the combined cryptographic combination is considered valid and valid, the system proceeds to the next step. Temporary authentication connection establishment: after verification is passed, the system connects the current edge node device and the paired edge node device using the previously established temporary authentication connection. This may ensure that only legitimate devices can participate in the contract transaction. Contract transaction execution: based on the temporary authentication connection, the system may perform a contract transaction. This may involve funds transfers, item exchanges, or other transaction operations. The specifics of the contract transaction may be defined by the user at the time of filing and performed by the system according to predetermined rules and protocols. Transaction records and feedback: the system will record the results of the transaction and provide feedback to the user. This includes funds changes, item exchange status, or other relevant information. The user may check the result or transaction status based on feedback. Connection is closed: once the contract transaction is completed and validated, the temporary authentication connection may be closed. This may protect the security and stability of the system from unauthorized access or potential attacks. Data archiving and backup: the system will archive and back up the transaction data and other relevant information for subsequent querying and management. This helps to preserve user privacy and reliability of the system. By completing the contract transaction based on the temporary authentication connection, the security and efficiency of the system can be improved, ensuring that only authenticated devices can perform legitimate transaction operations. Meanwhile, the reliability and performance of the system can be further enhanced by utilizing the cooperative work of the edge node equipment and the cloud center.
Further, as shown in fig. 2, the method of the present application further includes:
obtaining registration information of a user, performing registration configuration based on registration edge node equipment receiving the registration information, and dividing password verification into an independent password verification unit and a combined password verification unit;
the combined password verification unit, the user ID and the registration edge node ID are sent to a cloud center, and an authentication index is generated in the cloud center;
and after the task pairing is successfully executed, calling the authentication index through the user account information, establishing temporary communication between the current edge node equipment and the registered edge node equipment, sending an independent authentication password unit to the current edge node equipment, and executing authentication management.
Specifically, registration information of a user is obtained: the system will receive and read the user's registration information, which may include sensitive information such as user name, password, email, etc. Registering the edge node equipment for registration configuration: after receiving the registration information, the system performs registration configuration based on the registration edge node device that receives the registration information. This includes checking the format of the registration information, verifying the integrity of the information, checking the validity of the information, etc. The password authentication is divided into an independent password authentication unit and a combined password authentication unit: the system may divide the password authentication into an independent password authentication unit and a combined password authentication unit. The independent password verification unit may be a password set by the user alone for verifying the identity of the user; the combined password authentication unit may be a complex password formed by combining a plurality of passwords or other information, and is used for improving the security of the system. Transmitting the combined password authentication unit, the user ID and the registration edge node ID to a cloud center: the system may send the combined password authentication unit, the user ID, and the registered edge node ID to the cloud center. The cloud center is the core of the whole system and is responsible for coordinating and managing all registration information and transaction tasks. Generating an authentication index at a cloud center: the cloud center receives the combined password verification unit, the user ID and the registration edge node ID and generates a corresponding authentication index. The authentication index may be used for subsequent authentication management and transaction matching. After the task pairing is successfully performed: if the task pairing is successfully completed within a predetermined period of time, the system authenticates, invokes an authentication index via the user account information: the system may call an authentication index generated at the cloud center through the user account information. This facilitates establishing proper connections and communications between the plurality of nodes and devices. Establishing temporary communication between the current edge node device and the registered edge node device: by invoking the authentication index, the system establishes temporary communication between the current edge node device and the registered edge node device. Establishing encryption connection, performing identity authentication and other operations. Transmitting the independent authentication cryptographic unit to the current edge node device: the system will send the independent authentication cryptographic unit to the current edge node device for further authentication. Performing authentication management: after the above steps are completed, the system performs authentication management. This includes authentication of the current edge node device and the registered edge node device, verification of user account information, and other related operations. If the authentication passes, the system may continue to perform subsequent transactions or operations, and if the authentication does not pass, the system may prompt the user to reenter the password or perform other authentication operations. Through the steps, the registration information security of the user can be protected, only legal users can participate in the system, and corresponding transactions and operations are executed. Meanwhile, the reliability and performance of the system can be improved by utilizing the cooperative work of the edge node equipment and the cloud center.
Further, the method comprises the following steps:
after the independent verification password unit is sent to the current edge node equipment, if the independent password verification result is a passing result, generating an updating instruction;
and updating the index of the authentication index according to the updating instruction, and deleting the independent password verification unit of the registered edge node equipment.
Specifically, after the independent verification password unit is sent to the current edge node device, if the independent password verification result is a passing result, the system generates an update instruction. This update instruction is used to update the authentication index to reflect the latest authentication state or user information. Then, the system updates the index of the authentication index according to the update command. This includes operations to modify, update or reorganize the authentication index to reflect the latest authentication state or changes in user information. Finally, the system deletes the independent password authentication unit registered with the edge node device. This ensures that only authenticated devices are able to perform legitimate transaction operations and protects the security and stability of the system. Through the steps, the authentication process of the system can be ensured to be effective and safe, and related information can be updated and deleted in time so as to maintain the integrity and reliability of the system. Meanwhile, by utilizing the cooperative work of the edge node equipment and the cloud center, the response speed and the overall performance of the system can be improved.
Further, as shown in fig. 3, the method of the present application comprises:
obtaining a task grade based on the application information;
judging whether the task level triggers a preset level threshold;
if the task level triggers the preset level threshold, generating a log calling instruction;
according to the log calling instruction, log calling is carried out, and the verification level is updated through a calling result;
and performing verification compensation of combined verification according to the updated verification level.
Specifically, the task level is obtained based on the application information: the system evaluates and determines the task level based on the user's application information or task related data. This may involve an assessment of factors such as importance, complexity, risk, etc. of the task. Judging whether the task level triggers a preset level threshold value or not: the system may determine whether the task level has reached a preset level threshold. If the task level is greater than or equal to the preset level threshold, the system proceeds to the next step. If the task level triggers a preset level threshold, generating a log calling instruction: when the task level triggers a preset level threshold, the system generates a log calling instruction. This instruction is used to invoke the relevant log information for further verification and processing. According to the log calling instruction, log calling is carried out, and the verification level is updated through the calling result: the system can acquire the log information from the corresponding storage or record according to the log calling instruction. The system then updates the verification level based on the log information and the associated rules. Including verification of user account information, inspection of transaction records, and other related operations. And performing verification compensation of combined verification according to the updated verification level: according to the updated verification level, the system performs verification compensation for combined verification. This may involve operations such as recalculating the combination of passwords, adjusting the password length, or other combination policies. The purpose of the compensation is to ensure that the complexity and security of the cryptographic combination meets the requirements and standards of the system. Through the process, the safety and efficiency of the system can be improved, and the privacy and account safety of the user are protected. Meanwhile, the reliability and performance of the system can be further enhanced by utilizing the cooperative work of the preset level threshold and log call.
Further, the method comprises the following steps:
performing trust evaluation of log authentication based on the calling result, and establishing a trust evaluation set;
configuring an overlay compensation network of the trust degree, and inputting the trust degree evaluation set into the overlay compensation network according to a time sequence;
performing overlay trust processing on the trust evaluation set through the overlay compensation network to generate a compensation verification grade;
and updating the verification level through the compensation verification level.
Specifically, the security and the credibility of the system are further enhanced by the process, the credibility evaluation of log authentication is performed based on the calling result, and a credibility evaluation set is established: and the system evaluates the trust degree of each log entry according to the execution result of the log calling instruction. These evaluations may be based on factors such as the source of the log entry, the content, the time stamp, etc., and form a set of trust evaluations. Coverage compensation network for configuring trust: the system may configure an overlay compensation network, which may be composed of multiple neural network layers or machine learning models, for processing and analyzing the set of trust evaluations. Inputting the trust evaluation set into the coverage compensation network according to a time sequence: the system will input the set of trust evaluations into the overlay compensation network in chronological order. This order may be based on the time stamp of the log entry or other relevant factors. Performing overlay trust processing on the trust evaluation set through the overlay compensation network to generate a compensation verification grade: the overlay compensation network can conduct deep analysis and processing on the trust evaluation set, and the compensation verification level is generated according to training and optimization of the network. This compensating authentication level may be a correction or supplement to the original authentication level. And updating the verification level through the compensation verification level: the system updates the original verification level according to the generated compensation verification level. This may involve further verification of user account information, detailed inspection of transaction records, and other related operations. Through the series of steps, the system can evaluate the trust degree of the user more accurately and effectively, and update the verification level accordingly. This helps to improve the security, reliability and user experience of the system.
Further, the method comprises the following steps:
performing account trust degree accumulated evaluation of the user according to the calling result;
if the trust level accumulated evaluation result cannot meet the preset accumulated threshold value, generating a reset establishment instruction;
and after the depth password of the user is verified through the reset establishment instruction, account password reconstruction is carried out on the user.
Specifically, the account trust degree accumulated evaluation of the user is carried out according to the calling result: and the system performs accumulated evaluation on the account trust degree of the user according to the execution result of the log calling instruction and the previous trust degree evaluation set. This may involve analysis and evaluation of factors such as the user's operational history, patterns of behavior, transaction records, etc. If the trust level accumulated evaluation result cannot meet the preset accumulated threshold value, generating a reset establishment instruction: if the trust level accumulated evaluation result of the system shows that the account trust level of the user does not reach the preset accumulated threshold value, the system generates a reset establishment instruction. This instruction may be used to alert an administrator or user that further review or processing of their account is required. Verifying the user's depth password by resetting the set-up instruction: the system will require the user to verify his depth password by resetting the set-up instruction. This includes the step of the user entering a password and being authenticated by the system. Performing account code reconstruction on the user: if the user's deep password passes verification, the system will reconstruct the user's account password. This includes changing the user's password, enhancing the complexity of the password, or other security settings. Through the series of steps, the system can more effectively protect the account security of the user, and timely take measures when the potential risk is found, so that the reliability of the system and the satisfaction degree of the user are improved.
Further, the method of the present application further comprises:
when a reset establishment instruction is generated, synchronously generating an early warning output instruction;
and carrying out abnormal report management on the user according to the early warning report instruction.
Specifically, a reset establishment instruction is generated: create a new, or reset an existing instruction or task. Synchronously generating an early warning and reporting instruction: and simultaneously generating a reset establishment instruction and an early warning instruction by the system. The early warning instruction may be a notification or alarm for informing the user or system administrator of an important operation or change to be performed. When the system generates a reset establishment instruction, the account of the user is indicated to have a possible safety risk, and the system synchronously generates an early warning output instruction. The early warning instruction instructs the system to closely monitor the behavior and the transaction of the user and report the behavior which may have abnormality. Example two
Based on the same inventive concept as the intelligent contract transaction security management and control method based on identity authentication in the foregoing embodiments, as shown in fig. 4, the present application provides an intelligent contract transaction security management and control system based on identity authentication, where the system includes:
The analysis result generation module 10 is configured to receive application information of a user, and perform initial analysis on the application information to generate an initial analysis result, where the initial analysis result includes transaction task information, transaction party information and user account information, and a receiving body of the application information is edge node equipment;
the task pairing execution module 20 is used for generating a unique identifier ID according to the transaction task information and the transaction party information, sending the unique identifier ID to a cloud center and executing task pairing;
the temporary authentication connection establishment module 30, wherein the temporary authentication connection establishment module 30 is used for establishing temporary authentication connection of the cloud center, the current edge node equipment and the paired edge node equipment if task pairing is completed within a preset time period;
the verification data reading module 40 is configured to read input verification data of a user, divide the input verification data into an independent password and a combined password, perform the independent password verification based on a current edge node device, combine a calculated value with the combined password, and send the combined password to the cloud center;
The newly added combination verification module 50 is used for carrying out newly added combination password combination verification of the current edge node equipment and the paired edge node equipment through the cloud center by the newly added combination verification module 50;
a contract transaction completion module 60, the contract transaction completion module 60 is configured to complete a contract transaction based on the temporary authentication connection if the combination verification passes.
Further, the system further comprises:
the authentication management execution module is used for obtaining the registration information of the user, carrying out registration configuration based on the registration edge node equipment receiving the registration information, and dividing the password authentication into an independent password authentication unit and a combined password authentication unit; the combined password verification unit, the user ID and the registration edge node ID are sent to a cloud center, and an authentication index is generated in the cloud center; and after the task pairing is successfully executed, calling the authentication index through the user account information, establishing temporary communication between the current edge node equipment and the registered edge node equipment, sending an independent authentication password unit to the current edge node equipment, and executing authentication management.
Further, the system further comprises:
the independent verification unit deleting module is used for generating an updating instruction if the independent password verification result is a passing result after the independent verification password unit is sent to the current edge node equipment; and updating the index of the authentication index according to the updating instruction, and deleting the independent password verification unit of the registered edge node equipment.
Further, the system further comprises:
the verification compensation module is used for obtaining task grades based on the application information; judging whether the task level triggers a preset level threshold; if the task level triggers the preset level threshold, generating a log calling instruction; according to the log calling instruction, log calling is carried out, and the verification level is updated through a calling result; and performing verification compensation of combined verification according to the updated verification level.
Further, the system further comprises:
the verification level updating module is used for carrying out trust evaluation of log authentication based on a calling result and establishing a trust evaluation set; configuring an overlay compensation network of the trust degree, and inputting the trust degree evaluation set into the overlay compensation network according to a time sequence; performing overlay trust processing on the trust evaluation set through the overlay compensation network to generate a compensation verification grade; and updating the verification level through the compensation verification level.
Further, the system further comprises:
the account code reconstruction module is used for carrying out account trust degree accumulated evaluation of the user according to the calling result; if the trust level accumulated evaluation result cannot meet the preset accumulated threshold value, generating a reset establishment instruction; and after the depth password of the user is verified through the reset establishment instruction, account password reconstruction is carried out on the user.
Further, the system further comprises:
the abnormal report management module is used for synchronously generating an early warning report instruction when the reset establishment instruction is generated; and carrying out abnormal report management on the user according to the early warning report instruction.
Exemplary electronic device
The electronic device of the present application is described below with reference to fig. 5:
the electronic device 300 includes: a processor 302, a communication interface 303, a memory 301. Optionally, the electronic device 300 may also include a bus architecture 304. Wherein the communication interface 303, the processor 302 and the memory 301 may be interconnected by a bus architecture 304; the bus architecture 304 may be a peripheral component interconnect (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry Standard architecture, EISA) bus, among others. The bus architecture 304 may be divided into address buses, data buses, control buses, and the like. For ease of illustration, only one thick line is shown in fig. 5, but not only one bus or one type of bus.
Processor 302 may be a CPU, microprocessor, ASIC, or one or more integrated circuits for controlling the execution of the programs of the present application.
The communication interface 303 uses any transceiver-like means for communicating with other devices or communication networks, such as ethernet, radio access network (radio access network, RAN), wireless local area network (Wireless local area networks, WLAN), wired access network, etc.
The memory 301 may be, but is not limited to, ROM or other type of static storage device that may store static information and instructions, RAM or other type of dynamic storage device that may store information and instructions, or may be an EEPROM (electrically erasable Programmable read-only memory), a compact disc-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory may be self-contained and coupled to the processor through bus architecture 304. The memory may also be integrated with the processor.
The memory 301 is used for storing computer-executable instructions for executing the embodiments of the present application, and is controlled by the processor 302 to execute the instructions. The processor 302 is configured to execute computer-executable instructions stored in the memory 301, thereby implementing an intelligent contract transaction security management method based on identity authentication provided in the foregoing embodiments of the present application. Through the foregoing detailed description of the intelligent contract transaction security management and control method based on identity authentication, those skilled in the art can clearly know the intelligent contract transaction security management and control system based on identity authentication in this embodiment, and for the system disclosed in the embodiment, since the system corresponds to the device disclosed in the embodiment, the description is simpler, and relevant places refer to the description of the method section.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. The intelligent contract transaction security management and control method based on identity authentication is characterized by comprising the following steps of:
receiving application information of a user, and carrying out initial analysis on the application information to generate an initial analysis result, wherein the initial analysis result comprises transaction task information, transaction party information and user account information, and a receiving main body of the application information is edge node equipment;
generating a unique identification ID according to the transaction task information and the transaction party information, transmitting the unique identification ID to a cloud center, and executing task pairing;
if task pairing is completed within a preset time period, authentication is passed, and temporary authentication connection among the cloud center, the current edge node equipment and the paired edge node equipment is established;
Reading input verification data of a user, dividing the input verification data into an independent password and a combined password, verifying the independent password based on current edge node equipment, combining a calculated value with the combined password, and sending the combined password to the cloud center;
performing newly added combined password combination verification of the current edge node equipment and the paired edge node equipment through the cloud center;
and if the combined verification is passed, completing the contract transaction based on the temporary authentication connection.
2. The method of claim 1, wherein the method further comprises:
obtaining registration information of a user, performing registration configuration based on registration edge node equipment receiving the registration information, and dividing password verification into an independent password verification unit and a combined password verification unit;
the combined password verification unit, the user ID and the registration edge node ID are sent to a cloud center, and an authentication index is generated in the cloud center;
and after the task pairing is successfully executed, calling the authentication index through the user account information, establishing temporary communication between the current edge node equipment and the registered edge node equipment, sending an independent authentication password unit to the current edge node equipment, and executing authentication management.
3. The method of claim 2, wherein the method further comprises:
after the independent verification password unit is sent to the current edge node equipment, if the independent password verification result is a passing result, generating an updating instruction;
and updating the index of the authentication index according to the updating instruction, and deleting the independent password verification unit of the registered edge node equipment.
4. The method of claim 1, wherein the method further comprises:
obtaining a task grade based on the application information;
judging whether the task level triggers a preset level threshold;
if the task level triggers the preset level threshold, generating a log calling instruction;
according to the log calling instruction, log calling is carried out, and the verification level is updated through a calling result;
and performing verification compensation of combined verification according to the updated verification level.
5. The method of claim 4, wherein the method further comprises:
performing trust evaluation of log authentication based on the calling result, and establishing a trust evaluation set;
configuring an overlay compensation network of the trust degree, and inputting the trust degree evaluation set into the overlay compensation network according to a time sequence;
Performing overlay trust processing on the trust evaluation set through the overlay compensation network to generate a compensation verification grade;
and updating the verification level through the compensation verification level.
6. The method of claim 5, wherein the method further comprises:
performing account trust degree accumulated evaluation of the user according to the calling result;
if the trust level accumulated evaluation result cannot meet the preset accumulated threshold value, generating a reset establishment instruction;
and after the depth password of the user is verified through the reset establishment instruction, account password reconstruction is carried out on the user.
7. The method of claim 6, wherein the method further comprises:
when a reset establishment instruction is generated, synchronously generating an early warning output instruction;
and carrying out abnormal report management on the user according to the early warning report instruction.
8. An intelligent contract transaction security management and control system based on identity authentication, which is characterized by comprising:
the analysis result generation module is used for receiving application information of a user, carrying out initial analysis on the application information and generating an initial analysis result, wherein the initial analysis result comprises transaction task information, transaction party information and user account information, and a receiving main body of the application information is edge node equipment;
The task pairing execution module is used for generating a unique identifier ID according to the transaction task information and the transaction party information, sending the unique identifier ID to a cloud center and executing task pairing;
the temporary authentication connection establishment module is used for establishing temporary authentication connection of the cloud center, the current edge node equipment and the paired edge node equipment if task pairing is completed within a preset time period;
the verification data reading module is used for reading input verification data of a user, dividing the input verification data into an independent password and a combined password, carrying out independent password verification based on current edge node equipment, combining a calculated value with the combined password and sending the combined password to the cloud center;
the newly added combination verification module is used for carrying out newly added combination password combination verification of the current edge node equipment and the paired edge node equipment through the cloud center;
and the contract transaction completion module is used for completing the contract transaction based on the temporary authentication connection if the combination verification is passed.
9. An electronic device, the electronic device comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores computer instructions for causing a processor to perform the method of any one of claims 1-7.
CN202311675338.2A 2023-12-07 2023-12-07 Intelligent contract transaction security management and control method and system based on identity authentication Pending CN117557269A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311675338.2A CN117557269A (en) 2023-12-07 2023-12-07 Intelligent contract transaction security management and control method and system based on identity authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311675338.2A CN117557269A (en) 2023-12-07 2023-12-07 Intelligent contract transaction security management and control method and system based on identity authentication

Publications (1)

Publication Number Publication Date
CN117557269A true CN117557269A (en) 2024-02-13

Family

ID=89812606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311675338.2A Pending CN117557269A (en) 2023-12-07 2023-12-07 Intelligent contract transaction security management and control method and system based on identity authentication

Country Status (1)

Country Link
CN (1) CN117557269A (en)

Similar Documents

Publication Publication Date Title
US11509486B2 (en) Identity attestation system and method
Yavari et al. An Improved Blockchain‐Based Authentication Protocol for IoT Network Management
CN110083604B (en) Data right confirming method and device
CN112637214A (en) Resource access method and device and electronic equipment
CN110569658A (en) User information processing method and device based on block chain network, electronic equipment and storage medium
CN110908786A (en) Intelligent contract calling method, device and medium
CN112712372B (en) Alliance chain cross-chain system and information calling method
CN103685244A (en) Differentiated authentication method and differentiated authentication device
CN112862487A (en) Digital certificate authentication method, equipment and storage medium
CN112235301A (en) Method and device for verifying access authority and electronic equipment
CN112468497B (en) Block chain terminal equipment authorization authentication method, device, equipment and storage medium
KR20200115730A (en) System and method for generating software whistlist using machine run
CN113988787B (en) Network configuration method and device and storage medium
CN116975901A (en) Identity verification method, device, equipment, medium and product based on block chain
CN117557269A (en) Intelligent contract transaction security management and control method and system based on identity authentication
CN114978677A (en) Asset access control method, device, electronic equipment and computer readable medium
CN111769956B (en) Service processing method, device, equipment and medium
CN115150178A (en) Cross-platform unified login authentication method and device based on block chain
CN113890751A (en) Method, apparatus and readable storage medium for controlling voting of alliance link authority
CN113379577A (en) Transaction auditing method, device and equipment
CN117040929B (en) Access processing method, device, equipment, medium and program product
CN114826667B (en) Block chain-based data sharing method, device, equipment and medium
CN113704723B (en) Block chain-based digital identity verification method and device and storage medium
CN112491893B (en) Block chain terminal equipment network access method, device, server and storage medium
CN113326321B (en) User data management method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination