CN109639779A - A kind of dynamic integrity system based on block chain manufacturing service - Google Patents

A kind of dynamic integrity system based on block chain manufacturing service Download PDF

Info

Publication number
CN109639779A
CN109639779A CN201811444258.5A CN201811444258A CN109639779A CN 109639779 A CN109639779 A CN 109639779A CN 201811444258 A CN201811444258 A CN 201811444258A CN 109639779 A CN109639779 A CN 109639779A
Authority
CN
China
Prior art keywords
data
transaction
user
mobile terminal
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811444258.5A
Other languages
Chinese (zh)
Other versions
CN109639779B (en
Inventor
杨灵运
张昌福
文杰
候伟
袁江远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUIZHOU CASICLOUD TECHNOLOGY Co.,Ltd.
Original Assignee
Guizhou Aerospace Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Aerospace Cloud Network Technology Co Ltd filed Critical Guizhou Aerospace Cloud Network Technology Co Ltd
Priority to CN201811444258.5A priority Critical patent/CN109639779B/en
Publication of CN109639779A publication Critical patent/CN109639779A/en
Application granted granted Critical
Publication of CN109639779B publication Critical patent/CN109639779B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks

Abstract

The invention discloses a kind of dynamic integrity systems based on block chain manufacturing service, including data acquisition module, security monitoring module, data transmission module and data processing module, structure of the invention is scientific and reasonable, it is safe and convenient to use, when user logs in progress block chain transactional services by mobile terminal or page end, it can be to the logon account information of user, it logs in end IP address and login time is acquired, and viral diagnosis is carried out when to customer transaction, transaction risk is assessed and is detected with exotic invasive, and by viral diagnosis result and transaction risk assessment result early warning to user, and the IP address of network intrusions is traced, the IP address traced back to is transmitted to cloud to store, when data acquisition aggregation system host receives exotic invasive, aggregation system host can be acquired to data by firewall to protect, simultaneously IP address retrospect can be carried out to the source of invasion, and the IP address traced back to and warning information are transferred to administrator together.

Description

A kind of dynamic integrity system based on block chain manufacturing service
Technical field
The present invention relates to field of computer technology, specially a kind of dynamic integrity system based on block chain manufacturing service.
Background technique
Block chain is the novel of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm Application model, for narrow sense, block chain is a kind of to be sequentially in time combined into data block in such a way that sequence is connected A kind of linked data structure, and the distributed account book that can not be distorted He can not forge guaranteed in a manner of cryptography, broad sense are come It says, block chain technology is to verify to know together algorithm next life with storing data, using distributed node using block linked data structure At guarantee with more new data, in the way of cryptography data transmission and access safety, using by automatized script code-group At intelligent contract program the completely new distributed basis framework and calculation of one kind with operation data, since block chain takes The disintermediation of business, opening, autonomy, information can not distort and the features such as anonymities, and block chain has progressed into people The visual field in, in not far future, block chain can apply gradually people life in, offer convenience for people.
Summary of the invention
The present invention provides a kind of technical solution, can effectively solve the problems mentioned above in the background art.
To achieve the above object, the invention provides the following technical scheme: a kind of dynamic set based on block chain manufacturing service At system, including data acquisition module, security monitoring module, data transmission module and data processing module, the data acquisition Module is connect with security monitoring module, and the security monitoring module is connect with data transmission module, and the data transmission module connects It connects and is connect with data processing module, the data acquisition module includes mobile terminal acquisition module, page end acquisition module and cloud Data summarization module, the security monitoring module include mobile terminal security monitoring module, page end security monitoring module and cloud Security monitoring module, the data transmission module include mobile terminal data transmission module, page end data transmission module and cloud Data transmission module, the data processing module include mobile terminal data processing module, page end data processing module and cloud Data processing module.
According to the above technical scheme, the mobile terminal acquisition module includes the acquisition of mobile terminal log-on message and mobile terminal transaction Data acquisition, the mobile terminal log-on message acquisition refers to user when logging in using mobile terminal, to the login account of user Family information, login end IP address and login time are acquired, and the mobile terminal transaction data acquisition refers to user using shifting When moved end is logged in, to user, this trading account, transaction item and transaction amount information is acquired.
According to the above technical scheme, the page end acquisition module includes the acquisition of page end log-on message and page end transaction Data acquisition, the page end log-on message acquisition refers to user when carrying out webpage login using internet, to the account of login Family information, the web page IP address of login and login time are acquired, and the page end transaction data acquisition refers to that user makes When being traded with internet, to user, this trading account, transaction item and transaction amount information is acquired.
According to the above technical scheme, the mobile terminal security monitoring module includes transaction risk real time monitoring and transaction risk Pop-up prompt, the transaction risk real time monitoring refer to user when trading, and carry out disease to the mobile terminal that user uses Poison detection and transaction risk assessment, when transaction risk pop-up prompt refers to that user trades, by viral diagnosis result and Transaction risk assessment result is shown to user by pop-up, and the page end security monitoring module includes network intrusions risk monitoring and control Early warning and the retrospect of network intrusions address, it is right when the network intrusions risk monitoring and control early warning refers to that user is traded using webpage The webpage that user uses carries out real-time viral diagnosis and exotic invasive detection, and is prompted before transaction, and the network enters It invades address retrospect to refer to and trace the IP address of network intrusions, and the IP address traced back to is transmitted to cloud and is deposited Storage.
According to the above technical scheme, the cloud security monitoring module includes firewall intrusion risk monitoring and early warning and fire prevention Wall invades address retrospect, and the firewall intrusion risk monitoring and early warning, which refers to, carries out in real time data acquisition aggregation system host Viral diagnosis and firewall monitoring instruction, and when system host is under attack, invasion result is transmitted to pipe by Ethernet Reason person carries out early warning, and firewall invasion address retrospect refers to when data acquisition aggregation system host is by exotic invasive, The IP address of exotic invasive is traced, and the IP address traced back to is transmitted to administrator.
According to the above technical scheme, the mobile terminal data transmission module includes Ethernet transmission of transaction data and system number According to networking real-time update, when the GPRS transmission of transaction data refers to that user is traded using mobile terminal, GPRS number can be passed through It is interacted according to by transaction data and cloud data, when the system data networking real-time update refers to that user enters mobile terminal, Networking update can be carried out to system data, viral diagnosis library automatically.
According to the above technical scheme, the page end data transmission module includes Ethernet transmission of transaction data and data connection Net real-time Transmission when the Ethernet data transmission refers to that user is traded using webpage login, can will be handed over by Ethernet Easy data are interacted with cloud data, when the data network real-time Transmission refers to that user is traded using webpage login, Transaction data and cloud data can be interacted by Ethernet, and real-time perfoming updates.
According to the above technical scheme, the mobile terminal data processing module includes mobile client information storage center and mobile terminal Data processing unit, the mobile client information storage center refer to the account information for logging in user in mobile terminal, historical log Temporal information is stored, and the mobile terminal data processing unit, which refers to, receives the transaction letter of application that user issues in mobile terminal Breath, interacts, and handled by data processing unit with cloud data.
According to the above technical scheme, the page end data processing module includes cloud data storage center, page end list Secondary Transaction Information caching and cloud data processing unit, the cloud data storage center refer to that receive user logs in page end With the information of transaction, end storage of racking of going forward side by side, the page end single transaction information cache refers to that user is stepped on using webpage When record transaction, user's single Account Logon information and transaction data can be cached, be transmitted to cloud data storage center, and The user's single Account Logon information and transaction data of caching are purged after webpage exits, the cloud data processing list Member refers to the Transaction Information for receiving webpage logon account, carries out data interaction with cloud data center, and carry out to transaction data Processing.
According to the above technical scheme, the cloud data processing module includes that Data Analysis Services and cloud number are summarized in cloud According to processing host, the cloud summarizes Data Analysis Services and refers to the user account for receiving mobile terminal transmission, login and transaction letter Breath and user account, login and the Transaction Information of page end transmission are analyzed, and are classified and stored, at the cloud data Reason host, which refers to, is analyzed and processed the Transaction Information of backstage input and received data.
Compared with prior art, beneficial effects of the present invention: structure of the invention is scientific and reasonable, safe and convenient to use:
The dynamic integrity system based on block chain manufacturing service carries out the transaction of block chain in use, user is logged in by mobile terminal When service, can logon account information to user, log in end IP address and login time is acquired, deposited by mobile client information Storage center carries out classification storage, and is carried out data transmission by GPRS, is transmitted to cloud and carries out data storage, in mobile end subscriber When being traded, then viral diagnosis can be carried out to mobile terminal that user uses and transaction risk is assessed, and by viral diagnosis result User is shown to by pop-up with transaction risk assessment result, it, can be by user if user carries out logging in transaction using webpage The web page IP address and login time of account information, login when carrying out webpage login using internet are acquired, and are transmitted to Cloud data storage center is stored, and is cached to single transaction information data, by the use of caching after webpage exits Family single Account Logon information and transaction data are purged, and when user trades, can be carried out to the webpage that user uses real When viral diagnosis and exotic invasive detection, and prompted before transaction, the retrospect of network intrusions address refers to network intrusions IP address traced, and the IP address traced back to is transmitted to cloud and is stored, the data of cloud storage can pass through cloud End is summarized Data Analysis Services and is analyzed, and classification storage is in data acquisition aggregation system host, when data acquisition summarizes When system host receives exotic invasive, aggregation system host can be acquired to data by firewall and protected, while can be to invasion Source carry out IP address retrospect, and the IP address traced back to and warning information are transferred to administrator together.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example to be used to explain the present invention together, not be construed as limiting the invention.
In the accompanying drawings:
Fig. 1 is system structure diagram of the invention;
Fig. 2 is data acquisition module structural block diagram of the invention;
Fig. 3 is safe acquisition module structural block diagram of the invention;
Fig. 4 is data transmission module structural block diagram of the invention;
Fig. 5 is data processing module structural block diagram of the invention.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Embodiment: as shown in Figs. 1-5, the present invention provides a kind of technical solution, a kind of dynamic based on block chain manufacturing service State integrated system, including data acquisition module, security monitoring module, data transmission module and data processing module, data acquisition Module is connect with security monitoring module, and security monitoring module is connect with data transmission module, data transmission module connection and data Processing module connection, data acquisition module includes mobile terminal acquisition module, page end acquisition module and cloud data summarization module, Security monitoring module includes mobile terminal security monitoring module, page end security monitoring module and cloud security monitoring module, data Transmission module includes mobile terminal data transmission module, page end data transmission module and cloud data transmission module, data processing Module includes mobile terminal data processing module, page end data processing module and cloud data processing module.
According to the above technical scheme, mobile terminal acquisition module includes the acquisition of mobile terminal log-on message and mobile terminal transaction data Acquisition, the acquisition of mobile terminal log-on message refer to that user when being logged in using mobile terminal, to the logon account information of user, is stepped on Record end IP address and login time are acquired, and transaction data acquisition in mobile terminal refers to that user is logged in using mobile terminal When, to user, this trading account, transaction item and transaction amount information is acquired.
According to the above technical scheme, page end acquisition module includes the acquisition of page end log-on message and page end transaction data Acquisition, the acquisition of page end log-on message refer to that user when carrying out webpage login using internet, to the account information of login, steps on The web page IP address and login time of record are acquired, and the acquisition of page end transaction data refers to that user is handed over using internet Yi Shi, to user, this trading account, transaction item and transaction amount information is acquired.
According to the above technical scheme, security monitoring module in mobile terminal includes transaction risk real time monitoring and transaction risk pop-up Prompt, transaction risk real time monitoring refer to user when trading, the mobile terminal that user is used carry out viral diagnosis and Transaction risk assessment assesses viral diagnosis result and transaction risk when transaction risk pop-up prompt refers to that user trades As a result user is shown to by pop-up, page end security monitoring module includes the early warning of network intrusions risk monitoring and control and network intrusions Location retrospect when network intrusions risk monitoring and control early warning refers to that user is traded using webpage, carries out the webpage that user uses real When viral diagnosis and exotic invasive detection, and prompted before transaction, the retrospect of network intrusions address refers to network intrusions IP address traced, and the IP address traced back to is transmitted to cloud and is stored.
According to the above technical scheme, security monitoring module in cloud includes that firewall intrusion risk monitoring and early warning and firewall enter Address retrospect is invaded, firewall intrusion risk monitoring and early warning, which refers to, carries out real-time viral diagnosis to data acquisition aggregation system host Invasion result by Ethernet is transmitted to administrator's progress and when system host is under attack with firewall monitoring instruction Early warning, firewall invasion address retrospect refer to when data acquisition aggregation system host is by exotic invasive, to exotic invasive IP address is traced, and the IP address traced back to is transmitted to administrator.
According to the above technical scheme, mobile terminal data transmission module includes Ethernet transmission of transaction data and system data connection Net real-time update when GPRS transmission of transaction data refers to that user is traded using mobile terminal, can will be traded by GPRS data Data are interacted with cloud data, can be automatically to system when system data networking real-time update refers to that user enters mobile terminal Data, viral diagnosis library carry out networking update.
According to the above technical scheme, page end data transmission module includes that Ethernet transmission of transaction data and data network are real When transmit, Ethernet data transmission refer to user using webpage login trade when, can by Ethernet by transaction data with Cloud data interact, and when data network real-time Transmission refers to that user is traded using webpage login, can pass through Ethernet Transaction data and cloud data are interacted, and real-time perfoming updates.
According to the above technical scheme, mobile terminal data processing module includes mobile client information storage center and mobile end data Processing unit, mobile client information storage center refer to the account information for logging in user in mobile terminal, historical log temporal information It is stored, mobile terminal data processing unit, which refers to, receives the transaction application information that user issues in mobile terminal, with cloud data It interacts, and is handled by data processing unit.
According to the above technical scheme, page end data processing module includes cloud data storage center, the friendship of page end single Easy information cache and cloud data processing unit, cloud data storage center, which refers to, receives user page end logs in and trades Information, end storage of racking of going forward side by side can be right when page end single transaction information cache refers to that user carries out login transaction using webpage User's single Account Logon information and transaction data cache, and are transmitted to cloud data storage center, and after webpage exits The user's single Account Logon information and transaction data of caching are purged, cloud data processing unit refers to that receiving webpage steps on The Transaction Information for recording account carries out data interaction with cloud data center, and handles transaction data.
According to the above technical scheme, cloud data processing module includes that cloud is summarized at Data Analysis Services and cloud data Host is managed, cloud summarizes Data Analysis Services and refers to user account, login and the Transaction Information and webpage for receiving mobile terminal transmission User account, login and the Transaction Information of end transmission are analyzed, and are classified and stored, and cloud data processing host refers to pair The Transaction Information of backstage input and received data are analyzed and processed.
The working principle of the invention and process for using: should dynamic integrity system based on block chain manufacturing service in use, User is logged in by mobile terminal when carrying out block chain transactional services, can logon account information to user, log in end IP address and Login time is acquired, and is carried out classification storage by mobile client information storage center, and carry out data transmission by GPRS, is passed It transports to cloud and carries out data storage, when mobile end subscriber is traded, then can carry out viral inspection to the mobile terminal that user uses It surveys and transaction risk is assessed, and viral diagnosis result and transaction risk assessment result are shown to user by pop-up, if with When family carries out logging in transaction using webpage, the net of account information, login when internet can be used to carry out webpage login user Page IP address and login time are acquired, and are transmitted to cloud data storage center and are stored, and to single transaction Information Number According to being cached, the user's single Account Logon information and transaction data of caching are purged after webpage exits, Yong Hujin When row transaction, real-time viral diagnosis can be carried out to the webpage that user uses and exotic invasive detects, and be mentioned before transaction Show, the IP address of network intrusions is traced, and the IP address traced back to is transmitted to cloud and is stored, cloud storage Data can summarize Data Analysis Services by cloud and be analyzed, and classification storage works as number in data acquisition aggregation system host When receiving exotic invasive according to acquisition aggregation system host, aggregation system host can be acquired to data by firewall and protected, IP address retrospect can be carried out to the source of invasion simultaneously, and the IP address traced back to and warning information are transferred to management together Member.
Finally, it should be noted that being not intended to restrict the invention the foregoing is merely preferred embodiment of the invention, to the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, for those skilled in the art, still can be with It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features.It is all Within the spirit and principles in the present invention, any modification, equivalent replacement, improvement and so on should be included in guarantor of the invention Within the scope of shield.

Claims (10)

1. a kind of dynamic integrity system based on block chain manufacturing service, it is characterised in that: including data acquisition module, safety prison Control module, data transmission module and data processing module, the data acquisition module are connect with security monitoring module, the safety Monitoring module is connect with data transmission module, and the data transmission module connection is connect with data processing module, and the data are adopted Collecting module includes mobile terminal acquisition module, page end acquisition module and cloud data summarization module, the security monitoring module packet Include mobile terminal security monitoring module, page end security monitoring module and cloud security monitoring module, the data transmission module packet Include mobile terminal data transmission module, page end data transmission module and cloud data transmission module, the data processing module packet Include mobile terminal data processing module, page end data processing module and cloud data processing module.
2. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Mobile terminal acquisition module includes the acquisition of mobile terminal log-on message and the acquisition of mobile terminal transaction data, and the mobile terminal log-on message is adopted Collection refers to user when logging in using mobile terminal, to the logon account information, login end IP address and login time of user It is acquired, mobile terminal transaction data acquisition refers to user when logging in using mobile terminal, to this friendship of user Easy account, transaction item and transaction amount information are acquired.
3. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Page end acquisition module includes the acquisition of page end log-on message and the acquisition of page end transaction data, and the page end log-on message is adopted Collection refers to user when carrying out webpage login using internet, to the account information of login, the web page IP address of login and login Time is acquired, page end transaction data acquisition refer to user when being traded using internet, to user this Trading account, transaction item and transaction amount information be acquired.
4. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Mobile terminal security monitoring module includes transaction risk real time monitoring and transaction risk pop-up prompt, the transaction risk real time monitoring Refer to user when trading, viral diagnosis is carried out to the mobile terminal that user uses and transaction risk is assessed, the transaction When risk pop-up prompt refers to that user trades, viral diagnosis result and transaction risk assessment result are shown to by pop-up User, the page end security monitoring module include the early warning of network intrusions risk monitoring and control and the retrospect of network intrusions address, the net When network intrusion risk monitoring and early warning refers to that user is traded using webpage, virus inspection in real time is carried out to the webpage that user uses It surveys and exotic invasive detects, and prompted before transaction, the network intrusions address retrospect is with referring to the IP to network intrusions Location is traced, and the IP address traced back to is transmitted to cloud and is stored.
5. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Cloud security monitoring module includes firewall intrusion risk monitoring and early warning and firewall invasion address retrospect, the firewall invasion Risk monitoring and control early warning, which refers to, carries out real-time viral diagnosis and firewall monitoring instruction to data acquisition aggregation system host, and When system host is under attack, invasion result is transmitted to administrator by Ethernet and carries out early warning, firewall invasion ground Location retrospect refers to when data acquisition aggregation system host is by exotic invasive, traces to the IP address of exotic invasive, and The IP address traced back to is transmitted to administrator.
6. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Mobile terminal data transmission module includes Ethernet transmission of transaction data and system data networking real-time update, the GPRS number of deals When referring to that user is traded using mobile terminal according to transmission, transaction data and cloud data can be handed over by GPRS data Mutually, when system data networking real-time update refers to that user enters mobile terminal, can automatically to system data, viral diagnosis library into Row networking updates.
7. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Page end data transmission module includes Ethernet transmission of transaction data and data network real-time Transmission, the Ethernet data transmission When referring to that user is traded using webpage login, transaction data and cloud data can be interacted by Ethernet, it is described It, can be by Ethernet by transaction data and cloud number when data network real-time Transmission refers to that user is traded using webpage login According to interacting, and real-time perfoming updates.
8. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Mobile terminal data processing module includes that mobile client information storage center and mobile terminal data processing unit, the mobile client information are deposited Storage center, which refers to, stores account information that user logs in mobile terminal, historical log temporal information, the mobile terminal number Refer to the transaction application information for receiving user and issuing in mobile terminal according to processing unit, is interacted with cloud data, and pass through number It is handled according to processing unit.
9. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that described Page end data processing module includes cloud data storage center, page end single transaction information cache and cloud data processing list Member, the cloud data storage center, which refers to, receives the information that user logs in and trades in page end, end storage of racking of going forward side by side, institute State page end single transaction information cache refer to user using webpage carry out log in transaction when, user's single Account Logon can be believed Breath and transaction data are cached, and are transmitted to cloud data storage center, and by user's single account of caching after webpage exits Family log-on message and transaction data are purged, and the cloud data processing unit refers to the transaction letter for receiving webpage logon account Breath carries out data interaction with cloud data center, and handles transaction data.
10. a kind of dynamic integrity system based on block chain manufacturing service according to claim 1, which is characterized in that institute Stating cloud data processing module includes that Data Analysis Services and cloud data processing host are summarized in cloud, and data are summarized in the cloud Analysis processing refers to the user account of the user account, login and the Transaction Information that receive mobile terminal transmission and page end transmission, steps on Record and Transaction Information are analyzed, and are classified and stored, and the cloud data processing host refers to the transaction to backstage input Information and received data are analyzed and processed.
CN201811444258.5A 2018-11-29 2018-11-29 Dynamic integration system based on block chain manufacturing service Active CN109639779B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811444258.5A CN109639779B (en) 2018-11-29 2018-11-29 Dynamic integration system based on block chain manufacturing service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811444258.5A CN109639779B (en) 2018-11-29 2018-11-29 Dynamic integration system based on block chain manufacturing service

Publications (2)

Publication Number Publication Date
CN109639779A true CN109639779A (en) 2019-04-16
CN109639779B CN109639779B (en) 2021-09-17

Family

ID=66070092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811444258.5A Active CN109639779B (en) 2018-11-29 2018-11-29 Dynamic integration system based on block chain manufacturing service

Country Status (1)

Country Link
CN (1) CN109639779B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276544A (en) * 2019-06-19 2019-09-24 华北电力大学(保定) Multiple information interaction comprehensive energy service system and method based on block chain
CN110428329A (en) * 2019-07-01 2019-11-08 扬州腾邮大数据网络科技有限公司 A kind of fragment treating method and apparatus of multi-tiling chain
CN111786788A (en) * 2020-08-10 2020-10-16 邹雯 Network security intrusion detection system based on block chain
CN112149170A (en) * 2020-10-12 2020-12-29 上海中尖实业(集团)有限公司 Digital big data security processing system
CN112348539A (en) * 2020-11-25 2021-02-09 贵州航天云网科技有限公司 Industrial product circulation life cycle tracing management system based on license chain and application thereof
CN112788107A (en) * 2020-12-29 2021-05-11 长威信息科技发展股份有限公司 Method and system for secure multi-party computing and data sharing
CN116502187A (en) * 2023-06-27 2023-07-28 深圳市诚识科技有限公司 Digital copyright protection system and method based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050283416A1 (en) * 2004-06-17 2005-12-22 Visa International Service Association Method and system for providing assurance and financing services
CN103826104A (en) * 2014-03-05 2014-05-28 重庆佰昊科技有限责任公司 Cloud monitoring and alarming system and monitoring method thereof
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN106302030A (en) * 2016-10-14 2017-01-04 苏州盛世十月软件技术有限公司 A kind of network terminal data acquisition unit
CN108242013A (en) * 2017-12-25 2018-07-03 招商银行股份有限公司 Transaction monitoring and managing method, equipment and computer readable storage medium based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050283416A1 (en) * 2004-06-17 2005-12-22 Visa International Service Association Method and system for providing assurance and financing services
CN103826104A (en) * 2014-03-05 2014-05-28 重庆佰昊科技有限责任公司 Cloud monitoring and alarming system and monitoring method thereof
CN105279405A (en) * 2015-10-28 2016-01-27 同济大学 Keypress behavior pattern construction and analysis system of touch screen user and identity recognition method thereof
CN106302030A (en) * 2016-10-14 2017-01-04 苏州盛世十月软件技术有限公司 A kind of network terminal data acquisition unit
CN108242013A (en) * 2017-12-25 2018-07-03 招商银行股份有限公司 Transaction monitoring and managing method, equipment and computer readable storage medium based on block chain

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276544A (en) * 2019-06-19 2019-09-24 华北电力大学(保定) Multiple information interaction comprehensive energy service system and method based on block chain
CN110428329A (en) * 2019-07-01 2019-11-08 扬州腾邮大数据网络科技有限公司 A kind of fragment treating method and apparatus of multi-tiling chain
CN111786788A (en) * 2020-08-10 2020-10-16 邹雯 Network security intrusion detection system based on block chain
CN112149170A (en) * 2020-10-12 2020-12-29 上海中尖实业(集团)有限公司 Digital big data security processing system
CN112348539A (en) * 2020-11-25 2021-02-09 贵州航天云网科技有限公司 Industrial product circulation life cycle tracing management system based on license chain and application thereof
CN112788107A (en) * 2020-12-29 2021-05-11 长威信息科技发展股份有限公司 Method and system for secure multi-party computing and data sharing
CN116502187A (en) * 2023-06-27 2023-07-28 深圳市诚识科技有限公司 Digital copyright protection system and method based on block chain
CN116502187B (en) * 2023-06-27 2024-02-02 深圳市诚识科技有限公司 Digital copyright protection system and method based on block chain

Also Published As

Publication number Publication date
CN109639779B (en) 2021-09-17

Similar Documents

Publication Publication Date Title
CN109639779A (en) A kind of dynamic integrity system based on block chain manufacturing service
US11606370B1 (en) Systems and methods of detecting and mitigating malicious network activity
US11750631B2 (en) System and method for comprehensive data loss prevention and compliance management
CN108494746A (en) A kind of network port Traffic anomaly detection method and system
JP6139656B2 (en) Use of DNS requests and host agents for path exploration and anomaly / change detection and network status recognition for anomaly subgraph detection
CN106294075B (en) A kind of method, apparatus and system that SQL is monitored
US11423478B2 (en) Method and apparatus for detecting rogue trading activity
US20150101050A1 (en) Detecting and measuring malware threats
US20160072840A1 (en) Real-Time Security Monitoring Using Cross-Channel Event Processor
US11750630B2 (en) Real-time validation of application data
CN107123045A (en) The data synchronous system and its method of data synchronization merchandised based on bond
CN106656971A (en) Service behavior data acquisition system
US20200106791A1 (en) Intelligent system for mitigating cybersecurity risk by analyzing domain name system traffic metrics
US20200286078A1 (en) Technique for restricting access to information
CN114826880A (en) Method and system for online monitoring of data safe operation
CN114208115A (en) Automatic learning and detection of WEB robot transactions using deep learning
CN109600395A (en) A kind of device and implementation method of terminal network access control system
CN105812324B (en) The method, apparatus and system of IDC information security management
CN113902052A (en) Distributed denial of service attack network anomaly detection method based on AE-SVM model
US20150066763A1 (en) Method and apparatus for cross channel monitoring
CN112272176A (en) Network security protection method and system based on big data platform
Sharma et al. Scalable microservice forensics and stability assessment using variational autoencoders
Xu et al. A intelligent risk detection method in online transactions
Arora et al. Minimized False Alarm Predictive Threshold for Cloud Service Providers
US20210400064A1 (en) User flow graph analytics for cyber security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200226

Address after: 550000 Guiyang Guiyang National High-tech Industrial Development Zone, Guiyang City, Guizhou Province, 357 Qianlingshan Road, Defu Center A5 Building 2 Unit 17, Layer 1-6

Applicant after: Guizhou Aerospace Cloud Network Technology Co., Ltd.

Applicant after: Yu Wentao

Address before: 550000 Guiyang Guiyang National High-tech Industrial Development Zone, Guiyang City, Guizhou Province, 357 Qianlingshan Road, Defu Center A5 Building 2 Unit 17, Layer 1-6

Applicant before: Guizhou Aerospace Cloud Network Technology Co., Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201030

Address after: 550000 Guiyang Guiyang National High-tech Industrial Development Zone, Guiyang City, Guizhou Province, 357 Qianlingshan Road, Defu Center A5 Building 2 Unit 17, Layer 1-6

Applicant after: GUIZHOU CASICLOUD TECHNOLOGY Co.,Ltd.

Address before: 550000 Guiyang Guiyang National High-tech Industrial Development Zone, Guiyang City, Guizhou Province, 357 Qianlingshan Road, Defu Center A5 Building 2 Unit 17, Layer 1-6

Applicant before: GUIZHOU CASICLOUD TECHNOLOGY Co.,Ltd.

Applicant before: Yu Wentao

GR01 Patent grant
GR01 Patent grant