CN110807187B - Block chain-based network market illegal information evidence storing method and platform terminal - Google Patents

Block chain-based network market illegal information evidence storing method and platform terminal Download PDF

Info

Publication number
CN110807187B
CN110807187B CN201911076123.2A CN201911076123A CN110807187B CN 110807187 B CN110807187 B CN 110807187B CN 201911076123 A CN201911076123 A CN 201911076123A CN 110807187 B CN110807187 B CN 110807187B
Authority
CN
China
Prior art keywords
information
webpage
illegal
block chain
evidence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911076123.2A
Other languages
Chinese (zh)
Other versions
CN110807187A (en
Inventor
谭焕明
朱华安
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Fulian Technology Co ltd
Original Assignee
Fujian Fulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Fulian Technology Co ltd filed Critical Fujian Fulian Technology Co ltd
Priority to CN201911076123.2A priority Critical patent/CN110807187B/en
Publication of CN110807187A publication Critical patent/CN110807187A/en
Application granted granted Critical
Publication of CN110807187B publication Critical patent/CN110807187B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a network market illegal information evidence storing method and a platform terminal based on a block chain, which are used for acquiring webpage request information, randomly generating a dynamic verification code, writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address; calling an illegal information evidence acquisition program to access the block chain type account book database so as to acquire new webpage request information and dynamic verification codes, accessing webpage addresses according to the webpage request information, acquiring and obtaining webpage information, and writing the webpage information and the dynamic verification codes into the block chain type account book database; calling an illegal information identification model to identify and identify illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and the dynamic verification code into a block chain type account book database; the invention realizes automatic evidence collection and evidence storage of illegal information and ensures the legality of the evidence collection and evidence storage process.

Description

Block chain-based network market illegal information evidence storing method and platform terminal
Technical Field
The invention relates to the technical field of block chain application, in particular to a network market illegal information evidence storing method and a platform terminal based on a block chain.
Background
With the rapid development of the application of the internet, particularly the mobile internet, the traditional transaction is rapidly migrated to the internet, the transaction mode is continuously renewed, and the traditional transaction is impacted subversively. Massive electronic data is generated in the network transaction process, electronic data forensics plays an important role in acquiring illegal evidence and attacking network illegal behaviors, is an indispensable part in criminal lawsuits, and is vital to implementing effective network market supervision on how to fix the electronic data and prove the fact of cases. However, electronic data forensics still face a challenge that cannot be ignored, and these regulations are still lack of matching detailed rules of operability, so that evidence fixing programs and examination and judgment rules of electronic data in administrative cases are not specified in detail, the potential risks of illegal forensics in administrative law enforcement activities are more, the efficiency of the administrative law enforcement is reduced, and the risk of the administrative law enforcement is increased.
Most electron evidence means are only with electronic data with the mode storage of backup on platform or cloud server at present, but single or partial electron evidence is far away not enough to support the judgement of whole case, and electronic data suffers destruction very easily simultaneously, along with the number of times of use increases, transmission error appears very easily in the data circulation, loses to lead to the incomplete scheduling problem of evidence.
In 2018, 9, 7 th month, the highest people's court released and announced regulations on several issues with internet court trial cases, with article 11 mentioning: the electronic data submitted by the parties can be authenticated through evidence collection, fixing and tamper-proof technical means such as electronic signatures, trusted timestamps, hash value verification, block chains and the like or through electronic evidence obtaining and storing platform authentication, and the authenticity of the electronic data can be proved, so that the internet court should confirm the authenticity of the electronic data.
The appearance of the block chain technology provides a brand new technical thought and solution for solving the problem of electronic data storage. And the block chain certificate storage adopts a multi-party certificate storage means, so that the authenticity, integrity and credibility of the certificate storage information are ensured. The block chain cryptography and the distributed chain ledger structure ensure that the recording, transmission and storage results of the electronic data are credible. Once the electronic data is generated, the electronic data is permanently recorded, and cannot be falsified by any party or forged.
The block chain platform generally selects authority mechanisms such as joint judicial identification, audit, notarization and arbitration to carry out multi-party evidence storage service, the evidence storage and preservation of electronic data are intervened from the beginning of the life cycle of the electronic data, evidence obtaining tools and evidence obtaining processes are recorded on a chain through multi-party evidence finding, the electronic data is generated and fixed, accounting is carried out at the first time synchronously to a node server of the judicial identification, audit, notarization and arbitration mechanisms, the mechanisms can verify the originality and the authenticity of certain electronic data at any time in the future, the evidence storage data is regarded as direct evidence, and the judicial landing is facilitated.
However, in the prior art, the user is required to collect the illegal information and report the illegal information to the block chain, and the evidence obtaining procedure for the illegal information in the network market is also lack of protection, which has a disadvantage in terms of security.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the network market illegal information evidence-storing method and the platform based on the block chain are provided, so that the illegal information evidence is obtained and stored, and the legality of the evidence-storing and obtaining process is ensured.
In order to solve the technical problems, the invention adopts the technical scheme that:
a network market illegal information evidence storing method based on a block chain comprises the following steps:
s1, acquiring webpage request information, randomly generating a dynamic verification code, and writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address;
s2, calling an illegal information evidence collection program to access the block chain type account book database so as to obtain new webpage request information and dynamic verification codes, accessing the webpage address according to the webpage request information, collecting and obtaining webpage information, and writing the webpage information and the dynamic verification codes into the block chain type account book database;
s3, calling an illegal information identification model to identify and identify the illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and the dynamic verification code into a block chain type account book database.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a block chain-based network market violation information evidence storing platform terminal comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the following steps:
s1, acquiring webpage request information, randomly generating a dynamic verification code, and writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address;
s2, calling an illegal information evidence collection program to access the block chain type account book database so as to obtain new webpage request information and dynamic verification codes, accessing the webpage address according to the webpage request information, collecting and obtaining webpage information, and writing the webpage information and the dynamic verification codes into the block chain type account book database;
s3, calling an illegal information identification model to identify and identify the illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and the dynamic verification code into a block chain type account book database.
The invention has the beneficial effects that: a network market illegal information evidence-collecting method and platform terminal based on block chain, according to the webpage request information reported by the user, automatically visit the webpage address, collect and obtain the webpage information, then identify whether the webpage information is illegal information, in this process, carry on the cochain evidence-collecting of the webpage information, thus has realized the automatic evidence-collecting of the illegal information; meanwhile, chain link evidence saving is carried out in the user reporting process, the information collecting process and the information identifying process, and the relation among the request, the collecting result and the identifying result is confirmed through the dynamic verification code, so that evidence obtaining and saving of illegal information are commonly identified and approved by nodes of the whole network, and the legality of the evidence obtaining and saving process is guaranteed.
Drawings
Fig. 1 is a schematic flowchart of a network market illegal information evidence storing method based on a block chain according to an embodiment of the present invention;
fig. 2 is a schematic specific flowchart of a network market illegal information evidence storing method based on a block chain according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a block chain-based network market illegal information evidence storing platform terminal according to an embodiment of the present invention.
Description of reference numerals:
1. a network market illegal information evidence storing platform terminal based on a block chain; 2. a processor; 3. a memory.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 to 2, a block chain-based network market illegal information evidence storing method includes the steps of:
s1, acquiring webpage request information, randomly generating a dynamic verification code, and writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address;
s2, calling an illegal information evidence collection program to access the block chain type account book database so as to obtain new webpage request information and dynamic verification codes, accessing the webpage address according to the webpage request information, collecting and obtaining webpage information, and writing the webpage information and the dynamic verification codes into the block chain type account book database;
s3, calling an illegal information identification model to identify and identify the illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and the dynamic verification code into a block chain type account book database.
From the above description, the beneficial effects of the present invention are: according to webpage request information reported by a user, automatically accessing a webpage address, acquiring and obtaining webpage information, identifying whether the webpage information is illegal information, and performing chain link evidence saving on the webpage information in the process so as to realize automatic evidence obtaining and saving of the illegal information; meanwhile, chain link evidence saving is carried out in the user reporting process, the information collecting process and the information identifying process, and the relation among the request, the collecting result and the identifying result is confirmed through the dynamic verification code, so that evidence obtaining and saving of illegal information are commonly identified and approved by nodes of the whole network, and the legality of the evidence obtaining and saving process is guaranteed.
Further, the web page request information in step S1 further includes a web page login account and a web page login password;
the step S2 of "accessing the web page address" specifically includes:
and acquiring a webpage login account and a webpage login password, accessing the webpage address and logging in.
According to the description, the dynamic webpage login of the webpage is realized through the webpage login account and the webpage login password, and the obtained webpage information is more real and accurate due to the fact that the webpage has larger webpage use permission after login.
Further, the step S2 is specifically:
s21, calling an illegal information evidence acquisition program to access a block chain type account book database to acquire new webpage request information and a dynamic verification code, acquiring a webpage login account and a webpage login password according to the webpage request information, accessing and logging in the webpage address, capturing a current static webpage, and recording a frequency of the current dynamic webpage to acquire webpage information;
and S22, uploading the webpage information and the signature result containing the webpage information, the dynamic verification code and the server information of the illegal information evidence acquisition program to a block chain type account book database.
From the above description, automatic capture of a static webpage and automatic recording of a dynamic webpage can be realized, so as to obtain more comprehensive webpage data.
Further, the step S3 of "calling an illegal information identification model to identify and identify illegal information of the web page information" specifically includes:
carrying out deep learning on the confirmed illegal information, extracting identification characteristics of the illegal information, and constructing an illegal information identification library set;
and carrying out depth identification and comprehensive comparison on the webpage information by utilizing an illegal information identification library set, judging whether the webpage information exceeds a preset threshold value, if so, judging the webpage information to be illegal information, and if not, judging the webpage information to be illegal information.
From the above description, the identification of the illegal information can be rapidly and accurately performed through the deep learning algorithm.
Further, the step S2 further includes:
writing the source code, the execution file and the Hash of the evidence collection program of the illegal information into a block chain type account book database;
the step S2 is followed by:
calling a daemon program to collect current program information of the illegal information evidence collection program in real time, and comparing the current program information with standard program information stored in a block chain type account book database to obtain a comparison result, wherein the current program information is a current source code or a current execution file or a current Hash, and the standard program information is a standard source code or a standard execution file or a standard Hash.
From the above description, it can be known that the illegal information evidence collection program is compared to prevent the illegal information evidence collection program from being tampered, thereby realizing the credibility of the collection program.
Referring to fig. 3, a block chain-based network market violation information evidence storing platform includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the following steps when executing the computer program:
s1, acquiring webpage request information, randomly generating a dynamic verification code, and writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address;
s2, calling an illegal information evidence collection program to access the block chain type account book database so as to obtain new webpage request information and dynamic verification codes, accessing the webpage address according to the webpage request information, collecting and obtaining webpage information, and writing the webpage information and the dynamic verification codes into the block chain type account book database;
s3, calling an illegal information identification model to identify and identify the illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and the dynamic verification code into a block chain type account book database.
From the above description, the beneficial effects of the present invention are: according to webpage request information reported by a user, automatically accessing a webpage address, acquiring and obtaining webpage information, identifying whether the webpage information is illegal information, and performing chain link evidence saving on the webpage information in the process so as to realize automatic evidence obtaining and saving of the illegal information; meanwhile, chain link evidence saving is carried out in the user reporting process, the information collecting process and the information identifying process, and the relation among the request, the collecting result and the identifying result is confirmed through the dynamic verification code, so that evidence obtaining and saving of illegal information are commonly identified and approved by nodes of the whole network, and the legality of the evidence obtaining and saving process is guaranteed.
Further, the web page request information in step S1 further includes a web page login account and a web page login password;
when the processor executes the "access to the web page address" of step S2 in the computer program, the following steps are specifically implemented:
and acquiring a webpage login account and a webpage login password, accessing the webpage address and logging in.
According to the description, the dynamic webpage login of the webpage is realized through the webpage login account and the webpage login password, and the obtained webpage information is more real and accurate due to the fact that the webpage has larger webpage use permission after login.
Further, when the processor executes the step S2 in the computer program, the following steps are specifically implemented:
s21, calling an illegal information evidence acquisition program to access a block chain type account book database to acquire new webpage request information and a dynamic verification code, acquiring a webpage login account and a webpage login password according to the webpage request information, accessing and logging in the webpage address, capturing a current static webpage, and recording a frequency of the current dynamic webpage to acquire webpage information;
and S22, uploading the webpage information and the signature result containing the webpage information, the dynamic verification code and the server information of the illegal information evidence acquisition program to a block chain type account book database.
From the above description, automatic capture of a static webpage and automatic recording of a dynamic webpage can be realized, so as to obtain more comprehensive webpage data.
Further, when the processor executes the step S3 of "calling the illegal information identification model to identify and identify the illegal information of the web page information", the processor specifically implements the following steps:
carrying out deep learning on the confirmed illegal information, extracting identification characteristics of the illegal information, and constructing an illegal information identification library set;
and carrying out depth identification and comprehensive comparison on the webpage information by utilizing an illegal information identification library set, judging whether the webpage information exceeds a preset threshold value, if so, judging the webpage information to be illegal information, and if not, judging the webpage information to be illegal information.
From the above description, the identification of the illegal information can be rapidly and accurately performed through the deep learning algorithm.
Further, the processor, when executing the step S2 in the computer program, further implements the following steps:
writing the source code, the execution file and the Hash of the evidence collection program of the illegal information into a block chain type account book database;
after the processor executes the step S2 in the computer program, the following steps are also implemented:
calling a daemon program to collect current program information of the illegal information evidence collection program in real time, and comparing the current program information with standard program information stored in a block chain type account book database to obtain a comparison result, wherein the current program information is a current source code or a current execution file or a current Hash, and the standard program information is a standard source code or a standard execution file or a standard Hash.
From the above description, it can be known that the illegal information evidence collection program is compared to prevent the illegal information evidence collection program from being tampered, thereby realizing the credibility of the collection program.
Referring to fig. 1 to fig. 2, a first embodiment of the present invention is:
a network market illegal information evidence storing method based on a block chain comprises the following steps:
s1, acquiring webpage request information, randomly generating a dynamic verification code, writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address, a webpage login account and a webpage login password;
s2, calling an illegal information evidence collection program to access the block chain type account book database to obtain new webpage request information and a dynamic verification code, obtaining a webpage login account and a webpage login password according to the webpage request information, accessing a webpage address and logging in, collecting and obtaining webpage information, and writing the webpage information and the dynamic verification code into the block chain type account book database;
in this embodiment, the following are specifically mentioned:
s21, calling an illegal information evidence acquisition program to access a block chain type account book database to acquire new webpage request information and a dynamic verification code, acquiring a webpage login account and a webpage login password according to the webpage request information, accessing a webpage address and logging in, capturing a current static webpage, and recording a frequency of the current dynamic webpage to acquire webpage information;
s22, uploading the webpage information and the signature result containing the webpage information, the dynamic verification code and the server information of the illegal information evidence acquisition program to a block chain type account book database;
and S3, calling the illegal information identification model to identify and identify the illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and the dynamic verification code into the block chain type account book database.
In this embodiment, invoking the illegal information identification model to identify and identify the illegal information of the web page information specifically includes:
carrying out deep learning on the confirmed illegal information, extracting identification characteristics of the illegal information, and constructing an illegal information identification library set;
and carrying out depth identification and comprehensive comparison on the webpage information by using the illegal information identification library set, judging whether the webpage information exceeds a preset threshold value, if so, judging the webpage information as illegal information, and if not, judging the webpage information as illegal information.
In the process, a source code, an execution file and a Hash of a legal standard illegal information evidence acquisition program are written into a block chain type account book database in advance; then, as shown in fig. 2, in this embodiment, a daemon program acquires the current Hash of the illegal information evidence acquisition program in real time, and compares the current Hash with the standard Hash stored in the block chain type account book database to obtain a comparison result, so as to prevent the illegal information evidence acquisition program from being tampered, thereby achieving the credibility of the acquisition program.
In other equivalent embodiments, the source code or the execution file of the evidence collection program of the illegal information may be compared.
The method based on the embodiment is beneficial to solving the difficult problems of evidence storage and evidence collection of illegal behaviors in the network market, so that the evidence collection and the evidence storage of illegal information are identified and approved by nodes in the whole network, and the data loss and the data falsification caused by the malicious action of the central node or the network attack of the central node can be avoided due to the block chain distributed account book and the safety characteristic.
Meanwhile, the block chain system has transparency and openness, and authorization units registered on the system can see illegal information, so that the validity and credibility of illegal evidence taking are facilitated. Meanwhile, a distributed database in the whole network range is constructed by the block chain technology, so that the nondestructive sharing of illegal information can be conveniently realized, and the evidence obtaining and identification of a judicial institution are facilitated. Therefore, the block chain technology can create a new system in the aspects of illegal information storage and evidence demonstration.
Referring to fig. 3, the second embodiment of the present invention is:
a block chain-based network market illegal information evidence storing platform terminal 1 comprises a memory 3, a processor 2 and a computer program which is stored on the memory 3 and can run on the processor 2, wherein the first step of the embodiment is realized when the processor 2 executes the computer program.
The network market illegal information evidence-storing platform end 1 based on the block chain comprises an illegal information reporting program, an illegal information evidence-taking program, a guarding program, an illegal information identification program, an illegal information evidence-storing program and an illegal information inquiry evidence-storing program, and the functions of the programs are as follows:
(1) violation information reporting program: the citizen actively reports the illegal behavior of the network market, the platform automatically obtains the evidence according to the reported website, and the evidence is verified and used by an illegal information identification program.
(2) Illegal information evidence obtaining program: namely, the illegal information evidence acquisition program with the functions of dynamic webpage login, dynamic webpage frequency recording and evidence storage. And automatically logging in a webpage and recording the frequency according to the user request, and uploading the frequency recording result and the signature to the block chain.
(3) The daemon program comprises the following steps: the security of the illegal information evidence acquisition program is protected, and malicious tampering and attacking behaviors are prevented. The function of the method is to compare the illegal information evidence acquisition program or the Hash thereof with the content on the block chain, so as to prevent the illegal information evidence acquisition program from being tampered, thereby realizing the credibility of the acquisition program.
(4) Violation information identification program: and carrying out deep learning on the confirmed network market illegal behaviors, extracting the identification characteristics of the illegal information, and constructing an illegal information identification library set. And carrying out deep identification and comprehensive comparison on the illegal information reported by the citizens by utilizing the illegal information identification library set, and judging the illegal information when the illegal information exceeds a preset threshold value.
(5) Illegal information storage procedure: and carrying out data processing on the illegal information uploaded by the evidence obtaining subsystem and carrying out evidence storage and fixation on a chain.
(6) Illegal information inquiry and evidence-proving program: and inquiring and verifying various network market illegal information stored with certificates, and a user can show the certificates when necessary.
In summary, according to the block chain-based network market illegal information evidence-collecting method and the platform terminal provided by the invention, according to the webpage request information reported by the user, the webpage address is automatically accessed, and more comprehensive, real and accurate webpage information is collected through dynamic webpage login, automatic capturing of static webpages and automatic dynamic webpage frequency recording, and then whether the webpage information is illegal information is identified, in the process, the webpage information is subjected to uplink evidence collection, so that the illegal information is automatically collected and collected; meanwhile, chain-chaining evidence storage is carried out in the reporting process, the information acquisition process and the information identification process of the user, the relation among the request, the acquisition and identification results is confirmed through the dynamic verification code, so that evidence collection and storage of illegal information are commonly identified and approved by nodes of the whole network, and illegal information evidence collection programs are compared to prevent the illegal information evidence collection programs from being tampered, so that the credibility of the collection programs is realized, and the legality of the evidence collection process is ensured.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (8)

1. A network market illegal information evidence storing method based on a block chain is characterized by comprising the following steps:
s1, acquiring webpage request information, randomly generating a dynamic verification code, and writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address;
s2, calling an illegal information evidence collection program to access the block chain type account book database so as to obtain new webpage request information and dynamic verification codes, accessing the webpage address according to the webpage request information, collecting and obtaining webpage information, and writing the webpage information and the dynamic verification codes into the block chain type account book database;
the step S2 specifically includes:
s21, calling an illegal information evidence acquisition program to access a block chain type account book database to acquire new webpage request information and a dynamic verification code, acquiring a webpage login account and a webpage login password according to the webpage request information, accessing and logging in the webpage address, capturing a current static webpage, and recording a frequency of the current dynamic webpage to acquire webpage information;
s22, uploading the webpage information and a signature result containing the webpage information, the dynamic verification code and the server information of the illegal information evidence acquisition program to a block chain type account book database;
s3, calling an illegal information identification model to identify and identify the illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and the dynamic verification code into a block chain type account book database.
2. The method for storing the blockchain-based network market violation information according to claim 1, wherein the web page request information in step S1 further includes a web page login account and a web page login password;
the step S2 of "accessing the web page address" specifically includes:
and acquiring a webpage login account and a webpage login password, accessing the webpage address and logging in.
3. The method for storing the illegal network market information based on the blockchain according to claim 1, wherein the step S3 of calling the illegal information identification model to identify and identify the illegal web page information specifically comprises:
carrying out deep learning on the confirmed illegal information, extracting identification characteristics of the illegal information, and constructing an illegal information identification library set;
and carrying out depth identification and comprehensive comparison on the webpage information by utilizing an illegal information identification library set, judging whether the webpage information exceeds a preset threshold value, if so, judging the webpage information to be illegal information, and if not, judging the webpage information to be illegal information.
4. The method for storing the illegal network market information based on the blockchain according to any one of claims 1 to 3, wherein the step S2 further comprises:
writing the source code, the execution file and the Hash of the evidence collection program of the illegal information into a block chain type account book database;
the step S2 is followed by:
calling a daemon program to collect current program information of the illegal information evidence collection program in real time, and comparing the current program information with standard program information stored in a block chain type account book database to obtain a comparison result, wherein the current program information is a current source code or a current execution file or a current Hash, and the standard program information is a standard source code or a standard execution file or a standard Hash.
5. A block chain-based network market illegal information evidence storing platform terminal, comprising a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to implement the following steps:
s1, acquiring webpage request information, randomly generating a dynamic verification code, and writing the dynamic verification code and the webpage request information into a block chain type account book database, wherein the webpage request information comprises a webpage address;
s2, calling an illegal information evidence collection program to access the block chain type account book database so as to obtain new webpage request information and dynamic verification codes, accessing the webpage address according to the webpage request information, collecting and obtaining webpage information, and writing the webpage information and the dynamic verification codes into the block chain type account book database;
s3, calling an illegal information identification model to identify and identify illegal information of the webpage information to obtain an identification result of the webpage information, and writing the identification result and a dynamic verification code into a block chain type account book database;
when the processor executes the step S2 in the computer program, the following steps are specifically implemented:
s21, calling an illegal information evidence acquisition program to access a block chain type account book database to acquire new webpage request information and a dynamic verification code, acquiring a webpage login account and a webpage login password according to the webpage request information, accessing and logging in the webpage address, capturing a current static webpage, and recording a frequency of the current dynamic webpage to acquire webpage information;
and S22, uploading the webpage information and the signature result containing the webpage information, the dynamic verification code and the server information of the illegal information evidence acquisition program to a block chain type account book database.
6. The blockchain-based network market violation information evidence storing platform terminal according to claim 5, wherein the web page request information in the step S1 further comprises a web page login account and a web page login password;
when the processor executes the "access to the web page address" of step S2 in the computer program, the following steps are specifically implemented:
and acquiring a webpage login account and a webpage login password, accessing the webpage address and logging in.
7. The blockchain-based network market illegal information evidence storing platform terminal according to claim 5, wherein the processor executes the step S3 of invoking the illegal information identification model to identify and identify the illegal information of the web page information in the computer program, and specifically implements the following steps:
carrying out deep learning on the confirmed illegal information, extracting identification characteristics of the illegal information, and constructing an illegal information identification library set;
and carrying out depth identification and comprehensive comparison on the webpage information by utilizing an illegal information identification library set, judging whether the webpage information exceeds a preset threshold value, if so, judging the webpage information to be illegal information, and if not, judging the webpage information to be illegal information.
8. The blockchain-based network market violation information evidence storing platform terminal according to any one of claims 5 to 7, wherein the processor further implements the following steps when executing the step S2 in the computer program:
writing the source code, the execution file and the Hash of the evidence collection program of the illegal information into a block chain type account book database;
after the processor executes the step S2 in the computer program, the following steps are also implemented:
calling a daemon program to collect current program information of the illegal information evidence collection program in real time, and comparing the current program information with standard program information stored in a block chain type account book database to obtain a comparison result, wherein the current program information is a current source code or a current execution file or a current Hash, and the standard program information is a standard source code or a standard execution file or a standard Hash.
CN201911076123.2A 2019-11-06 2019-11-06 Block chain-based network market illegal information evidence storing method and platform terminal Active CN110807187B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911076123.2A CN110807187B (en) 2019-11-06 2019-11-06 Block chain-based network market illegal information evidence storing method and platform terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911076123.2A CN110807187B (en) 2019-11-06 2019-11-06 Block chain-based network market illegal information evidence storing method and platform terminal

Publications (2)

Publication Number Publication Date
CN110807187A CN110807187A (en) 2020-02-18
CN110807187B true CN110807187B (en) 2021-09-14

Family

ID=69501364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911076123.2A Active CN110807187B (en) 2019-11-06 2019-11-06 Block chain-based network market illegal information evidence storing method and platform terminal

Country Status (1)

Country Link
CN (1) CN110807187B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102184855B1 (en) * 2020-04-17 2020-12-01 주식회사 에스랩 Illegal login detectoin system and method thereof
CN112035893A (en) * 2020-07-20 2020-12-04 江苏傲为控股有限公司 Block chain electronic contract management system
CN112115497B (en) * 2020-09-28 2023-06-27 上海对外经贸大学 Block chain-based public opinion storage information erasable treatment method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107683493A (en) * 2015-03-05 2018-02-09 高盛有限责任公司 Verified for the part based on transaction to update the system and method for distributed account book
CN108647969A (en) * 2018-05-16 2018-10-12 深圳市网心科技有限公司 A kind of method, apparatus, system and the storage medium of access block chain
CN109102437A (en) * 2018-08-10 2018-12-28 山东省计算中心(国家超级计算济南中心) A kind of webpage automatic evidence-collecting method and system based on block chain
CN109274674A (en) * 2018-09-27 2019-01-25 福建福链科技有限公司 A kind of block chain isomerism common recognition method and terminal with high security
CN109871930A (en) * 2019-02-22 2019-06-11 山东浪潮质量链科技有限公司 A kind of block chain provides the method and device of Quality Codes and verification quality code

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA3186147A1 (en) * 2014-08-28 2016-02-28 Kevin Alan Tussy Facial recognition authentication system including path parameters
US10726346B2 (en) * 2016-11-09 2020-07-28 Cognitive Scale, Inc. System for performing compliance operations using cognitive blockchains

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107683493A (en) * 2015-03-05 2018-02-09 高盛有限责任公司 Verified for the part based on transaction to update the system and method for distributed account book
CN108647969A (en) * 2018-05-16 2018-10-12 深圳市网心科技有限公司 A kind of method, apparatus, system and the storage medium of access block chain
CN109102437A (en) * 2018-08-10 2018-12-28 山东省计算中心(国家超级计算济南中心) A kind of webpage automatic evidence-collecting method and system based on block chain
CN109274674A (en) * 2018-09-27 2019-01-25 福建福链科技有限公司 A kind of block chain isomerism common recognition method and terminal with high security
CN109871930A (en) * 2019-02-22 2019-06-11 山东浪潮质量链科技有限公司 A kind of block chain provides the method and device of Quality Codes and verification quality code

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于"区块链+电子认证"的可信电子存证固证服务平台;潘金昌等;《网络空间安全》;20190806;第10卷(第3期);第85-88页 *
基于区块链技术的数据存证管理系统;周艺华等;《信息网络安全》;20191012(第8期);第8-14页 *

Also Published As

Publication number Publication date
CN110807187A (en) 2020-02-18

Similar Documents

Publication Publication Date Title
Alwan et al. Detection and prevention of SQL injection attack: a survey
US10057280B2 (en) Methods and systems of detecting and analyzing correlated operations in a common storage
Agrawal et al. Privacy and security of Aadhaar: a computer science perspective
Kemalis et al. SQL-IDS: a specification-based approach for SQL-injection detection
CN110807187B (en) Block chain-based network market illegal information evidence storing method and platform terminal
CN103401957B (en) A kind of unique method identifying client machine under web environment
US20190124100A1 (en) Robotic process automation resource insulation system
Al-Dhaqm et al. A generic database forensic investigation process model
Smith et al. Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
CN110912855A (en) Block chain architecture security assessment method and system based on permeability test case set
CN113542279A (en) Network security risk assessment method, system and device
Maraj et al. Testing techniques and analysis of SQL injection attacks
Montecchi et al. Quantitative security evaluation of a multi-biometric authentication system
Sun et al. A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure.
KR101464736B1 (en) Security Assurance Management System and Web Page Monitoring Method
CN117251850A (en) Intelligent data sharing and monitoring method and system
CN111885088A (en) Log monitoring method and device based on block chain
CN106130996B (en) A kind of website attack protection verifying system and method
EP3796247A1 (en) Systems, methods, and storage media for providing information relating to suspicious financial activities to investigative agencies
Ashari et al. Security Audit for Vulnerability Detection and Mitigation of UPT Integrated Laboratory (ILab) ITERA Website Based on OWASP Zed Attack Proxy (ZAP)
Charania et al. SQL Injection Attack: Detection and Prevention
Flores Armas Theory and practice of proactive database forensics
KR102580469B1 (en) Method for management for cyber security threat and attack surface and apparatus for performing the method
Aich Secure query processing by blocking sql injection
EP4325386A1 (en) Imaging device configuration verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant