CN111292196B - Network identity protection method and device, electronic equipment and storage medium - Google Patents

Network identity protection method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111292196B
CN111292196B CN202010161620.9A CN202010161620A CN111292196B CN 111292196 B CN111292196 B CN 111292196B CN 202010161620 A CN202010161620 A CN 202010161620A CN 111292196 B CN111292196 B CN 111292196B
Authority
CN
China
Prior art keywords
network identity
insurance
target
target network
operation log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010161620.9A
Other languages
Chinese (zh)
Other versions
CN111292196A (en
Inventor
曾肖宇
刘文印
杨泽勤
张浩辉
姜达成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN202010161620.9A priority Critical patent/CN111292196B/en
Publication of CN111292196A publication Critical patent/CN111292196A/en
Application granted granted Critical
Publication of CN111292196B publication Critical patent/CN111292196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Abstract

The application discloses a network identity protection method, a device, an electronic device and a computer readable storage medium, wherein the method comprises the following steps: receiving a security evaluation report of the target network identity, and determining the security level of the target network identity based on the security evaluation report; the target network identity is used for logging in a target website; returning candidate insurance products corresponding to the security level to the client side where the target network identity is located through a third-party security platform so as to select the target insurance products for the target network identity from the candidate insurance products for insuring; the safety level of the target network identity is sent to the block chain link points corresponding to the target insurance company to which the target insurance product belongs, so that the target insurance company can verify the insurance application request; and after the insurance application request passes the verification, storing the insurance application contract corresponding to the insurance application request into the intelligent contract. According to the network identity protection method, the block chain network is used for realizing the insurance service of the network identity, and the safety of the insurance service is improved.

Description

Network identity protection method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a network identity protection method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the development of the internet, digital assets associated with the identity of a user on the network are increasingly huge and high in price, and due to the serious network security problems including 'fishing' and 'library collision' at present and the defects of complicated cheating and settlement in the traditional insurance industry, a perfect, reliable and efficient digital identity security mechanism is lacked, so that the effective insurance guarantee of the network identity of the user and the associated digital assets becomes a very valuable research direction in the current developed social form of the network.
In the existing block chain insurance scheme, firstly, a webpage access application of a terminal is received in a pre-established block chain network; according to the access application, after the terminal is confirmed to have the access authority, the terminal is allowed to access the webpage; and the insurance node is used for storing insurance policy data in the system, the authentication node is used for confirming and recording accident proof materials of the user, and the claim verification node is used for determining the claim verification result of the user.
In the scheme, the insurance service is simply applied to the block chain, the barrier of the insurance industry entering the digital asset insurance market cannot be broken through, the digital identity is easy to be attacked by hackers, the insurance company cannot accurately predict the risk of claim settlement and dares to put the insurance, the insurance company cannot comprehensively evaluate the digital assets of the insurance company and the insurance company to provide corresponding claim products, the risk of tampering data by interested parties exists in the packaging and chaining process, and the intelligent contract does not refine the insurance claim of the digital assets.
Therefore, how to implement the insurance service of the network identity by using the blockchain network and improve the security of the insurance service is a technical problem to be solved by those skilled in the art.
Disclosure of Invention
The present application aims to provide a network identity protection method, a network identity protection device, an electronic device, and a computer-readable storage medium, which implement an insurance service for a network identity by using a blockchain network, and improve the security of the insurance service.
In order to achieve the above object, the present application provides a network identity protection method, which is applied to a block chain network, and includes:
receiving a security assessment report of a target network identity, and determining a security level of the target network identity based on the security assessment report; wherein, the target network identity is used for logging in the target website;
returning candidate insurance products corresponding to the security level to a client side where the target network identity is located through a third-party security platform, so that the target insurance products are selected for the target network identity from the candidate insurance products for insurance application;
sending the security level of the target network identity to a block chain node corresponding to a target insurance company to which the target insurance product belongs so that the target insurance company can verify an application request;
and after the insurance application request passes the verification, storing the insurance application contract corresponding to the insurance application request into the intelligent contract.
Wherein, returning the candidate insurance products corresponding to the security level to the client where the target network identity is located comprises:
and receiving the insurance application requirement of the target network identity, and returning the candidate insurance product corresponding to the security level to the client side where the target network identity is located according to the insurance application requirement.
Wherein, still include:
receiving, by a block link point of each insurance company, an insurance product of each insurance company and determining a security level corresponding to each insurance product.
Wherein, returning the candidate insurance products corresponding to the security level to the client where the target network identity is located comprises:
and returning candidate insurance products corresponding to the security level and suggestions for improving the security level to the client side where the target network identity is located.
Wherein, still include:
when a claim application of the client to the target network identity is received, determining abnormal operation corresponding to the claim application, and acquiring a first operation log and a second operation log corresponding to the target network identity; the first operation log is an operation log which is uploaded to the blockchain network by the third-party security platform and used for recording the login information of the target network identity, and the second operation log is an operation log which is uploaded to the blockchain network by the target website and used for recording the login information of the target network identity;
and checking the abnormal operation by comparing the first operation log with the second operation log, and if the abnormal operation passes the check, executing a claim settlement program according to an insurance application contract corresponding to the target network identity in the intelligent contract.
Wherein, still include:
and if the check is not passed, punishing the target network identity.
In order to achieve the above object, the present application provides a network identity protection device, which is applied to a block chain network, and includes:
the determining module is used for receiving a security evaluation report of a target network identity and determining the security level of the target network identity based on the security evaluation report; wherein, the target network identity is used for logging in the target website;
a returning module, configured to return, to a client where the target network identity is located, a candidate insurance product corresponding to the security level through a third-party security platform, so as to select a target insurance product for the target network identity from the candidate insurance products for insurance application;
the sending module is used for sending the security level of the target network identity to the block chain link point corresponding to the target insurance company to which the target insurance product belongs so that the target insurance company can verify the insurance application request;
and the storage module is used for storing the insurance application contract corresponding to the insurance application request into the intelligent contract after the insurance application request passes the verification.
To achieve the above object, the present application provides an electronic device including:
a memory for storing a computer program;
a processor for implementing the steps of the network identity protection method when executing the computer program.
To achieve the above object, the present application provides a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the network identity protection method as described above.
According to the scheme, the network identity protection method provided by the application comprises the following steps: receiving a security assessment report of a target network identity, and determining a security level of the target network identity based on the security assessment report; wherein, the target network identity is used for logging in the target website; returning candidate insurance products corresponding to the security level to a client side where the target network identity is located through a third-party security platform, so that the target insurance products are selected for the target network identity from the candidate insurance products for insurance application; sending the security level of the target network identity to a block chain node corresponding to a target insurance company to which the target insurance product belongs so that the target insurance company can verify an application request; and after the insurance application request passes the verification, storing the insurance application contract corresponding to the insurance application request into the intelligent contract.
In the application, the insurable individuals and enterprise users, namely target network identities, need to be subjected to detection and evaluation by security companies, the blockchain network elects insurance products provided by a plurality of insurance companies for the users according to evaluation grading, the users sign contracts with the insurance companies and then automatically generate intelligent contract automatic chaining, and the operation logs of the target network identities logging in the target website are used as the chaining of claim checking information. The network identity protection method provided by the application is an insurance guarantee method provided for digital assets, and aims to protect the benefits of both parties of an insurance company and an insurance user accessing a block chain network. Compared with the existing block chain insurance mechanism, the safety company generates a safety evaluation report for the target network identity, and can solve the problems that the high-risk insurance company cannot put down insurance, digital assets are difficult to estimate values and the like. The application also discloses a network identity protection device, an electronic device and a computer readable storage medium, which can also realize the technical effects.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
fig. 1 is a flow diagram illustrating a method of network identity protection in accordance with an example embodiment;
fig. 2 is a flow diagram illustrating another method of network identity protection in accordance with an example embodiment;
fig. 3 is a block diagram illustrating a network identity protection device in accordance with an exemplary embodiment;
FIG. 4 is a block diagram illustrating an electronic device in accordance with an exemplary embodiment.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application discloses a network identity protection method, which realizes the insurance service of network identity by using a block chain network and improves the safety of the insurance service.
Referring to fig. 1, a flowchart of a network identity protection method according to an exemplary embodiment is shown, as shown in fig. 1, including:
s101: receiving a security assessment report of a target network identity, and determining a security level of the target network identity based on the security assessment report; wherein, the target network identity is used for logging in the target website;
the execution subject of this embodiment is a block chain network, and aims to implement the application of a target network identity, which may be a network identity of an individual or an enterprise user, for logging in a target website. Before a user applies for insurance, a security company carries out web and database security detection on a target network identity, generates a security evaluation report and encrypts and uploads a block chain, and a block chain network determines a security level based on the security evaluation report.
After the insurance company enters the system, the insurance company will release the network identity digital asset insurance product, that is, this embodiment further includes: receiving, by a block link point of each insurance company, an insurance product of each insurance company and determining a security level corresponding to each insurance product.
S102: returning candidate insurance products corresponding to the security level to a client side where the target network identity is located through a third-party security platform, so that the target insurance products are selected for the target network identity from the candidate insurance products for insurance application;
in this step, the blockchain network elects candidate insurance products for the user according to the security level of the target network identity, returns to the client side where the target network identity is located through the third-party security platform, and the user selects the target insurance products needing to be insured in the client side. The third-party security platform can comprise a guard chain platform, and information uploaded to the block chain network through the third-party security platform is safe and can not be tampered.
It should be noted that the user cannot override the selection of insurance products, but can recommend the increase of the safety evaluation level number through the prompt given by the system. Namely, the method comprises the following steps: and returning candidate insurance products corresponding to the security level and suggestions for improving the security level to the client side where the target network identity is located. Of course, the user may also submit the customized insurance product requirement to the insurance company, that is, this step includes: and receiving the insurance application requirement of the target network identity, and returning the candidate insurance product corresponding to the security level to the client side where the target network identity is located according to the insurance application requirement.
S103: sending the security level of the target network identity to a block chain node corresponding to a target insurance company to which the target insurance product belongs so that the target insurance company can verify an application request;
in this step, after the user submits the application for insurance or customizes the requirement, the insurance company decrypts to obtain the safety evaluation report, and selects whether to provide insurance service for the insurance user according to the safety evaluation report.
S104: and after the insurance application request passes the verification, storing the insurance application contract corresponding to the insurance application request into the intelligent contract.
In this step, if the insurance company chooses to provide insurance service, both parties sign the contract and automatically generate an intelligent contract uplink in the system, and if the insurance company refuses to provide insurance service, the user can pick the insurance product again for insurance application. It should be noted that, the same log information of the application insurance policy can be packaged and linked by the security company without involving the beneficiary, so as to prevent the tampering.
In the embodiment of the application, the insurable individuals and enterprise users, namely target network identities, need to be subjected to detection and evaluation by security companies, the blockchain network elects insurance products provided by a plurality of insurance companies for the users according to evaluation grading, the users sign contracts with the insurance companies and then automatically generate intelligent contract automatic chaining, and the operation logs of the target network identities logging in the target website are used as the chaining of claim checking information. The network identity protection method provided by the embodiment of the application is an insurance guarantee method provided for digital assets, and aims to protect the benefits of both parties of an insurance company and an insurance user accessing a block chain network. Compared with the existing block chain insurance mechanism, the safety company generates a safety evaluation report for the target network identity, and can solve the problems that the high-risk insurance company cannot put down insurance, digital assets are difficult to estimate values and the like.
In this embodiment, a claim settlement process will be described in detail, and specifically, as shown in fig. 2, the process may include:
s201: when a claim application of the client to the target network identity is received, determining abnormal operation corresponding to the claim application, and acquiring a first operation log and a second operation log corresponding to the target network identity;
the first operation log is an operation log which is uploaded to the blockchain network by the third-party security platform and used for recording the login information of the target network identity, and the second operation log is an operation log which is uploaded to the blockchain network by the target website and used for recording the login information of the target network identity;
in specific implementation, when a user logs in a target website through a third-party security platform by using a target network identity, the third-party security platform and the target website respectively perform the same processing on login information and respectively upload the login information to a block chain network. The login information may include a domain name of a website to be logged in, an ip address of a client where the target network identity is located at the time of logging in, an account number of the target network identity, and login time. Each portion of the login information may be in the form of a key-value pair, and arranged in the alphabetical order of the keys. The login information is then encrypted, for example, by RSA and AES encryption, wherein the AES algorithm may be AES-256-CFB8, and the RSA password strength may be 2048. It should be noted that, for the purpose of third party forgery, the encryption process may use an RSA private key for encryption, the third party security platform has all the password pairs accessing the website, queries the corresponding private key in the database through the public key, then reproduces the encryption process, and verifies the final encryption result. It will not be possible for a third party who does not know the private key to forge a log with the characteristics of the web site.
And carrying out hash processing on the encrypted login information to generate a hash result, wherein the hash result is the actual content which is finally uploaded to the block chain network. It can be understood that the operation log is actually stored in a single transaction record, and therefore, the operation log is stored to initiate a transaction to a transaction interface of the blockchain network, and the hash result containing the login information is carried to generate a hash of the transaction.
The security company is a common identification node in the block chain network and is responsible for packing out blocks without directly processing operation logs. For subsequent tracing, the security company is responsible for recording the hash value of the block generated by the target website and the third-party security platform and the hash value of the transaction, so that the operation log is permanently stored and can be traced.
S202: and checking the abnormal operation by comparing the first operation log with the second operation log, and if the abnormal operation passes the check, executing a claim settlement program according to an insurance application contract corresponding to the target network identity in the intelligent contract.
In this embodiment, when the user loses digital assets after purchasing insurance products, that is, after abnormal operations exist, a claim application may be filled in at the client according to actual conditions, and the application may be sent to the blockchain network. The block chain network compares a first operation log and a second operation log corresponding to the target network identity, and checks the abnormal operation of the user digital identity according to the claim application, and the first operation log is uploaded to the block chain network by a third-party security platform and has the characteristic of being incapable of being tampered, so that the abnormal operation can be checked by comparing the first operation log and the second operation log, namely the authenticity of the abnormal operation is judged.
And executing a claim settlement program according to the insurance contract corresponding to the target network identity in the intelligent contract after the check is passed. In a specific implementation, a claim settlement parameter is introduced into an intelligent contract storing an insurance contract corresponding to the target network identity, the claim settlement parameter may be obtained based on the operation log in step S201, and the intelligent contract automatically executes a claim settlement program.
If the check is not passed, the request submitted by the user is judged to be fake, and the block chain network, the insurance company and the security company arbitrate the fake request to punish the target network identity.
Therefore, the digital assets are subdivided and optimized through the intelligent contracts in the block chain network, so that the process of insurance claim settlement of the digital assets is simplified and the speed is higher.
In the following, a network identity protection device provided in an embodiment of the present application is introduced, and a network identity protection device described below and a network identity protection method described above may be referred to each other.
Referring to fig. 3, a block diagram of a network identity protection device according to an exemplary embodiment is shown, as shown in fig. 3, including:
a determining module 301, configured to receive a security assessment report of a target network identity, and determine a security level of the target network identity based on the security assessment report; wherein, the target network identity is used for logging in the target website;
a returning module 302, configured to return, to a client where the target network identity is located, a candidate insurance product corresponding to the security level through a third-party security platform, so as to select a target insurance product for the target network identity from the candidate insurance products for insurance application;
a sending module 303, configured to send the security level of the target network identity to a block link point corresponding to a target insurance company to which the target insurance product belongs, so that the target insurance company verifies an insurance application request;
and the storage module 304 is configured to store the insurance application contract corresponding to the insurance application request into the intelligent contract after the insurance application request passes the verification.
In the embodiment of the application, the insurable individuals and enterprise users, namely target network identities, need to be subjected to detection and evaluation by security companies, the blockchain network elects insurance products provided by a plurality of insurance companies for the users according to evaluation grading, the users sign contracts with the insurance companies and then automatically generate intelligent contract automatic chaining, and the operation logs of the target network identities logging in the target website are used as the chaining of claim checking information. The network identity protection device provided by the embodiment of the application is an insurance guarantee method provided for digital assets, and aims to protect the benefits of an insurance company accessing a block chain network and two parties of an insuring user. Compared with the existing block chain insurance mechanism, the safety company generates a safety evaluation report for the target network identity, and can solve the problems that the high-risk insurance company cannot put down insurance, digital assets are difficult to estimate values and the like.
On the basis of the foregoing embodiment, as a preferred implementation manner, the returning module 302 is specifically a module that receives an insurance application requirement of the target network identity, and returns a candidate insurance product corresponding to the security level to a client where the target network identity is located according to the insurance application requirement.
On the basis of the above embodiment, as a preferred implementation, the method further includes:
the receiving module is used for receiving the insurance products of each insurance company through the block link points of each insurance company and determining the corresponding safety level of each insurance product.
On the basis of the foregoing embodiment, as a preferred implementation manner, the returning module 302 is specifically a module that returns the candidate insurance product corresponding to the security level and the suggestion for improving the security level to the client where the target network identity is located.
On the basis of the above embodiment, as a preferred implementation, the method further includes:
the obtaining module is used for determining abnormal operation corresponding to the claim application when receiving the claim application of the client to the target network identity, and obtaining a first operation log and a second operation log corresponding to the target network identity; the first operation log is an operation log which is uploaded to the blockchain network by the third-party security platform and used for recording the login information of the target network identity, and the second operation log is an operation log which is uploaded to the blockchain network by the target website and used for recording the login information of the target network identity;
the comparison module is used for checking the abnormal operation by comparing the first operation log with the second operation log;
and the execution module is used for executing a claim settlement program according to the insurance contract corresponding to the target network identity in the intelligent contract when the check is passed.
On the basis of the above embodiment, as a preferred implementation, the method further includes:
and the punishment module is used for punishing the target network identity when the check fails.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present application further provides an electronic device, and referring to fig. 4, a structure diagram of an electronic device 400 provided in an embodiment of the present application, as shown in fig. 4, may include a processor 11 and a memory 12. The electronic device 400 may also include one or more of a multimedia component 13, an input/output (I/O) interface 14, and a communication component 15.
The processor 11 is configured to control the overall operation of the electronic device 400, so as to complete all or part of the steps in the network identity protection method. The memory 12 is used to store various types of data to support operation at the electronic device 400, such as instructions for any application or method operating on the electronic device 400 and application-related data, such as contact data, transmitted and received messages, pictures, audio, video, and so forth. The Memory 12 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia component 13 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 12 or transmitted via the communication component 15. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 14 provides an interface between the processor 11 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 15 is used for wired or wireless communication between the electronic device 400 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so that the corresponding Communication component 15 may include: Wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the electronic Device 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for performing the network identity protection method described above.
In another exemplary embodiment, a computer readable storage medium comprising program instructions which, when executed by a processor, implement the steps of the above-described network identity protection method is also provided. For example, the computer readable storage medium may be the memory 12 described above comprising program instructions that are executable by the processor 11 of the electronic device 400 to perform the network identity protection method described above.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (8)

1. A network identity protection method is applied to a block chain network, and comprises the following steps:
receiving a security assessment report of a target network identity, and determining a security level of the target network identity based on the security assessment report; the target network identity is used for logging in the target website through a third-party security platform;
returning candidate insurance products corresponding to the security level to a client side where the target network identity is located through a third-party security platform, so that the target insurance products are selected for the target network identity from the candidate insurance products for insurance application;
sending the security level of the target network identity to a block chain node corresponding to a target insurance company to which the target insurance product belongs so that the target insurance company can verify an application request;
after the insurance application request passes the verification, storing an insurance application contract corresponding to the insurance application request into an intelligent contract;
wherein, still include:
when a claim application of the client to the target network identity is received, determining abnormal operation corresponding to the claim application, and acquiring a first operation log and a second operation log corresponding to the target network identity; the first operation log is an operation log which is uploaded to the blockchain network by the third-party security platform and used for recording the login information of the target network identity, and the second operation log is an operation log which is uploaded to the blockchain network by the target website and used for recording the login information of the target network identity;
and checking the abnormal operation by comparing the first operation log with the second operation log, and if the abnormal operation passes the check, executing a claim settlement program according to an insurance application contract corresponding to the target network identity in the intelligent contract.
2. The network identity protection method according to claim 1, wherein returning the candidate insurance product corresponding to the security level to the client where the target network identity is located comprises:
and receiving the insurance application requirement of the target network identity, and returning the candidate insurance product corresponding to the security level to the client side where the target network identity is located according to the insurance application requirement.
3. The network identity protection method according to claim 1, further comprising:
receiving, by a block link point of each insurance company, an insurance product of each insurance company and determining a security level corresponding to each insurance product.
4. The network identity protection method according to claim 1, wherein returning the candidate insurance product corresponding to the security level to the client where the target network identity is located comprises:
and returning candidate insurance products corresponding to the security level and suggestions for improving the security level to the client side where the target network identity is located.
5. The network identity protection method according to claim 1, further comprising:
and if the check is not passed, punishing the target network identity.
6. A network identity protection device applied to a block chain network comprises:
the determining module is used for receiving a security evaluation report of a target network identity and determining the security level of the target network identity based on the security evaluation report; the target network identity is used for logging in the target website through a third-party security platform;
a returning module, configured to return, to a client where the target network identity is located, a candidate insurance product corresponding to the security level through a third-party security platform, so as to select a target insurance product for the target network identity from the candidate insurance products for insurance application;
the sending module is used for sending the security level of the target network identity to the block chain link point corresponding to the target insurance company to which the target insurance product belongs so that the target insurance company can verify the insurance application request;
the storage module is used for storing the insurance application contract corresponding to the insurance application request into the intelligent contract after the insurance application request passes the verification;
wherein, still include:
the obtaining module is used for determining abnormal operation corresponding to the claim application when receiving the claim application of the client to the target network identity, and obtaining a first operation log and a second operation log corresponding to the target network identity; the first operation log is an operation log which is uploaded to the blockchain network by the third-party security platform and used for recording the login information of the target network identity, and the second operation log is an operation log which is uploaded to the blockchain network by the target website and used for recording the login information of the target network identity;
the comparison module is used for checking the abnormal operation by comparing the first operation log with the second operation log;
and the execution module is used for executing a claim settlement program according to the insurance contract corresponding to the target network identity in the intelligent contract when the check is passed.
7. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the network identity protection method according to any one of claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the network identity protection method according to any one of claims 1 to 5.
CN202010161620.9A 2020-03-10 2020-03-10 Network identity protection method and device, electronic equipment and storage medium Active CN111292196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010161620.9A CN111292196B (en) 2020-03-10 2020-03-10 Network identity protection method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010161620.9A CN111292196B (en) 2020-03-10 2020-03-10 Network identity protection method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111292196A CN111292196A (en) 2020-06-16
CN111292196B true CN111292196B (en) 2021-10-01

Family

ID=71022525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010161620.9A Active CN111292196B (en) 2020-03-10 2020-03-10 Network identity protection method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111292196B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108629565A (en) * 2018-04-28 2018-10-09 上海京颐科技股份有限公司 Medical treatment Claims Resolution method and device based on block chain, electronic equipment
CN109118375A (en) * 2018-08-13 2019-01-01 泰康保险集团股份有限公司 It insures processing method, device, medium and electronic equipment
CN110866837A (en) * 2019-12-02 2020-03-06 中国银行股份有限公司 Block chain-based vehicle insurance underwriting claim method, equipment and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9544317B2 (en) * 2014-12-01 2017-01-10 Verizon Patent And Licensing Inc. Identification of potential fraudulent website activity
US10445479B2 (en) * 2016-12-30 2019-10-15 Fortinet, Inc. Spatiotemporal credential leak detection to prevent identity fraud using a log management system
CN108805722A (en) * 2018-05-21 2018-11-13 深圳市轱辘车联数据技术有限公司 A kind of car insurance Intelligent Decision-making Method, device and relevant device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108629565A (en) * 2018-04-28 2018-10-09 上海京颐科技股份有限公司 Medical treatment Claims Resolution method and device based on block chain, electronic equipment
CN109118375A (en) * 2018-08-13 2019-01-01 泰康保险集团股份有限公司 It insures processing method, device, medium and electronic equipment
CN110866837A (en) * 2019-12-02 2020-03-06 中国银行股份有限公司 Block chain-based vehicle insurance underwriting claim method, equipment and system

Also Published As

Publication number Publication date
CN111292196A (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN109190410B (en) Log behavior auditing method based on block chain in cloud storage environment
CN111353903B (en) Network identity protection method and device, electronic equipment and storage medium
CN109274652B (en) Identity information verification system, method and device and computer storage medium
US20210243037A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
US9854001B1 (en) Transparent policies
Lee et al. Modifiable public blockchains using truncated hashing and sidechains
CN110096903B (en) Asset verification method based on block chain and block chain network system
CN104620225B (en) Method and system for server security checking
Salim Cyber safety: A systems thinking and systems theory approach to managing cyber security risks
CN100383694C (en) Maintaining privacy for transactions performable by a user device having a security module
US11621844B2 (en) Secure data transfer system and method
CN111046078B (en) Credit investigation method and device based on block chain and electronic equipment
CN111597424A (en) Crawler identification method and device, computer equipment and storage medium
Yahya et al. Using goal-question-metric (GQM) approach to assess security in cloud storage
WO2021015957A1 (en) Safe logon
TW201913529A (en) Confirmation system based on blockchain smart contract and method thereof
CN112257048A (en) Information security protection method and device
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN110598476A (en) Block chain-based work evidence storing method and device and computer readable storage medium
CN111292196B (en) Network identity protection method and device, electronic equipment and storage medium
US11087374B2 (en) Domain name transfer risk mitigation
CN112037055A (en) Transaction processing method and device, electronic equipment and readable storage medium
CN111382454B (en) Network identity protection method and device, electronic equipment and storage medium
CN114978677A (en) Asset access control method, device, electronic equipment and computer readable medium
CN112884484A (en) Enterprise identity authentication method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Zeng Xiaoyu

Inventor after: Liu Wenyin

Inventor after: Yang Zeqin

Inventor after: Zhang Haohui

Inventor after: Jiang Dacheng

Inventor before: Liu Wenyin

Inventor before: Zeng Xiaoyu

Inventor before: Yang Zeqin

Inventor before: Zhang Haohui

Inventor before: Jiang Dacheng

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant