CN111861490A - Data request processing method based on block chain and block chain technology service platform - Google Patents

Data request processing method based on block chain and block chain technology service platform Download PDF

Info

Publication number
CN111861490A
CN111861490A CN202010699130.4A CN202010699130A CN111861490A CN 111861490 A CN111861490 A CN 111861490A CN 202010699130 A CN202010699130 A CN 202010699130A CN 111861490 A CN111861490 A CN 111861490A
Authority
CN
China
Prior art keywords
verification
parameter
service
label transfer
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010699130.4A
Other languages
Chinese (zh)
Inventor
冯小庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010699130.4A priority Critical patent/CN111861490A/en
Publication of CN111861490A publication Critical patent/CN111861490A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention provides a data request processing method based on a block chain and a block chain technical service platform, after generating verification parameter service information according to a label transfer parameter and an update change parameter of a verification environment update element, mapping a field parameter of a verification parameter field in the verification parameter service information into a field mark value sequence, inversely converting a transaction certificate label transfer parameter into a certificate service label transfer parameter, generating a request processing update process by combining the certificate service label transfer parameter and the field mark value sequence, considering that a payment certificate service is suitable for a label transfer process after a payment verification scene is updated and the field mark value sequence related to the verification parameter service information to carry out subsequent request processing update verification operation, thereby being convenient for flexibly adapting to the last payment verification environment when the payment verification environment is changed, and further improve the scene practicality of mobile payment when improving the security of mobile payment.

Description

Data request processing method based on block chain and block chain technology service platform
Technical Field
The invention relates to the technical field of block chains and information security, in particular to a data request processing method based on a block chain and a block chain technical service platform.
Background
In the process of the mobile remote payment process based on the block chain technology, in order to avoid the safety problem of the digital currency in the payment process, intelligent identification is usually carried out on the user characteristics of the payment behavior, so that the transaction request is intercepted or released according to the identification result.
For example, in some examples, the payment verification request is processed by performing intelligent identification considering characteristics of the payment verification environment, but in each processing process, when the payment verification environment changes, it is difficult to flexibly adapt to the last payment verification environment, so that it may be difficult to successfully verify the payment verification environment when the payment verification environment is repeatedly switched, and payment experience is affected.
Disclosure of Invention
In order to overcome at least the above-mentioned deficiencies in the prior art, the present invention provides a block chain-based data request processing method and a block chain technology service platform, after generating verification parameter service information according to a tag transfer parameter and an update change parameter of a verification environment update element, mapping a field parameter of a verification parameter field in the verification parameter service information into a field marking value sequence, inversely converting a transaction credential tag transfer parameter into a credential service tag transfer parameter, generating a request processing update process by combining the credential service tag transfer parameter and the field marking value sequence, considering that a payment credential service is adapted to a tag transfer process after a payment verification scene is updated and a field marking value sequence related to the verification parameter service information to perform subsequent request processing update verification operations, thereby being convenient for flexibly adapting to a last payment verification environment when the payment verification environment changes, and further improve the scene practicality of mobile payment when improving the security of mobile payment.
In a first aspect, the present invention provides a data request processing method based on a blockchain, which is applied to a blockchain technology service platform, where the blockchain technology service platform is in communication connection with a plurality of blockchain nodes, and the method includes:
acquiring a processing instruction of a corresponding payment verification request generated by the payment verification environment information sent by the blockchain node, and acquiring corresponding request processing information after processing the payment verification request according to the processing instruction, wherein the request processing information is used for representing a processing reason corresponding to the current request processing;
acquiring a verification environment updating element sequence according to payment verification environment updating information of the payment terminal equipment corresponding to the request processing information aiming at the request processing information, wherein each verification environment updating element in the verification environment updating element sequence comprises an updating change parameter of the verification environment updating element and a label transfer parameter for describing a verification label to which the verification environment updating element belongs;
obtaining verification parameter service information according to the label transfer parameters and the updating change parameters of the verification environment updating elements, and performing fast Fourier transform on field parameters of verification parameter fields in the verification parameter service information to obtain field marking value sequences corresponding to the verification parameter fields;
And performing reverse conversion on transaction certificate label transfer parameters corresponding to verification parameter fields in the verification parameter service information to obtain certificate service label transfer parameters corresponding to the verification parameter fields, and generating a request processing updating process according to the certificate service label transfer parameters and the field indication value sequence so as to continuously process a corresponding payment verification request generated by the payment verification environment information based on the request processing updating process.
In a possible implementation manner of the first aspect, the step of obtaining a processing instruction of a corresponding payment verification request generated for the payment verification environment information sent by the blockchain node includes:
acquiring at least one verification element sequence from payment verification environment information sent by the blockchain node, wherein each verification element object in each verification element sequence belongs to the same verification tag, and each verification element object corresponds to a tag configuration parameter under the verification tag to which the verification element object belongs;
performing verification threat attribute mining on the verification element sequences based on the configuration parameters of the tags under the verification tags to obtain verification threat attribute characteristics of the verification element sequences and corresponding threat attribute confidence degrees;
Determining attack tracking parameters of the verification tags corresponding to the verification element objects according to the verification threat attribute characteristics and the corresponding threat attribute confidence degrees;
and determining an attack path graphical object corresponding to each verification tag according to the attack tracking parameters of the verification tags corresponding to the verification element objects, and generating a processing instruction of the payment verification request corresponding to the payment verification environment information according to the attack path graphical object corresponding to each verification tag.
In a possible implementation manner of the first aspect, the step of mining the verification threat attribute of the verification element sequence based on the configuration parameters of each tag under the verification tag to obtain the verification threat attribute feature of each verification element sequence and the corresponding threat attribute confidence includes:
traversing verification element objects in the verification element sequences for each verification element sequence, extracting verification element contents for comparing configuration parameters of each tag under a verification tag to which the verification element sequence belongs from the verification element objects, and determining content related data corresponding to the verification element sequences according to the extracted verification element contents;
Removing set content characteristics contained in the content of each verification element in the content related data, splitting content nodes of the verification element content without the set content characteristics to obtain first content related data, and determining the confidence of each content node according to the number of existing lines of the content nodes in the verification element content contained in the first content related data;
removing content nodes with the confidence coefficient smaller than a preset confidence coefficient threshold value in the first content related data to obtain second content related data, taking the content nodes with the confidence coefficient not smaller than the preset confidence coefficient threshold value as pre-content nodes to obtain a pre-content node sequence, and determining a post-content node sequence which corresponds to each pre-content node and consists of content nodes connected behind the pre-content node according to the occurrence condition of each pre-content node in the pre-content node sequence in the second content related data;
judging whether the post content node sequence is empty or not, if the post content node sequence is empty, recursively returning, and if the post content node sequence is not empty, counting the confidence level of each content node in the post content node sequence, and judging whether the confidence level of each content node meets the requirement of minimum confidence level or not;
If the confidence of the content node does not meet the requirement of the minimum confidence, recursively returning, if the confidence of the content node meets the requirement of the minimum confidence, merging the content node and a preposed content node corresponding to the postposed content node sequence to obtain a new preposed content node, determining the postposed content node sequence of the new preposed content node, and performing recursive mining on the postposed content node sequence corresponding to the new preposed content node to obtain all target preposed content nodes meeting the requirement of the minimum confidence and corresponding confidences;
the data returned by recursion is all currently obtained target preposed content nodes meeting the minimum confidence requirement and corresponding confidences, all target preposed content nodes meeting the minimum confidence requirement and corresponding confidences are obtained, the target preposed content nodes are used as verification threat attribute features of the verification element sequence, and the confidences of all target preposed content nodes in the postpositional content node sequence are used as threat attribute confidences corresponding to the verification threat attribute features.
In a possible implementation manner of the first aspect, the step of obtaining authentication parameter service information according to the tag transfer parameter and the update change parameter of the authentication environment update element includes:
Performing instantiation processing according to the label transfer parameter and the update change parameter of the verification environment update element to generate a verification parameter service object;
and converting the verification parameter service object to obtain verification parameter service information.
In a possible implementation manner of the first aspect, the step of performing instantiation processing according to the label transfer parameter and the update change parameter of the verification environment update element to generate a verification parameter service object includes:
protocol service parameters of a plurality of label transfer nodes are obtained from label transfer parameters of the verification environment updating element, and corresponding protocol service vectors are respectively extracted from the protocol service parameters, wherein the protocol service vectors are used for expressing protocol service behavior characteristics corresponding to the label transfer nodes corresponding to the protocol service parameters;
determining a first service matching node sequence of an associated protocol transfer loop between each at least two associated protocol service parameters and the updated change parameter according to the extracted protocol service vector; wherein the associated protocol transfer ring comprises a plurality of associated protocol transfer ring nodes;
selecting a first initial state transition characteristic sequence; the state transition feature group corresponding to the first initial state transition feature sequence comprises a preset first state transition object, transition associated features to be fused and a service transition object;
For a first service matching node sequence corresponding to each associated protocol transfer ring node, fusing a first state transition object of the first initial state transition characteristic and the transition associated characteristic of each level to obtain a plurality of fusion packets;
mapping the first service matching node sequence according to the plurality of fused packets respectively to obtain instantiation objects of various different fused packets; wherein, the input parameter of the transition correlation characteristic in the fusion packet is a protocol service vector of a protocol service parameter corresponding to the first service matching node sequence, and the output parameter of the first state transition object is a protocol service interaction vector of the protocol service parameter corresponding to the first service matching node sequence;
determining a verification parameter service set between each protocol service parameter and the update change parameter according to the instantiation object and a plurality of service transition objects of different levels of the first initial state transition characteristic sequence, wherein the verification parameter service set covers a plurality of target verification service parameters;
and generating a final verification parameter service object according to the verification parameter service object corresponding to each coverage target verification service parameter in the verification parameter service set.
In a possible implementation manner of the first aspect, the converting the authentication parameter service object to obtain the authentication parameter service information includes:
acquiring a verification parameter matrix, a conversion state matrix and a state space matrix for conversion;
obtaining label transfer parameters of the verification labels corresponding to the verification parameter fields in the verification parameter service object;
carrying out verification parameter transformation, transformation state transformation and state space transformation processing on the label transfer parameters in sequence through the verification parameter matrix, the transformation state matrix and the state space matrix so as to convert negative relation label transfer parameters in the label transfer parameters from an initial label transfer parameter system to a service label transfer parameter system, and obtain transaction certificate label transfer parameters corresponding to all verification parameter fields after converting longitudinal label transfer parameters in the label transfer parameters from the initial label transfer parameter system to the service label transfer parameter system, wherein positive relation label transfer parameters in the transaction certificate label transfer parameters corresponding to the verification parameter fields are equal;
and generating verification parameter service information based on the negative relation label transfer parameter and the longitudinal label transfer parameter in the transaction certificate label transfer parameters corresponding to the verification parameter fields and the field parameters corresponding to the verification parameter fields.
In a possible implementation manner of the first aspect, after the obtaining the authentication parameter service information, the method further includes:
performing service division on the verification parameter service information to obtain a verification parameter service grid;
reading field parameters corresponding to edges corresponding to verification parameter fields in the verification parameter service grid;
the step of performing fast fourier transform on the field parameter of the verification parameter field in the verification parameter service information to obtain a field indication value sequence corresponding to the verification parameter field includes:
and carrying out fast Fourier transform on field parameters corresponding to the edges corresponding to the verification parameter fields to obtain field marking value sequences corresponding to the verification parameter fields.
In a possible implementation manner of the first aspect, the step of performing inverse transformation on the transaction credential tag transfer parameter corresponding to the verification parameter field in the verification parameter service information to obtain the credential service tag transfer parameter corresponding to the verification parameter field includes:
acquiring an inverse state space matrix, an inverse conversion state matrix and an inverse verification parameter matrix;
acquiring transaction certificate label transfer parameters corresponding to edges corresponding to verification parameter fields in the verification parameter service grid, and performing inverse state space transformation on negative relation label transfer parameters and longitudinal label transfer parameters in the transaction certificate label transfer parameters through the inverse state space matrix to acquire the negative relation label transfer parameters and the longitudinal label transfer parameters of the edges corresponding to the verification parameter fields in an editable label transfer parameter system;
Setting a positive relation label transfer parameter as two different preset values to obtain two parameter objects in an editable label transfer parameter system;
sequentially carrying out reverse conversion state conversion and reverse verification parameter conversion on editable space label transfer parameters of the two parameter objects through the reverse conversion state matrix and the reverse verification parameter matrix to obtain two parameter objects in a voucher service label transfer parameter system;
determining an associated business migration relationship of two parameter objects in the certificate service label transfer parameter system;
and determining a corresponding parameter object of the edge corresponding to the verification parameter field in a certificate service label transfer parameter system from the associated service migration relationship, and determining the parameter change information corresponding to the parameter object as the certificate service label transfer parameter corresponding to the edge corresponding to the verification parameter field.
In a possible implementation manner of the first aspect, the step of generating a request processing update procedure according to the credential service tag transfer parameter and the field tag value sequence includes:
associating each label transfer parameter item in the certificate service label transfer parameters with a field marking value matched with each label transfer parameter item in the field marking value sequence to obtain a plurality of association results;
And analyzing the plurality of association results into corresponding request processing updating rules, updating the request processing updating rules into the current request processing process, and generating a request processing updating process.
In a second aspect, an embodiment of the present invention further provides a data request processing apparatus based on a block chain, which is applied to a block chain technology service platform, where the block chain technology service platform is in communication connection with a plurality of block chain nodes, and the apparatus includes:
a first obtaining module, configured to obtain a processing instruction of a corresponding payment verification request generated for payment verification environment information sent by the blockchain node, and obtain corresponding request processing information after processing the payment verification request according to the processing instruction, where the request processing information is used to indicate a processing reason corresponding to the current request processing;
a second obtaining module, configured to obtain, according to payment verification environment update information of the payment terminal device corresponding to the request processing information for the request processing information, a verification environment update element sequence, where each verification environment update element in the verification environment update element sequence includes an update change parameter of the verification environment update element and a tag transfer parameter used for describing a verification tag to which the verification environment update element belongs;
The conversion module is used for obtaining verification parameter service information according to the label transfer parameter and the updating change parameter of the verification environment updating element, and performing fast Fourier transform on the field parameter of the verification parameter field in the verification parameter service information to obtain a field marking value sequence corresponding to the verification parameter field;
and the generation module is used for carrying out reverse conversion on transaction certificate label transfer parameters corresponding to the verification parameter fields in the verification parameter service information to obtain certificate service label transfer parameters corresponding to the verification parameter fields, and generating a request processing updating process according to the certificate service label transfer parameters and the field indication value sequence so as to continuously process the corresponding payment verification request generated by the payment verification environment information based on the request processing updating process.
In a third aspect, an embodiment of the present invention further provides a data request processing system based on a blockchain, where the data request processing system based on a blockchain includes a blockchain technology service platform and a plurality of blockchain nodes communicatively connected to the blockchain technology service platform;
the block chain technology service platform is used for acquiring a processing instruction of a corresponding payment verification request generated by payment verification environment information sent by a block chain node, and acquiring corresponding request processing information after processing the payment verification request according to the processing instruction, wherein the request processing information is used for representing a processing reason corresponding to the current request processing;
The block chain technology service platform is used for acquiring a verification environment updating element sequence according to payment verification environment updating information of payment terminal equipment corresponding to the request processing information aiming at the request processing information, wherein each verification environment updating element in the verification environment updating element sequence comprises an updating change parameter of the verification environment updating element and a label transfer parameter for describing a verification label to which the verification environment updating element belongs;
the block chain technology service platform is used for obtaining verification parameter service information according to the label transfer parameter and the updating change parameter of the verification environment updating element, and performing fast Fourier transform on the field parameter of the verification parameter field in the verification parameter service information to obtain a field marking value sequence corresponding to the verification parameter field;
the block chain technology service platform is used for carrying out reverse conversion on transaction certificate label transfer parameters corresponding to verification parameter fields in the verification parameter service information, obtaining certificate service label transfer parameters corresponding to the verification parameter fields, generating a request processing updating process according to the certificate service label transfer parameters and the field indication value sequence, and continuously processing corresponding payment verification requests generated by the payment verification environment information based on the request processing updating process.
In a fourth aspect, an embodiment of the present invention further provides a blockchain technology service platform, where the blockchain technology service platform includes a processor, a machine-readable storage medium, and a network interface, where the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is configured to be connected in communication with at least one blockchain link point, the machine-readable storage medium is configured to store a program, an instruction, or code, and the processor is configured to execute the program, the instruction, or the code in the machine-readable storage medium to perform the method for processing a data request based on a blockchain in the first aspect or any one of possible designs of the first aspect.
In a fifth aspect, an embodiment of the present invention provides a computer-readable storage medium, where instructions are stored, and when executed, cause a computer to perform the method for processing a data request based on a blockchain in the first aspect or any one of the possible designs of the first aspect.
In any of the above aspects, after generating the verification parameter service information according to the tag transfer parameter and the update change parameter of the verification environment update element, mapping field parameters of an authentication parameter field in the authentication parameter service information into a field designation value sequence, and the transaction voucher label transfer parameter is inversely converted into a voucher service label transfer parameter, a request processing updating process is generated by combining the voucher service label transfer parameter and the field marking value sequence, the follow-up request processing updating verification operation is carried out by considering that the payment voucher service is suitable for the label transfer process after the payment verification scene is updated and the field marking value sequence related to the verification parameter service information, thereby being convenient for flexibly adapting to the last payment verification environment when the payment verification environment changes, and further improve the scene practicality of mobile payment when improving the security of mobile payment.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic application scenario diagram of a data request processing system based on a block chain according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a block chain-based data request processing method according to an embodiment of the present invention;
fig. 3 is a functional block diagram of a data request processing apparatus based on a block chain according to an embodiment of the present invention;
fig. 4 is a block diagram schematically illustrating a structure of a blockchain technology service platform for implementing the above method for processing a data request based on a blockchain according to an embodiment of the present invention.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only examples or embodiments of the present description, and that for a person skilled in the art, the present description can also be applied to other similar scenarios on the basis of these drawings without inventive effort. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used in this specification is a method for distinguishing different components, elements, parts or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Fig. 1 is an interaction diagram of a data request processing system 10 based on a block chain according to an embodiment of the present invention. The blockchain-based data request processing system 10 may include a blockchain technology service platform 100 and a blockchain link point 200 communicatively coupled to the blockchain technology service platform 100. The blockchain-based data request processing system 10 shown in fig. 1 is only one possible example, and in other possible embodiments, the blockchain-based data request processing system 10 may also include only a portion of the components shown in fig. 1 or may also include other components.
In this embodiment, the cloud block chain technology service platform 100 and the block chain node 200 of the internet of things in the block chain-based data request processing system 10 may execute the block chain-based data request processing method described in the following method embodiment in a matching manner, and the detailed description of the method embodiment below may be referred to in the specific steps of the block chain technology service platform 100 and the block chain node 200.
To solve the technical problem in the foregoing background art, fig. 2 is a flowchart illustrating a data request processing method based on a block chain according to an embodiment of the present invention, where the data request processing method based on a block chain according to the present embodiment may be executed by the block chain technology service platform 100 shown in fig. 1, and the data request processing method based on a block chain is described in detail below.
Step S110 is to obtain a processing instruction of the payment verification request generated according to the payment verification environment information sent by the blockchain node, and obtain corresponding request processing information after processing the payment verification request according to the processing instruction.
Step S120, obtaining the verification environment update element sequence according to the payment verification environment update information of the payment terminal device corresponding to the request processing information for the request processing information.
Step S130, according to the label transfer parameter and the updating change parameter of the updating element of the verification environment, obtaining verification parameter service information, and performing fast Fourier transform on the field parameter of the verification parameter field in the verification parameter service information to obtain a field marking value sequence corresponding to the verification parameter field.
Step S140, the transaction voucher label transfer parameter corresponding to the verification parameter field in the verification parameter service information is reversely converted to obtain the voucher service label transfer parameter corresponding to the verification parameter field, and a request processing updating process is generated according to the voucher service label transfer parameter and the field marking value sequence, so that the corresponding payment verification request generated by the payment verification environment information is continuously processed based on the request processing updating process.
In this embodiment, the request processing information may be used to indicate a processing reason corresponding to the current request processing, for example, when the payment verification request is intercepted, may be used to indicate a reason of the current interception, for example, a reason of intercepting a certain failed verification environment element.
In this embodiment, when the payment terminal device obtains the request processing information, the user may be prompted to switch the current payment verification environment, so as to change to a payment verification environment with higher security, and in this process, the payment terminal device generates a payment verification environment update after the switching, so as to obtain a verification environment update element sequence, where each verification environment update element in the verification environment update element sequence includes an update change parameter of the verification environment update element and a tag transfer parameter for describing a verification tag to which the verification environment update element belongs. For example, the update change parameter may be used to indicate a configuration parameter of the verification environment update element after the update change, and the tag transition parameter may be used to indicate a configuration parameter of the verification tag to which the verification environment update element belongs after the transition.
In this embodiment, the transaction certificate label transfer parameter may be used to indicate a transfer parameter of a security certificate for verification of parameters related to the transaction certificate in a label transfer process, a field parameter of a verification parameter field in the verification parameter service information may be used to indicate an arrangement condition of field parameters in a payment verification process, and thus, after performing fast fourier transform, a field indication value sequence corresponding to the verification parameter field may be obtained.
Based on the above design, after the verification parameter service information is generated according to the label transfer parameter and the update change parameter of the verification environment update element, mapping field parameters of an authentication parameter field in the authentication parameter service information into a field designation value sequence, and the transaction voucher label transfer parameter is inversely converted into a voucher service label transfer parameter, a request processing updating process is generated by combining the voucher service label transfer parameter and the field marking value sequence, the follow-up request processing updating verification operation is carried out by considering that the payment voucher service is suitable for the label transfer process after the payment verification scene is updated and the field marking value sequence related to the verification parameter service information, thereby being convenient for flexibly adapting to the last payment verification environment when the payment verification environment changes, and further improve the scene practicality of mobile payment when improving the security of mobile payment.
In one possible implementation, for step S110, in order to effectively improve the security of mobile payment under various payment verification environments, the following exemplary sub-steps may be implemented, which are described in detail below.
And step S111, acquiring at least one verification element sequence from the payment verification environment information sent by the block nodes.
And step S112, carrying out verification threat attribute mining on the verification element sequences based on the configuration parameters of the tags under the verification tags to obtain verification threat attribute characteristics and corresponding threat attribute confidence degrees of the verification element sequences.
And S113, determining attack tracking parameters of the corresponding verification tags of each verification element object according to the verification threat attribute characteristics and the corresponding threat attribute confidence degrees.
Step S114, according to the attack tracking parameters of the verification tags corresponding to the verification element objects, determining the attack path graphical object corresponding to each verification tag, and according to the attack path graphical object corresponding to each verification tag, generating a processing instruction of the payment verification request corresponding to the payment verification environment information.
In this embodiment, each verification element object in each verification element sequence belongs to the same verification tag, and each verification element object corresponds to a tag configuration parameter under the verification tag to which it belongs. For example, it is possible to acquire authentication element objects of which authentication tags belong to the same authentication tag from the payment authentication environment information transmitted from the block node, and determine the authentication element object belonging to each authentication tag as a corresponding authentication element sequence.
For example, when the blockchain node performs verification of the payment request, it needs to upload payment verification environment information to the big data platform first, where the payment verification environment information may include a plurality of verification element objects, each verification element object may refer to a related security environment field that needs to complete verification, and these security environment fields may be used to represent different environment attributes in the payment verification environment. Similarly, for different verification element objects, the types of the corresponding security environment fields are different, and therefore, the verification element objects may correspond to a certain verification tag one to one, that is, the verification tag may be used to represent the types of the security environment fields.
In this embodiment, the verification threat attribute may be used to indicate an attribute field that may have a verification threat capability, the verification threat attribute feature may be used to indicate a field feature sequence corresponding to the verification threat attribute, and the corresponding threat attribute confidence may be used to indicate a degree that the field feature sequence corresponding to the verification threat attribute has the verification threat capability.
In this embodiment, the attack tracking parameter may be used to represent tracking process information of a security verification attack behavior that may be generated, so that an attack path graphical object corresponding to each verification tag may be determined according to the attack tracking parameter of the verification tag to which each verification element object corresponds, and the attack path graphical objects are used to represent key content in the attack tracking process, so as to generate a processing instruction of the payment verification request corresponding to the payment verification environment information according to the attack path graphical object corresponding to each verification tag.
Based on the design, the verification threat attribute characteristics of each verification element sequence are extracted in a verification threat attribute mining mode, and the attack tracking parameters of the verification tags corresponding to the verification element objects are determined based on the threat attribute confidence, so that the configuration parameters of the tags are converted into effective payment security identification bases. Therefore, according to the attack tracking parameters of the verification tags corresponding to the verification element objects, the attack path graphical object corresponding to each verification tag is determined, and the processing instruction of the payment verification request corresponding to the payment verification environment information is generated according to the attack path graphical object corresponding to each verification tag, so that the response strategy for each payment verification request is determined, and the mobile payment safety under various payment verification environments is effectively improved.
In one possible implementation, step S112 may be implemented by the following exemplary sub-steps, which are described in detail below.
In the sub-step S1121, for each verification element sequence, traversing the verification element object in the verification element sequence, extracting the verification element content comparing the configuration parameters of each tag under the verification tag to which the verification element sequence belongs from the verification element object, and determining the content related data corresponding to the verification element sequence according to the extracted verification element content.
In the substep S1122, set content features included in the content of each verification element in the content-related data are removed, content nodes of the content of the verification element with the removed set content features are split to obtain first content-related data, and the confidence of each content node is determined according to the number of existing lines of the content nodes in the content of the verification element included in the first content-related data.
And a substep S1123 of removing content nodes with the confidence degree smaller than a preset confidence degree threshold value in the first content related data to obtain second content related data, taking the content nodes with the confidence degree not smaller than the preset confidence degree threshold value as pre-content nodes to obtain a pre-content node sequence, and determining a post-content node sequence which corresponds to each pre-content node and consists of content nodes connected behind the pre-content node according to the occurrence condition of each pre-content node in the pre-content node sequence in the second content related data.
And a substep S1124 of determining whether the post content node sequence is empty, recursively returning if the post content node sequence is empty, and counting the confidence level of each content node in the post content node sequence if the post content node sequence is not empty, and determining whether the confidence level of each content node meets the minimum confidence level requirement.
And in the substep S1125, if the confidence level of the content node does not meet the requirement of the minimum confidence level, recursively returning, if the confidence level of the content node meets the requirement of the minimum confidence level, merging the content node and a preposed content node corresponding to the postposed content node sequence to obtain a new preposed content node, determining the postposed content node sequence of the new preposed content node, and performing recursive mining on the postposed content node sequence corresponding to the new preposed content node to obtain all target preposed content nodes meeting the requirement of the minimum confidence level and corresponding confidence levels.
For example, the recursively returned data is all currently obtained target pre-content nodes meeting the minimum confidence requirement and corresponding confidences, all target pre-content nodes meeting the minimum confidence requirement and corresponding confidences are obtained, the target pre-content nodes are used as verification threat attribute features of the verification element sequence, and the confidences of the target pre-content nodes in the post-content node sequence are used as threat attribute confidences corresponding to the verification threat attribute features.
In a possible implementation manner, for step S113, in order to accurately and comprehensively determine an editable object having a tampering behavior, thereby improving the coverage rate and accuracy of detecting the tampering behavior, and effectively determining an attack tracking parameter of the authentication tag to which each of the authentication element objects corresponds, the following exemplary sub-steps may be implemented. The detailed description is as follows.
And a substep S1131, screening candidate verification threat attribute features larger than a preset threat attribute confidence degree from the verification threat attribute features according to the verification threat attribute features and the corresponding threat attribute confidence degrees, so as to obtain candidate verification threat attribute features.
And a sub-step S1132, obtaining a first tampering suspected behavior list corresponding to the first attribute feature node and a second tampering suspected behavior list corresponding to the second attribute feature node on the candidate verification threat attribute feature.
For example, the first list of tampering suspected behaviors includes a plurality of change behaviors of the first attribute feature node to change the associated command line in the candidate verification threat attribute feature, the second list of tampering suspected behaviors includes a plurality of change behaviors of the second attribute feature node to change the associated command line in the candidate verification threat attribute feature, and each change behavior includes a plurality of change behavior flow nodes.
And a substep S1133, based on the preset change behavior category, clustering the multiple change behaviors in the first tampering suspected behavior list to obtain a clustered first tampering suspected behavior list. The preset change behavior category belongs to types corresponding to the plurality of change behavior flow nodes.
In the substep S1134, the modified behavior process nodes corresponding to each preset modified behavior category in the preset modified behavior category sequence in the clustered first tampered suspected behavior list are combined into a first initial modified behavior sequence.
And a substep S1135, performing deduplication on the first initial modified behavior sequence to obtain a first modified behavior sequence, thereby obtaining a first modified behavior sequence corresponding to a preset modified behavior category sequence, and combining each modified behavior flow node in the first modified behavior sequence into a first modified behavior flow node sequence corresponding to the first attribute feature node.
For example, the first modified behavior flow node sequence corresponds to a preset modified behavior category sequence, and the preset modified behavior category type is a sequence formed by various modified behavior categories for tamper behavior detection.
In the substep S1136, extracting, from the second tampered suspected behavior list, each modified behavior flow node corresponding to each preset modified behavior category in the preset modified behavior category sequence, and combining the extracted modified behavior flow nodes into a second modified behavior flow node sequence corresponding to the second attribute feature node.
For example, the second modified behavior flow node sequence corresponds to a preset modified behavior category sequence, and the first modified behavior flow node sequence and the second modified behavior flow node sequence are sequences formed by modified behavior flow nodes extracted from the corresponding tampered suspected behavior list.
And a substep S1137, determining the number of the same modified behavior process nodes between the first modified behavior process node sequence and the second modified behavior process node sequence to obtain a common attribute value, and determining that the first attribute feature node and the second attribute feature node are tampering objects when the common attribute value is greater than a preset co-occurrence attribute threshold value.
In the substep S1138, any two editable objects in the candidate verification threat attribute feature are used as the first attribute feature node and the second attribute feature node to perform tampering behavior detection, and a tampering object sequence with tampering behavior in the candidate verification threat attribute feature is obtained until the detection between the editable objects in the candidate verification threat attribute feature is completed.
And a substep S1139, taking the number of editable objects in the tampered object sequence as the number of target tampered objects, taking the number of editable objects corresponding to the candidate verification threat attribute characteristics as the number of target total editable objects, calculating the ratio of the number of target tampered objects to the number of target total editable objects, obtaining an attack value corresponding to the candidate verification threat attribute characteristics, and when the attack value is greater than a preset attack value threshold, determining the scene parameter corresponding to the candidate verification threat attribute characteristics as the attack tracking parameter of the verification label corresponding to each verification element object.
Based on the steps, when the editable object with the tampering behavior is changed, the flow nodes of the same change behavior exist among the corresponding change behaviors; therefore, when tampering behavior detection is carried out, a tampering suspected behavior list consisting of a plurality of modification behaviors of an editable object is obtained, whether tampering behaviors exist in the editable object is determined according to whether common attribute conditions exist among modification behavior process node sequences corresponding to operation sequences among the editable objects, and whether the editable object is a tampering object is further determined.
In a possible implementation manner, further with respect to step S114, in the process of determining the attack path graphical object corresponding to each verification tag according to the attack tracking parameter of the verification tag to which each verification element object corresponds, the following exemplary sub-steps may be implemented, which are described in detail below.
In the substep S1141, the corresponding attack tracking detection object and the initial tag information of the attack tracking detection object are obtained from the attack tracking parameters of the verification tag to which each verification element object corresponds.
And a substep S1142 of predicting the attack tracking detection object according to the pre-trained attack label classification model to obtain predicted label information.
And a substep S1143 of comparing the initial label information with the predicted label information to obtain label difference information.
In a possible implementation manner, still referring to step S114, in the process of generating a processing instruction of a payment verification request corresponding to the payment verification environment information according to the attack path graphical object corresponding to each verification tag, the processing instruction may be implemented by the following exemplary sub-steps, which are described in detail below.
And a substep S1145 of obtaining attacked verification information and interactive verification information to be associated with the attacked verification information and past interactive verification information from the attack path graphical object corresponding to each verification tag, wherein the past interactive verification information comprises interactive verification information of at least one historical payment process.
And a substep S1146 of inputting the information to be interactively verified and the past interactive verification information into a machine learning model, extracting the description vector of the information to be interactively verified through the machine learning model to obtain a first description vector representation, and extracting the description vector of each past interactive verification information to obtain a second description vector representation.
And a substep S1147 of merging the vectors in the first description vector representation to obtain a first verification logic vector for representing the verification logic of the information to be interacted, and merging the vectors in the second description vector representation to obtain a second verification logic vector for representing the verification logic of the past interactive verification information.
And a substep S1148 of calculating the similarity between the first verification logic vector and each second verification logic vector, and taking the calculated similarity as the similarity between the to-be-interacted verification information and the past interacted verification information.
And a substep S1149 of determining the calculated similarity as a corresponding index contribution degree when the index corresponding to the information to be interactively verified contributes past interactive verification information. The index contribution degree is used for measuring the degree of the interactive verification information to be interacted depending on the past interactive verification information.
And a substep S11491 of calculating feedback verification information of the to-be-interacted verification information to the attacked verification information based on the first description vector representation and the third description vector representation of the attacked verification information, and operating the feedback verification information and the index contribution degree to obtain feedback content information of the to-be-interacted verification information and a feedback region of past interaction verification information in the attacked verification information of the attacked verification information.
And a substep S11492 of determining, according to the feedback content information and the feedback region corresponding to the index contribution condition, processing instruction information corresponding to the feedback region in the feedback content information, and generating a processing instruction of the payment verification request corresponding to the payment verification environment information according to the extracted processing instruction information.
In this way, the deep recognition of the processing instruction feedback is further performed through the recognition mode of the index contribution, so that the processing instruction information corresponding to the feedback area is determined in the feedback content information, and the processing instruction of the payment verification request corresponding to the payment verification environment information is generated according to the extracted processing instruction information. For example, when the feedback content information includes a failed feedback result, the corresponding processing instruction may indicate that a payment verification request corresponding to the payment verification environment information is intercepted.
In one possible implementation manner, for step S130, in the process of obtaining the authentication parameter service information according to the tag transition parameter and the update change parameter of the authentication environment update element, the following exemplary sub-steps may be implemented, which are described in detail below.
And a substep S131, performing instantiation processing according to the label transfer parameter and the update change parameter of the verification environment update element, and generating a verification parameter service object.
And a substep S133, performing conversion processing on the verification parameter service object to obtain verification parameter service information.
Exemplarily, in the sub-step S131, it can be realized by the following exemplary embodiments, which are described as follows:
(1) protocol service parameters of a plurality of label transfer nodes are obtained from label transfer parameters of verification environment updating elements, and corresponding protocol service vectors are respectively extracted from the plurality of protocol service parameters, wherein the protocol service vectors are used for expressing protocol service behavior characteristics corresponding to the label transfer nodes corresponding to the protocol service parameters.
(1) And determining a first service matching node sequence of the associated protocol transfer circle between each at least two associated protocol service parameters and the updated change parameter according to the extracted protocol service vector.
For example, an associated protocol transfer circle includes a plurality of associated protocol transfer circle nodes.
(2) And selecting a first initial state transition characteristic sequence.
For example, the state transition feature group corresponding to the first initial state transition feature sequence includes a preset first state transition object, and a transition associated feature and a service transition object to be fused.
(3) And for the first service matching node sequence corresponding to each associated protocol transfer ring node, fusing a first state transition object of the first initial state transition characteristic and the transition associated characteristic of each level to obtain a plurality of fusion groups.
(4) And mapping the first service matching node sequence according to the plurality of fused packets respectively to obtain the instantiation objects of various different fused packets.
For example, the input parameter of the transition correlation characteristic in the fusion packet is a protocol service vector of the protocol service parameter corresponding to the first service matching node sequence, and the output parameter of the first state transition object is a protocol service interaction vector of the protocol service parameter corresponding to the first service matching node sequence.
(5) And determining a verification parameter service set between each protocol service parameter and the update change parameter according to the instantiation object and a plurality of service transition objects of different levels of the first initial state transition characteristic sequence, wherein the verification parameter service set covers a plurality of target verification service parameters.
(6) And generating a final verification parameter service object according to the verification parameter service object corresponding to each coverage target verification service parameter in the verification parameter service set.
Exemplarily, in the sub-step S132, it can be realized by the following exemplary embodiments, which are described as follows:
(1) and acquiring a verification parameter matrix, a conversion state matrix and a state space matrix for conversion.
(2) And obtaining label transfer parameters of the verification labels corresponding to the verification parameter fields in the verification parameter service object.
(3) And sequentially carrying out verification parameter transformation, conversion state transformation and state space transformation processing on the label transfer parameters through a verification parameter matrix, a conversion state matrix and a state space matrix so as to convert the negative relation label transfer parameters in the label transfer parameters from an initial label transfer parameter system to a service label transfer parameter system, and after converting the longitudinal label transfer parameters in the label transfer parameters from the initial label transfer parameter system to the service label transfer parameter system, obtaining the transaction certificate label transfer parameters corresponding to all verification parameter fields, wherein the positive relation label transfer parameters in the transaction certificate label transfer parameters corresponding to the verification parameter fields are equal.
(4) And generating verification parameter service information based on the negative relation label transfer parameter and the longitudinal label transfer parameter in the transaction certificate label transfer parameters corresponding to the verification parameter fields and the field parameters corresponding to the verification parameter fields.
In a possible implementation manner, after obtaining the verification parameter service information, the embodiment may specifically perform service division on the verification parameter service information to obtain a verification parameter service grid, and then read field parameters corresponding to edges corresponding to verification parameter fields in the verification parameter service grid, so in step S130, in the process of performing fast fourier transform on the field parameters of the verification parameter fields in the verification parameter service information to obtain field indication value sequences corresponding to the verification parameter fields, the field parameters corresponding to the edges corresponding to the verification parameter fields may be performed fast fourier transform to obtain field indication value sequences corresponding to the verification parameter fields.
Thus, in step S140, it can be realized by the following exemplary substeps, which are described in detail below.
In the substep S141, an inverse state space matrix, an inverse transition state matrix, and an inverse verification parameter matrix are obtained.
And the substep S142, obtaining the transaction certificate label transfer parameter corresponding to the side corresponding to the verification parameter field in the verification parameter service grid, and performing inverse state space transformation on the negative relation label transfer parameter and the longitudinal label transfer parameter in the transaction certificate label transfer parameter through the inverse state space matrix to obtain the negative relation label transfer parameter and the longitudinal label transfer parameter of the side corresponding to the verification parameter field in the editable label transfer parameter system.
And a substep S143, setting the positive relationship label transfer parameter to two different preset values, and obtaining two parameter objects in the editable label transfer parameter system.
And a substep S144, sequentially performing inverse transformation state transformation and inverse verification parameter transformation on editable space label transfer parameters of the two parameter objects through the inverse transformation state matrix and the inverse verification parameter matrix to obtain two parameter objects in the voucher service label transfer parameter system.
And a substep S145, determining the associated business migration relationship of the two parameter objects in the credential service label transfer parameter system.
And a substep S146, determining a corresponding parameter object of the edge corresponding to the verification parameter field in the certificate service label transfer parameter system from the associated service migration relationship, and determining the parameter change information corresponding to the parameter object as the certificate service label transfer parameter corresponding to the edge corresponding to the verification parameter field.
Therefore, the accuracy of the voucher service label transfer parameter can be improved by determining the voucher service label transfer parameter in consideration of the positive relation label transfer parameter and the negative relation label transfer parameter.
Further, in step S140, in the process of generating the request processing update process according to the credential service label transfer parameter and the field marking value sequence, the following exemplary sub-steps can be further implemented, which are described in detail as follows:
and a substep S141, associating each label transfer parameter item in the voucher service label transfer parameter with a field marking value matched with each label transfer parameter item in the field marking value sequence to obtain a plurality of association results.
And a substep S142, analyzing the plurality of association results into corresponding request processing update rules, and updating the request processing update rules into the current request processing process to generate a request processing update process.
Therefore, subsequent request processing is carried out through the corresponding request processing updating rules analyzed by the plurality of correlation results, the payment verification environment can be flexibly adapted to the last payment verification environment when the payment verification environment changes, and the scene practicability of mobile payment is further improved while the safety of the mobile payment is improved.
Fig. 3 is a schematic functional module diagram of a data request processing device 300 based on a block chain according to an embodiment of the present invention, and this embodiment may divide the functional modules of the data request processing device 300 based on the block chain according to a method embodiment executed by the service platform 100 based on the block chain, that is, the following functional modules corresponding to the data request processing device 300 based on the block chain may be used to execute each method embodiment executed by the service platform 100 based on the block chain. The device 300 for processing a data request based on a block chain may include a first obtaining module 310, a second obtaining module 320, a converting module 330, and a generating module 340, where functions of the functional modules of the device 300 for processing a data request based on a block chain are described in detail below.
The first obtaining module 310 is configured to obtain a processing instruction of a corresponding payment verification request generated according to the payment verification environment information sent by the blockchain node, and obtain corresponding request processing information after processing the payment verification request according to the processing instruction, where the request processing information is used to indicate a processing reason corresponding to the current request processing. The first obtaining module 310 may be configured to perform the step S110, and for a detailed implementation of the first obtaining module 310, reference may be made to the detailed description of the step S110.
The second obtaining module 320 is configured to obtain, according to the payment verification environment update information of the payment terminal device corresponding to the request processing information for the request processing information, a verification environment update element sequence, where each verification environment update element in the verification environment update element sequence includes an update change parameter of the verification environment update element and a tag transfer parameter for describing a verification tag to which the verification environment update element belongs. The second obtaining module 320 may be configured to perform the step S120, and for a detailed implementation of the second obtaining module 320, reference may be made to the detailed description of the step S120.
The conversion module 330 is configured to obtain verification parameter service information according to the tag transfer parameter and the update change parameter of the verification environment update element, and perform fast fourier transform on the field parameter of the verification parameter field in the verification parameter service information to obtain a field indication value sequence corresponding to the verification parameter field. The converting module 330 may be configured to perform the step S130, and the detailed implementation of the converting module 330 may refer to the detailed description of the step S130.
The generating module 340 is configured to perform inverse transformation on the transaction credential tag transfer parameter corresponding to the verification parameter field in the verification parameter service information, obtain the credential service tag transfer parameter corresponding to the verification parameter field, and generate a request processing update process according to the credential service tag transfer parameter and the field indication value sequence, so as to continue to process the corresponding payment verification request generated by the payment verification environment information based on the request processing update process. The generating module 340 may be configured to execute the step S140, and the detailed implementation of the generating module 340 may refer to the detailed description of the step S140.
It should be noted that the division of the modules of the above apparatus is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the first obtaining module 310 may be a separate processing element, or may be integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and a processing element of the apparatus calls and executes the functions of the first obtaining module 310. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Fig. 4 is a schematic diagram illustrating a hardware structure of a blockchain technology service platform 100 for implementing the above method for processing a data request based on a blockchain according to an embodiment of the present invention, where as shown in fig. 4, the blockchain technology service platform 100 may include a processor 110, a machine-readable storage medium 120, a bus 130, and a transceiver 140.
In a specific implementation process, at least one processor 110 executes computer-executable instructions stored in the machine-readable storage medium 120 (for example, the first obtaining module 310, the second obtaining module 320, the converting module 330, and the generating module 340 included in the device 300 for processing a data request based on a blockchain shown in fig. 3), so that the processor 110 may execute the method for processing a data request based on a blockchain according to the above method embodiment, where the processor 110, the machine-readable storage medium 120, and the transceiver 140 are connected through the bus 130, and the processor 110 may be configured to control a transceiving action of the transceiver 140, so as to perform data transceiving with the aforementioned blockchain node 200.
For a specific implementation process of the processor 110, reference may be made to the above-mentioned various method embodiments executed by the block chain technology service platform 100, which implement principles and technical effects similar to each other, and details of this embodiment are not described herein again.
In the embodiment shown in fig. 4, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in a processor.
The machine-readable storage medium 120 may comprise high-speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus 130 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus 130 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, the buses in the figures of the present invention are not limited to only one bus or one type of bus.
In addition, an embodiment of the present invention further provides a readable storage medium, where the readable storage medium stores computer-executable instructions, and when a processor executes the computer-executable instructions, the method for processing a data request based on a block chain is implemented.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Such as "one possible implementation," "one possible example," and/or "exemplary" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "one possible implementation," "one possible example," and/or "exemplary" in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, certain features, structures, or characteristics may be combined as suitable in one or more embodiments of the disclosure.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or contexts, including any new and useful process, machine, product, or substance fusions or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable form of fusion. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination thereof.
Computer program code required for the operation of various portions of this specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may run entirely on the user's computer, or as a stand-alone software package on the user's computer, partly on the user's computer and partly on a remote computer or entirely on the remote computer or medical services platform. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which the elements and sequences of the process are recited in the specification, the use of alphanumeric characters, or other designations, is not intended to limit the order in which the processes and methods of the specification occur, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it should be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing healthcare platform or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.

Claims (10)

1. A data request processing method based on a block chain is applied to a block chain technology service platform which is in communication connection with a plurality of block chain nodes, and the method comprises the following steps:
acquiring a processing instruction of a corresponding payment verification request generated by the payment verification environment information sent by the blockchain node, and acquiring corresponding request processing information after processing the payment verification request according to the processing instruction, wherein the request processing information is used for representing a processing reason corresponding to the current request processing;
acquiring a verification environment updating element sequence according to payment verification environment updating information of the payment terminal equipment corresponding to the request processing information aiming at the request processing information, wherein each verification environment updating element in the verification environment updating element sequence comprises an updating change parameter of the verification environment updating element and a label transfer parameter for describing a verification label to which the verification environment updating element belongs;
obtaining verification parameter service information according to the label transfer parameters and the updating change parameters of the verification environment updating elements, and performing fast Fourier transform on field parameters of verification parameter fields in the verification parameter service information to obtain field marking value sequences corresponding to the verification parameter fields;
And performing reverse conversion on transaction certificate label transfer parameters corresponding to verification parameter fields in the verification parameter service information to obtain certificate service label transfer parameters corresponding to the verification parameter fields, and generating a request processing updating process according to the certificate service label transfer parameters and the field indication value sequence so as to continuously process a corresponding payment verification request generated by the payment verification environment information based on the request processing updating process.
2. The blockchain-based data request processing method according to claim 1, wherein the step of obtaining the processing instruction of the corresponding payment verification request generated for the payment verification environment information sent by the blockchain node includes:
acquiring at least one verification element sequence from payment verification environment information sent by the blockchain node, wherein each verification element object in each verification element sequence belongs to the same verification tag, and each verification element object corresponds to a tag configuration parameter under the verification tag to which the verification element object belongs;
performing verification threat attribute mining on the verification element sequences based on the configuration parameters of the tags under the verification tags to obtain verification threat attribute characteristics of the verification element sequences and corresponding threat attribute confidence degrees;
Determining attack tracking parameters of the verification tags corresponding to the verification element objects according to the verification threat attribute characteristics and the corresponding threat attribute confidence degrees;
and determining an attack path graphical object corresponding to each verification tag according to the attack tracking parameters of the verification tags corresponding to the verification element objects, and generating a processing instruction of the payment verification request corresponding to the payment verification environment information according to the attack path graphical object corresponding to each verification tag.
3. The blockchain-based data request processing method according to claim 2, wherein the step of mining the verification threat attributes of the verification element sequences based on the configuration parameters of the tags under the verification tags to obtain the verification threat attribute features and the corresponding threat attribute confidence degrees of the verification element sequences includes:
traversing verification element objects in the verification element sequences for each verification element sequence, extracting verification element contents for comparing configuration parameters of each tag under a verification tag to which the verification element sequence belongs from the verification element objects, and determining content related data corresponding to the verification element sequences according to the extracted verification element contents;
Removing set content characteristics contained in the content of each verification element in the content related data, splitting content nodes of the verification element content without the set content characteristics to obtain first content related data, and determining the confidence of each content node according to the number of existing lines of the content nodes in the verification element content contained in the first content related data;
removing content nodes with the confidence coefficient smaller than a preset confidence coefficient threshold value in the first content related data to obtain second content related data, taking the content nodes with the confidence coefficient not smaller than the preset confidence coefficient threshold value as pre-content nodes to obtain a pre-content node sequence, and determining a post-content node sequence which corresponds to each pre-content node and consists of content nodes connected behind the pre-content node according to the occurrence condition of each pre-content node in the pre-content node sequence in the second content related data;
judging whether the post content node sequence is empty or not, if the post content node sequence is empty, recursively returning, and if the post content node sequence is not empty, counting the confidence level of each content node in the post content node sequence, and judging whether the confidence level of each content node meets the requirement of minimum confidence level or not;
If the confidence of the content node does not meet the requirement of the minimum confidence, recursively returning, if the confidence of the content node meets the requirement of the minimum confidence, merging the content node and a preposed content node corresponding to the postposed content node sequence to obtain a new preposed content node, determining the postposed content node sequence of the new preposed content node, and performing recursive mining on the postposed content node sequence corresponding to the new preposed content node to obtain all target preposed content nodes meeting the requirement of the minimum confidence and corresponding confidences;
the data returned by recursion is all currently obtained target preposed content nodes meeting the minimum confidence requirement and corresponding confidences, all target preposed content nodes meeting the minimum confidence requirement and corresponding confidences are obtained, the target preposed content nodes are used as verification threat attribute features of the verification element sequence, and the confidences of all target preposed content nodes in the postpositional content node sequence are used as threat attribute confidences corresponding to the verification threat attribute features.
4. The blockchain-based data request processing method according to any one of claims 1 to 3, wherein the step of obtaining the authentication parameter service information according to the tag transition parameter and the update change parameter of the authentication environment update element includes:
Performing instantiation processing according to the label transfer parameter and the update change parameter of the verification environment update element to generate a verification parameter service object;
and converting the verification parameter service object to obtain verification parameter service information.
5. The blockchain-based data request processing method according to claim 4, wherein the step of performing instantiation processing according to the tag transition parameter and the update change parameter of the verification environment update element to generate a verification parameter service object includes:
protocol service parameters of a plurality of label transfer nodes are obtained from label transfer parameters of the verification environment updating element, and corresponding protocol service vectors are respectively extracted from the protocol service parameters, wherein the protocol service vectors are used for expressing protocol service behavior characteristics corresponding to the label transfer nodes corresponding to the protocol service parameters;
determining a first service matching node sequence of an associated protocol transfer loop between each at least two associated protocol service parameters and the updated change parameter according to the extracted protocol service vector; wherein the associated protocol transfer ring comprises a plurality of associated protocol transfer ring nodes;
Selecting a first initial state transition characteristic sequence; the state transition feature group corresponding to the first initial state transition feature sequence comprises a preset first state transition object, transition associated features to be fused and a service transition object;
for a first service matching node sequence corresponding to each associated protocol transfer ring node, fusing a first state transition object of the first initial state transition characteristic and the transition associated characteristic of each level to obtain a plurality of fusion packets;
mapping the first service matching node sequence according to the plurality of fused packets respectively to obtain instantiation objects of various different fused packets; wherein, the input parameter of the transition correlation characteristic in the fusion packet is a protocol service vector of a protocol service parameter corresponding to the first service matching node sequence, and the output parameter of the first state transition object is a protocol service interaction vector of the protocol service parameter corresponding to the first service matching node sequence;
determining a verification parameter service set between each protocol service parameter and the update change parameter according to the instantiation object and a plurality of service transition objects of different levels of the first initial state transition characteristic sequence, wherein the verification parameter service set covers a plurality of target verification service parameters;
And generating a final verification parameter service object according to the verification parameter service object corresponding to each coverage target verification service parameter in the verification parameter service set.
6. The blockchain-based data request processing method of claim 4, wherein converting the authentication parameter service object to obtain authentication parameter service information comprises:
acquiring a verification parameter matrix, a conversion state matrix and a state space matrix for conversion;
obtaining label transfer parameters of the verification labels corresponding to the verification parameter fields in the verification parameter service object;
carrying out verification parameter transformation, transformation state transformation and state space transformation processing on the label transfer parameters in sequence through the verification parameter matrix, the transformation state matrix and the state space matrix so as to convert negative relation label transfer parameters in the label transfer parameters from an initial label transfer parameter system to a service label transfer parameter system, and obtain transaction certificate label transfer parameters corresponding to all verification parameter fields after converting longitudinal label transfer parameters in the label transfer parameters from the initial label transfer parameter system to the service label transfer parameter system, wherein positive relation label transfer parameters in the transaction certificate label transfer parameters corresponding to the verification parameter fields are equal;
And generating verification parameter service information based on the negative relation label transfer parameter and the longitudinal label transfer parameter in the transaction certificate label transfer parameters corresponding to the verification parameter fields and the field parameters corresponding to the verification parameter fields.
7. The blockchain-based data request processing method according to claim 1, wherein after the obtaining authentication parameter service information, the method further comprises:
performing service division on the verification parameter service information to obtain a verification parameter service grid;
reading field parameters corresponding to edges corresponding to verification parameter fields in the verification parameter service grid;
the step of performing fast fourier transform on the field parameter of the verification parameter field in the verification parameter service information to obtain a field indication value sequence corresponding to the verification parameter field includes:
and carrying out fast Fourier transform on field parameters corresponding to the edges corresponding to the verification parameter fields to obtain field marking value sequences corresponding to the verification parameter fields.
8. The blockchain-based data request processing method of claim 7, wherein the step of inversely transforming the transaction credential tag transfer parameter corresponding to the authentication parameter field in the authentication parameter service information to obtain the credential service tag transfer parameter corresponding to the authentication parameter field comprises:
Acquiring an inverse state space matrix, an inverse conversion state matrix and an inverse verification parameter matrix;
acquiring transaction certificate label transfer parameters corresponding to edges corresponding to verification parameter fields in the verification parameter service grid, and performing inverse state space transformation on negative relation label transfer parameters and longitudinal label transfer parameters in the transaction certificate label transfer parameters through the inverse state space matrix to acquire the negative relation label transfer parameters and the longitudinal label transfer parameters of the edges corresponding to the verification parameter fields in an editable label transfer parameter system;
setting a positive relation label transfer parameter as two different preset values to obtain two parameter objects in an editable label transfer parameter system;
sequentially carrying out reverse conversion state conversion and reverse verification parameter conversion on editable space label transfer parameters of the two parameter objects through the reverse conversion state matrix and the reverse verification parameter matrix to obtain two parameter objects in a voucher service label transfer parameter system;
determining an associated business migration relationship of two parameter objects in the certificate service label transfer parameter system;
and determining a corresponding parameter object of the edge corresponding to the verification parameter field in a certificate service label transfer parameter system from the associated service migration relationship, and determining the parameter change information corresponding to the parameter object as the certificate service label transfer parameter corresponding to the edge corresponding to the verification parameter field.
9. The method according to any one of claims 1 to 8, wherein the step of generating a request processing update procedure according to the credential service tag transfer parameter and the field indication value sequence includes:
associating each label transfer parameter item in the certificate service label transfer parameters with a field marking value matched with each label transfer parameter item in the field marking value sequence to obtain a plurality of association results;
and analyzing the plurality of association results into corresponding request processing updating rules, updating the request processing updating rules into the current request processing process, and generating a request processing updating process.
10. A blockchain technology service platform, comprising a processor, a machine-readable storage medium, and a network interface, wherein the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is configured to be communicatively connected to at least one blockchain link, the machine-readable storage medium is configured to store a program, an instruction, or code, and the processor is configured to execute the program, the instruction, or the code in the machine-readable storage medium to perform the method for processing a blockchain-based data request according to any one of claims 1 to 9.
CN202010699130.4A 2020-07-20 2020-07-20 Data request processing method based on block chain and block chain technology service platform Withdrawn CN111861490A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010699130.4A CN111861490A (en) 2020-07-20 2020-07-20 Data request processing method based on block chain and block chain technology service platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010699130.4A CN111861490A (en) 2020-07-20 2020-07-20 Data request processing method based on block chain and block chain technology service platform

Publications (1)

Publication Number Publication Date
CN111861490A true CN111861490A (en) 2020-10-30

Family

ID=73001114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010699130.4A Withdrawn CN111861490A (en) 2020-07-20 2020-07-20 Data request processing method based on block chain and block chain technology service platform

Country Status (1)

Country Link
CN (1) CN111861490A (en)

Similar Documents

Publication Publication Date Title
CN111861463A (en) Intelligent information identification method based on block chain and artificial intelligence and big data platform
CN108182515B (en) Intelligent rule engine rule output method, equipment and computer readable storage medium
CN111931049B (en) Business processing method based on big data and artificial intelligence and block chain financial system
CN111917789B (en) Data processing method based on big data and Internet of things communication and cloud computing platform
CN112102959B (en) Server, data processing method, data processing device and readable storage medium
CN113052567A (en) Big data analysis method based on smart government-enterprise cloud service and big data cloud platform
CN112308627B (en) Advertisement data access method based on block chain and artificial intelligence and big data center
CN111931050B (en) Information push method based on intelligent identification and big data and block chain financial server
CN112214781B (en) Remote sensing image big data processing method and system based on block chain
CN113408897A (en) Data resource sharing method applied to big data service and big data server
CN114036531A (en) Multi-scale code measurement-based software security vulnerability detection method
CN112613072B (en) Information management method, management system and management cloud platform based on archive big data
CN112163019B (en) Trusted electronic batch record processing method based on block chain and block chain service platform
CN113472860A (en) Service resource allocation method and server under big data and digital environment
CN113468017A (en) Online service state detection method applied to block chain and service server
CN117034273A (en) Android malicious software detection method and system based on graph rolling network
CN112929386B (en) Model training method, system and platform based on artificial intelligence and anomaly recognition
CN111861490A (en) Data request processing method based on block chain and block chain technology service platform
CN111984744B (en) Information processing method based on remote communication and artificial intelligence and cloud service platform
CN112671774A (en) Cloud computing and block chain based big data analysis method and digital financial system
KR102465307B1 (en) Method for generating of whitelist and user device for perfoming the same, computer-readable storage medium and computer program
CN114356405B (en) Matching method and device of open source component function, computer equipment and storage medium
CN117972732B (en) Intelligent contract vulnerability detection method and system based on multi-feature fusion
CN112135172A (en) Weak network-based audio and video processing method and system
CN112714110A (en) Information security protection method based on cloud computing and big data and cloud service center

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20201030