CN112016911B - Information management method based on block chain digital currency finance and digital service platform - Google Patents

Information management method based on block chain digital currency finance and digital service platform Download PDF

Info

Publication number
CN112016911B
CN112016911B CN202010841203.9A CN202010841203A CN112016911B CN 112016911 B CN112016911 B CN 112016911B CN 202010841203 A CN202010841203 A CN 202010841203A CN 112016911 B CN112016911 B CN 112016911B
Authority
CN
China
Prior art keywords
information
authentication
consensus verification
block chain
distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010841203.9A
Other languages
Chinese (zh)
Other versions
CN112016911A (en
Inventor
王红根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Shengshi SongGe commercial operation management Co.,Ltd.
Original Assignee
Henan Shengshi Songge Commercial Operation Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Shengshi Songge Commercial Operation Management Co ltd filed Critical Henan Shengshi Songge Commercial Operation Management Co ltd
Priority to CN202110167734.9A priority Critical patent/CN112883112A/en
Priority to CN202110167727.9A priority patent/CN112883111A/en
Priority to CN202010841203.9A priority patent/CN112016911B/en
Publication of CN112016911A publication Critical patent/CN112016911A/en
Application granted granted Critical
Publication of CN112016911B publication Critical patent/CN112016911B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The embodiment of the application provides an information management method based on block chain digital currency finance and a digital service platform, and the information management method comprises the steps of counting target consensus verification rule information which is analyzed through security simulation, then generating an anti-intrusion performance index feature library of transaction request environment information in a current transaction configuration request, extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request, judging whether a transaction intrusion risk exists in a block chain digital currency financial terminal or not based on the anti-intrusion performance index feature library and the block chain link point queue, and setting an access interception mechanism for carrying out security protection on the block chain digital currency financial terminal according to configuration information indicated by the existing transaction intrusion risk. Therefore, the access interception mechanism of safety protection can be configured for the transaction link of the digital currency of the block chain digital currency financial terminal, so that the intrusion risk is reduced as much as possible.

Description

Information management method based on block chain digital currency finance and digital service platform
Technical Field
The application relates to the technical field of mobile internet, in particular to an information management method and a digital service platform based on block chain digital currency finance.
Background
The block chain is generally understood as a distributed account book, which is also essentially a distributed computing and storage system, different block chain nodes achieve consensus through a certain computing rule, and the consensus transaction execution result is stored in a database in the form of blocks, and a plurality of blocks form the block chain, so that the block chain can be widely applied to the field of digital currency finance, and large data growth of digital currency is realized.
In this system, the configuration of an access interception mechanism for performing security protection on the transaction link of the digital currency of the block chain digital currency financial terminal is very important, and how to reduce the intrusion risk as much as possible is a technical problem to be solved urgently.
Disclosure of Invention
In view of the above, an object of the present invention is to provide an information management method and a digital service platform based on blockchain digital currency finance, which can configure an access interception mechanism for security protection in a transaction link of digital currency of a blockchain digital currency finance terminal, so as to reduce an intrusion risk as much as possible.
According to a first aspect of the present application, there is provided an information management method based on blockchain digital currency finance, applied to a digital service platform communicatively connected to a plurality of blockchain digital currency financial terminals, the method including:
for each block chain digital currency financial terminal, determining to-be-verified block chain authentication distribution weights of a plurality of pieces of common identification authentication rule information of block chain link points used for determining an anti-intrusion performance index of the financial authentication environment information and for extracting the financial authentication environment information, and authentication rule coincidence domains among different pieces of common identification authentication rule information based on an application fingerprint authentication environment and an access digital watermark authentication environment which are configured and used for recording financial authentication environment information of the block chain digital currency financial terminal;
performing security simulation analysis on the plurality of consensus verification rule information based on the determined block chain authentication distribution weights of the plurality of consensus verification rule information and verification rule coincidence domains among different consensus verification rule information, and counting target consensus verification rule information passing the security simulation analysis; the block chain authentication distribution weight of the target consensus verification rule information is greater than the set distribution weight, and the verification rule coincidence domain between the target consensus verification rule information is smaller than the set coincidence domain range;
acquiring transaction request environment information of the block chain digital currency financial terminal in a current transaction configuration request determined based on digital currency transaction response information of the digital service platform, generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to verification process information of the transaction request environment information under each target consensus verification rule information, block chain authentication distribution weight of each target consensus verification rule information and a verification rule coincidence domain between the target consensus verification rule information, and extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request;
judging whether the block chain digital currency financial terminal has a transaction intrusion risk or not based on the anti-intrusion performance index feature library and the block chain node queue; and if so, setting an access interception mechanism for carrying out security protection on the block chain digital currency financial terminal according to configuration information indicated by the existing transaction intrusion risk.
In a possible implementation manner of the first aspect, the determining whether a transaction intrusion risk exists at the blockchain digital currency financial terminal based on the intrusion prevention performance index feature library and the blockchain node queue includes:
obtaining critical anti-intrusion performance index features in the anti-intrusion performance index feature library, wherein the critical anti-intrusion performance index features comprise anti-intrusion performance index features of critical points with performance indexes larger than set index values; equally dividing the critical anti-intrusion performance index feature into at least two index feature segments; calculating the performance index change coefficient included in each index feature segment in the at least two index feature segments in parallel; mapping each performance index change coefficient obtained by calculation into a preset value interval and calculating the weighted sum of the mapping values of each performance index change coefficient in the preset value interval;
when the weighted sum is larger than a target value, extracting a consensus verification hash value of each block link node in the block link point queue, performing fuzzy regression fusion on the extracted consensus verification hash values based on random distribution characteristics corresponding to the anti-intrusion performance index characteristic library to obtain at least two fuzzy regression fusion sequences, and calculating a hash loss value between the consensus verification hash values in each fuzzy regression fusion sequence;
when the difference value between each Hash loss value and a set loss value is smaller than a preset threshold value, selecting a fuzzy regression fusion sequence corresponding to the maximum Hash loss value as a judgment sequence, determining consensus verification Hash value distribution corresponding to the judgment sequence, and searching whether a target consensus verification Hash value distribution with the distribution similarity between the target consensus verification Hash value distribution and the consensus verification Hash value distribution larger than the set similarity exists or not from a preset database; if yes, judging that the block chain digital currency financial terminal has a transaction intrusion risk; and the distribution elements in the target consensus verification hash value distribution are elements corresponding to the chain links of the abnormal block.
In a possible implementation manner of the first aspect, the step of performing fuzzy regression fusion on the extracted multiple consensus verification hash values based on the random distribution features corresponding to the intrusion prevention performance index feature library to obtain at least two fuzzy regression fusion sequences, and calculating a hash loss value between the consensus verification hash values in each fuzzy regression fusion sequence includes:
determining the random distribution density of the random distribution characteristics, normalizing the distribution sequence of each distribution node in the distribution interval corresponding to the random distribution characteristics in the distribution interval to obtain distribution sequence information corresponding to each distribution node, performing offset processing on each distribution node by adopting the distribution sequence information to obtain an offset processing value corresponding to each distribution node, and calculating an offset updating parameter corresponding to the random distribution characteristics according to the offset processing value; the offset updating parameters are used for updating preset model parameters of a preset fuzzy regression fusion model, and the preset model parameters are fuzzy regression fusion model parameters;
extracting current model parameters of the preset fuzzy regression fusion model, and calculating the current fuzzy regression fusion deviation degree of the preset fuzzy regression fusion model according to a correlation coefficient between the current model parameters and the offset updating parameters; updating the preset fuzzy regression fusion model by adopting the offset updating parameter when the current fuzzy regression fusion deviation degree is lower than a set deviation degree;
determining a fuzzy regression fusion characteristic number based on the updated preset fuzzy regression fusion model, and judging whether the hash length of the consensus verification hash value is equal to the fuzzy regression fusion characteristic number or not; if not, adjusting the hash length of the consensus verification hash value based on the offset updating parameter so that the hash length of the consensus verification hash value is equal to the fuzzy regression fusion characteristic number;
inputting the adjusted consensus verification hash values into the updated preset fuzzy regression fusion model and obtaining at least two fuzzy regression fusion sequences output by the updated preset fuzzy regression fusion model, calculating hash deviation lengths between each consensus verification hash value in the fuzzy regression fusion sequence and other consensus verification hash values aiming at each fuzzy regression fusion sequence, screening the hash deviation lengths according to the fuzzy regression fusion weight of each consensus verification hash value in the fuzzy regression fusion sequence, and performing mean calculation on the screened hash deviation lengths to obtain hash loss values.
In a possible implementation manner of the first aspect, the step of determining, based on an applied fingerprint authentication environment and an access digital watermark authentication environment configured to record financial authentication environment information of the blockchain digital currency financial terminal, a blockchain authentication distribution weight to be verified, the block chain authentication distribution weight being used for determining an anti-intrusion performance index of the financial authentication environment information and for extracting a plurality of consensus authentication rule information of block link points of the financial authentication environment information, and an authentication rule coincidence domain between different consensus authentication rule information, includes:
listing application fingerprint authentication configuration sets used for representing authentication rules between the block chain digital currency financial terminal and the digital service platform in the application fingerprint authentication environment according to a time sequence order, listing access digital watermark authentication configuration sets used for representing authentication rules between the block chain digital currency financial terminal and other block chain digital currency financial terminals in the access digital watermark authentication environment according to a time sequence order, generating an application fingerprint authentication label page of the application fingerprint authentication environment based on the application fingerprint authentication configuration sets, and generating an access digital watermark authentication label page of the access digital watermark authentication environment based on the access digital watermark authentication configuration sets; wherein the number of first tab page objects in the application fingerprint authentication tab page is different from the number of second tab page objects in the access digital watermark authentication tab page, the first tab page object and the second tab page object having different tab dimensions;
obtaining authentication session tag distribution which is represented by a tag dimension corresponding to one of the first tag page objects in the application fingerprint authentication tag page and is used for representing the financial authentication environment information and table entry axis anchor position information of an authentication table entry of the financial authentication environment information, determining a second tag page object with the largest tag dimension in the access digital watermark authentication tag page as a target tag page object, and packaging the table entry axis anchor position information into the authentication session tag distribution according to a tag page interval between the application fingerprint authentication tag page and the access digital watermark authentication tag page so as to obtain configuration information corresponding to the table entry axis anchor position information in the authentication session tag distribution; determining the time sequence consistency weight between the application fingerprint authentication environment and the access digital watermark authentication environment according to the matching degree between the configuration information and the table entry axis anchor position information;
performing time sequence correction on the application fingerprint authentication tab page and the access digital watermark authentication tab page by adopting the time sequence consistency weight, and splicing the corrected application fingerprint authentication tab page and the corrected access digital watermark authentication tab page to obtain a third tab page object; extracting node description information corresponding to each third tab object in the third tab objects and classifying the node description information corresponding to each third tab object to obtain a first description representation and a second description representation;
determining a plurality of pieces of first consensus verification rule information to be verified for determining an anti-intrusion performance index of the financial authentication environment information based on the node description information under the first description representation, determining a plurality of pieces of second consensus verification rule information to be verified for determining a block chain node for extracting the financial authentication environment information based on the node description information under the second description representation, and screening out a plurality of pieces of third consensus verification rule information to be verified for determining the anti-intrusion performance index of the financial authentication environment information and for extracting the block chain node of the financial authentication environment information according to the first consensus verification rule information and the second consensus verification rule information; mapping the label index value corresponding to each piece of third consensus verification rule information to a preset numerical value list to obtain the block chain authentication distribution weight corresponding to each piece of third consensus verification rule information; and calculating the Hash deviation length between the information vectors of every two pieces of third consensus verification rule information, and weighting the calculated Hash deviation length to obtain the verification rule coincidence domain among the pieces of third consensus verification rule information.
In a possible implementation manner of the first aspect, the classifying the node description information corresponding to each third tab page object to obtain a first description representation and a second description representation specifically includes:
dividing the node description information corresponding to the third tab page object into a plurality of anti-intrusion performance index features according to preset description separators, calculating performance indexes for representing the performance sustainability of each anti-intrusion performance index feature, generating a performance index distribution list corresponding to the third tab page object according to the performance indexes, and performing first classification on the node description information corresponding to each third tab page object based on list clustering information of list information in the performance index distribution list to obtain a first initial classification result and a second initial classification result;
when it is determined that an information compatibility identifier exists between the node description information under the first initial classification result and the node description information under the second initial classification result, adjusting at least one node description information under the first initial classification result to be under the second initial classification result based on the determined information compatibility between the node description information under the first initial classification result and the node description information under the second initial classification result;
calculating a first information configuration coefficient of the node description information under the first initial classification result after the adjustment and a second information configuration coefficient of the node description information under the second initial classification result after the adjustment, and determining a coefficient difference value between the first information configuration coefficient and the second information configuration coefficient; judging whether the coefficient difference is larger than a set difference or not; when the coefficient difference is larger than the set difference, determining a first initial classification result after adjustment as the first description representation and determining a second initial classification result after adjustment as the second description representation; and when the coefficient difference is smaller than or equal to the set difference, continuing to adjust at least one piece of node description information under the first initial classification result to the second initial classification result, and returning to the step of executing the first information configuration coefficient of the node description information under the first initial classification result after the adjustment is completed and the second information configuration coefficient of the node description information under the second initial classification result after the adjustment is completed.
In a possible implementation manner of the first aspect, the step of performing security simulation analysis on the multiple pieces of consensus verification rule information based on the determined block chain authentication distribution weights of the multiple pieces of consensus verification rule information and verification rule overlap regions between different pieces of consensus verification rule information, and counting target consensus verification rule information that passes the security simulation analysis includes:
mapping the determined block chain authentication distribution weights of the plurality of consensus verification rule information to verification rule coincidence domains among different consensus verification rule information to generate the block chain authentication distribution domains of the plurality of consensus verification rule information;
and according to the authentication distribution elements in the block chain authentication distribution domain of the plurality of pieces of consensus verification rule information and a preset safety simulation program corresponding to each authentication distribution element, performing safety simulation analysis on the plurality of pieces of consensus verification rule information, and counting target consensus verification rule information passing the safety simulation analysis, wherein the target consensus verification rule information passing the safety simulation analysis is used for representing target consensus verification rule information meeting a safety verification passing rule of the preset safety simulation program.
In a possible implementation manner of the first aspect, the step of obtaining transaction request environment information of the blockchain digital currency financial terminal in a current transaction configuration request determined based on digital currency transaction response information of the digital service platform, generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to verification process information of the transaction request environment information under each target consensus verification rule information, a blockchain authentication distribution weight of each target consensus verification rule information, and a verification rule coincidence domain between the target consensus verification rule information, and extracting a blockchain link point queue of the transaction request environment information in the current transaction configuration request includes:
sending analog configured digital currency transaction response information to the blockchain digital currency financial terminal so that the blockchain digital currency financial terminal determines transaction request environment information in a current transaction configuration request based on the digital currency transaction response information, wherein the transaction request environment information is information formed by all transaction request environment elements which can be captured by the blockchain digital currency financial terminal in a currently openable mode;
mapping the block chain authentication distribution weight of the target consensus verification rule information to a verification rule coincidence domain among different target consensus verification rule information to generate a block chain authentication distribution domain of the target consensus verification rule information;
and generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to the verification process information of the transaction request environment information under each target consensus verification rule information and the block chain authentication distribution domain of the target consensus verification rule information, and extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request.
In a possible implementation manner of the first aspect, the application fingerprint authentication environment and the access digital watermark authentication environment for recording the financial authentication environment information of the blockchain digital currency financial terminal are determined by the following steps:
the method comprises the steps of obtaining target biological authentication certificates embedded with a security code calling program corresponding to a plurality of block chain digital currency financial terminals during biological authentication identification, carrying out access verification encryption deployment on each block chain digital currency financial terminal according to the target biological authentication certificates embedded with the security code calling program, and obtaining encryption deployment data of each block chain digital currency financial terminal, wherein the block chain digital currency financial terminals are located in different service member units in a target internet service member group, and the encryption deployment data comprises application fingerprint encryption deployment information and access digital watermark encryption deployment information of the block chain digital currency financial terminals;
acquiring terminal access authentication information uploaded by a target service terminal which performs bidirectional authentication interconnection with each service member unit, wherein the terminal access authentication information comprises application fingerprint configuration information and access digital watermark configuration information;
for each service member unit, extracting terminal access authentication information of the service member unit to obtain extraction information, and determining application fingerprint mapping information of the service member unit and access digital watermark mapping information of the service member unit based on the extraction information;
and configuring an application fingerprint authentication environment of the blockchain digital currency financial terminal in the service member unit according to the application fingerprint mapping information of the service member unit and the encrypted deployment data of the blockchain digital currency financial terminal in the service member unit, and configuring an access digital watermark authentication environment of the blockchain digital currency financial terminal in the service member unit according to the access digital watermark mapping information of the service member unit.
In a possible implementation manner of the first aspect, the determining, based on the extracted information, application fingerprint mapping information of the service member unit and access digital watermark mapping information of the service member unit includes:
determining application fingerprint mapping information of the service member unit according to first extraction information in the extraction information, wherein the first extraction information is extraction information corresponding to application fingerprint configuration information of the service member unit;
and determining the access digital watermark mapping information of the service member unit according to second extraction information in the extraction information, wherein the second extraction information is extraction information corresponding to the access digital watermark configuration information of the service member unit.
According to a second aspect of the present application, there is provided an information management apparatus for blockchain digital currency finance, which is applied to a digital service platform communicatively connected to a blockchain digital currency finance terminal, the apparatus including:
the system comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining an anti-intrusion performance index of financial authentication environment information to be verified and block chain authentication distribution weight of a plurality of pieces of consensus authentication rule information of block chain link points of the financial authentication environment information and verifying rule coincidence domains among different pieces of consensus authentication rule information based on an application fingerprint authentication environment and an access digital watermark authentication environment which are configured and used for recording financial authentication environment information of each block chain digital currency financial terminal;
the simulation analysis module is used for carrying out safety simulation analysis on the plurality of consensus verification rule information based on the determined block chain authentication distribution weights of the plurality of consensus verification rule information and the verification rule coincidence domains among different consensus verification rule information, and counting target consensus verification rule information which passes the safety simulation analysis; the block chain authentication distribution weight of the target consensus verification rule information is greater than the set distribution weight, and the verification rule coincidence domain between the target consensus verification rule information is smaller than the set coincidence domain range;
a generating module, configured to acquire transaction request environment information of the blockchain digital currency financial terminal in a current transaction configuration request determined based on digital currency transaction response information of the digital service platform, generate an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to verification process information of the transaction request environment information under each target consensus verification rule information, a blockchain authentication distribution weight of each target consensus verification rule information, and a verification rule coincidence domain between the target consensus verification rule information, and extract a blockchain link point queue of the transaction request environment information in the current transaction configuration request;
the setting module is used for judging whether the block chain digital currency financial terminal has a transaction intrusion risk or not based on the anti-intrusion performance index feature library and the block chain node queue; and if so, setting an access interception mechanism for carrying out security protection on the block chain digital currency financial terminal according to configuration information indicated by the existing transaction intrusion risk.
In a third aspect, an embodiment of the present invention further provides an information management system based on blockchain digital currency finance, where the information management system based on blockchain digital currency finance includes a digital service platform and a blockchain digital currency finance terminal communicatively connected to the digital service platform;
the digital service platform is used for determining an anti-intrusion performance index to be verified, which is used for determining the financial authentication environment information, and block chain authentication distribution weights of a plurality of pieces of consensus authentication rule information of block link points of the financial authentication environment information, and authentication rule coincidence domains among different pieces of consensus authentication rule information, based on an application fingerprint authentication environment and an access digital watermark authentication environment which are configured and used for recording financial authentication environment information of each block chain digital currency financial terminal, aiming at each block chain digital currency financial terminal;
the digital service platform is used for carrying out security simulation analysis on the plurality of pieces of consensus verification rule information based on the determined block chain authentication distribution weights of the plurality of pieces of consensus verification rule information and verification rule coincidence domains among different pieces of consensus verification rule information, and counting target consensus verification rule information which passes the security simulation analysis; the block chain authentication distribution weight of the target consensus verification rule information is greater than the set distribution weight, and the verification rule coincidence domain between the target consensus verification rule information is smaller than the set coincidence domain range;
the digital service platform is used for acquiring transaction request environment information of the block chain digital currency financial terminal in a current transaction configuration request determined based on digital currency transaction response information of the digital service platform, generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to verification process information of the transaction request environment information under each target consensus verification rule information, block chain authentication distribution weight of each target consensus verification rule information and a verification rule coincidence domain among the target consensus verification rule information, and extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request;
the digital service platform is used for judging whether the block chain digital currency financial terminal has a transaction intrusion risk or not based on the anti-intrusion performance index feature library and the block chain node queue; and if so, setting an access interception mechanism for carrying out security protection on the block chain digital currency financial terminal according to configuration information indicated by the existing transaction intrusion risk.
In a fourth aspect, an embodiment of the present invention further provides a digital service platform, where the digital service platform includes a processor, a machine-readable storage medium, and a network interface, where the machine-readable storage medium, the network interface, and the processor are connected through a bus system, the network interface is configured to be communicatively connected to at least one blockchain digital currency financial terminal, the machine-readable storage medium is configured to store a program, an instruction, or code, and the processor is configured to execute the program, the instruction, or the code in the machine-readable storage medium to perform the method for information management based on blockchain digital currency finance in the first aspect or any one of the possible implementations of the first aspect.
In a fifth aspect, an embodiment of the present invention provides a computer-readable storage medium, where instructions are stored, and when executed, cause a computer to perform the method for information management based on blockchain digital currency finance in the first aspect or any one of the possible implementations of the first aspect.
Based on any one of the aspects, the target consensus verification rule information analyzed through security simulation is counted, then an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request is generated, a block chain link point queue of the transaction request environment information in the current transaction configuration request is extracted, whether a transaction intrusion risk exists in the block chain digital currency financial terminal is judged based on the anti-intrusion performance index feature library and the block chain link point queue, and an access interception mechanism for performing security protection on the block chain digital currency financial terminal is set according to configuration information indicated by the existing transaction intrusion risk. Therefore, the access interception mechanism of safety protection can be configured for the transaction link of the digital currency of the block chain digital currency financial terminal, so that the intrusion risk is reduced as much as possible.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and it will be apparent to those skilled in the art that other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic diagram illustrating an application scenario of an information management system based on blockchain digital currency finance according to an embodiment of the present application;
FIG. 2 is a flow chart illustrating a method for information management based on blockchain digital currency finance according to an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating functional blocks of an information management apparatus for digital currency finance based on a blockchain according to an embodiment of the present application;
fig. 4 is a schematic component structural diagram of a digital service platform for performing the above information management method based on blockchain digital currency finance according to an embodiment of the present application.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only examples or embodiments of the present description, and that for a person skilled in the art, the present description can also be applied to other similar scenarios on the basis of these drawings without inventive effort. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used in this specification is a method for distinguishing different components, elements, parts or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or operations may be removed from the processes.
Fig. 1 is an interaction diagram of an information management system 10 based on blockchain digital currency finance according to an embodiment of the present invention. The information management system 10 based on the blockchain digital money finance may include a digital service platform 100 and a blockchain digital money finance terminal 200 communicatively connected to the digital service platform 100. The information management system 10 based on the blockchain digital money finance illustrated in fig. 1 is only one possible example, and in other possible embodiments, the information management system 10 based on the blockchain digital money finance may also include only a part of the components illustrated in fig. 1 or may also include other components.
In this embodiment, the digital service platform 100 and the blockchain digital currency financial terminal 200 in the information management system 10 based on blockchain digital currency finance can cooperate to execute the information management method based on blockchain digital currency finance described in the following method embodiments, and the detailed description of the method embodiments below can be referred to in the steps executed by the specific digital service platform 100 and the blockchain digital currency financial terminal 200.
Based on the inventive concept of the technical solution provided by the present application, the digital service platform 100 provided by the present application may be applied to a scenario where a big data technology or a cloud computing technology may be applied, such as smart medical care, smart city management, smart industrial internet, and general service monitoring management, and may further be applied to, but not limited to, new energy vehicle system management, smart cloud office, cloud platform data processing, cloud game data processing, cloud live broadcast processing, cloud vehicle management platform, block chain financial data service platform, and the like.
To solve the technical problem in the background art, fig. 2 is a flowchart illustrating an information management method based on blockchain digital currency finance according to an embodiment of the present invention, where the information management method based on blockchain digital currency finance according to the embodiment may be executed by the digital service platform 100 shown in fig. 1, and the information management method based on blockchain digital currency finance is described in detail below.
Step S110, for each blockchain digital currency financial terminal, based on the configured application fingerprint authentication environment and access digital watermark authentication environment for recording the financial authentication environment information of the blockchain digital currency financial terminal, determining to-be-verified blockchain authentication distribution weights of the multiple pieces of consensus authentication rule information for determining the intrusion performance indicators of the financial authentication environment information and for extracting the blockchain link points of the financial authentication environment information, and authentication rule coincidence domains between different pieces of consensus authentication rule information.
Step S120, based on the determined block chain authentication distribution weights of the plurality of consensus verification rule information and the verification rule coincidence domains between different consensus verification rule information, performing security simulation analysis on the plurality of consensus verification rule information, and counting target consensus verification rule information that passes the security simulation analysis.
Step S130, acquiring transaction request environment information of the block chain digital currency financial terminal in the current transaction configuration request determined based on the digital currency transaction response information of the digital service platform, generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to the verification process information of the transaction request environment information under each target consensus verification rule information, the block chain authentication distribution weight of each target consensus verification rule information and the verification rule coincidence domain between the target consensus verification rule information, and extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request.
Step S140, judging whether the block chain digital currency financial terminal has a transaction intrusion risk based on the anti-intrusion performance index feature library and the block chain link point queue. And if so, setting an access interception mechanism for carrying out security protection on the block chain digital currency financial terminal according to configuration information indicated by the existing transaction intrusion risk.
In this embodiment, the application fingerprint authentication environment may be used to represent an authentication environment of an application fingerprint generated during biometric authentication, and the access digital watermark authentication environment may be used to represent an authentication environment of a digital watermark associated with an application fingerprint generated during biometric authentication.
In this embodiment, the block chain authentication distribution weight of the target consensus verification rule information is greater than the set distribution weight, and the verification rule coincidence domain between the target consensus verification rule information is smaller than the set coincidence domain range.
In this embodiment, for example, in the process of setting an access interception mechanism for performing security protection on the blockchain digital currency financial terminal according to the configuration information indicated by the existing transaction intrusion risk, a corresponding access interception parallel program may be generated according to each configuration option in the configuration information indicated by the existing transaction intrusion risk, and when the access interception parallel program is submitted to a developer for confirmation and editing, the access interception mechanism is merged into the process of performing security protection access interception on the blockchain digital currency financial terminal, so as to establish the access interception mechanism.
Based on the above steps, in this embodiment, target consensus verification rule information analyzed through security simulation is counted, then an anti-intrusion performance index feature library of transaction request environment information in the current transaction configuration request is generated, a block chain link point queue of the transaction request environment information in the current transaction configuration request is extracted, whether a transaction intrusion risk exists in the block chain digital currency financial terminal is judged based on the anti-intrusion performance index feature library and the block chain link point queue, and an access interception mechanism for performing security protection on the block chain digital currency financial terminal is set according to configuration information indicated by the existing transaction intrusion risk. Therefore, the access interception mechanism of safety protection can be configured for the transaction link of the digital currency of the block chain digital currency financial terminal, so that the intrusion risk is reduced as much as possible.
In one possible implementation, step S140 can be implemented by the following exemplary sub-steps, which are described in detail below.
And a substep S141, obtaining critical anti-intrusion performance index characteristics in the anti-intrusion performance index characteristic library, wherein the critical anti-intrusion performance index characteristics comprise anti-intrusion performance index characteristics of critical points with performance indexes larger than set index values. And equally dividing the critical intrusion prevention performance index characteristic into at least two index characteristic segments. Then, a performance index variation coefficient included in each of the at least two index feature segments is calculated in parallel. And then mapping each performance index change coefficient obtained by calculation into a preset value interval and calculating the weighted sum of the mapping values of each performance index change coefficient in the preset value interval.
And a substep S142, when the weighted sum is greater than the target value, extracting the consensus verification hash value of each block link node in the block link point queue, performing fuzzy regression fusion on the extracted consensus verification hash values based on the random distribution characteristics corresponding to the anti-intrusion performance index characteristic library to obtain at least two fuzzy regression fusion sequences, and calculating the hash loss value between the consensus verification hash values in each fuzzy regression fusion sequence.
And a substep S143, when the difference between each hash loss value and the set loss value is smaller than a preset threshold, selecting the fuzzy regression fusion sequence corresponding to the maximum hash loss value as a judgment sequence and determining consensus verification hash value distribution corresponding to the judgment sequence, and searching whether a target consensus verification hash value distribution with a distribution similarity between the consensus verification hash value distribution and the consensus verification hash value distribution larger than the set similarity exists in a preset database. And if so, judging that the block chain digital currency financial terminal has a transaction intrusion risk. And the distribution elements in the target consensus verification hash value distribution are elements corresponding to the chain links of the abnormal blocks.
Exemplarily, in the sub-step S142, it can be realized by the following specific embodiments, which are described as follows.
(1) Determining the random distribution density of the random distribution characteristics, normalizing the distribution sequence of each distribution node in the distribution interval corresponding to the random distribution characteristics to obtain distribution sequence information corresponding to each distribution node, performing migration processing on each distribution node by adopting the distribution sequence information to obtain a migration processing value corresponding to each distribution node, and calculating a migration updating parameter corresponding to the random distribution characteristics according to the migration processing value.
For example, the offset update parameter is used to update a preset model parameter of a preset fuzzy regression fusion model, and the preset model parameter is a fuzzy regression fusion model parameter.
(2) And extracting the current model parameters of the preset fuzzy regression fusion model, and calculating the current fuzzy regression fusion deviation degree of the preset fuzzy regression fusion model according to the correlation coefficient between the current model parameters and the offset updating parameters. For example, when the current fuzzy regression fusion deviation degree is lower than the set deviation degree, the offset updating parameter is adopted to update the preset fuzzy regression fusion model.
(3) And determining a fuzzy regression fusion characteristic number based on the updated preset fuzzy regression fusion model, and judging whether the hash length of the consensus verification hash value is equal to the fuzzy regression fusion characteristic number or not. For example, if not, the hash length of the consensus verification hash value is adjusted based on the offset update parameter so that the hash length of the consensus verification hash value is equal to the fuzzy regression fusion feature number.
(4) Inputting the adjusted consensus verification hash values into the updated preset fuzzy regression fusion model and obtaining at least two fuzzy regression fusion sequences output by the updated preset fuzzy regression fusion model, calculating hash deviation lengths between each consensus verification hash value in the fuzzy regression fusion sequence and other consensus verification hash values aiming at each fuzzy regression fusion sequence, screening the hash deviation lengths according to the fuzzy regression fusion weight of each consensus verification hash value in the fuzzy regression fusion sequence, and carrying out mean calculation on the screened hash deviation lengths to obtain hash loss values.
In one possible implementation manner, for step S110, in the process of determining the anti-intrusion performance index for determining the financial authentication environment information and the block chain authentication distribution weight for extracting the multiple pieces of consensus verification rule information of the block link points of the financial authentication environment information to be verified, and the verification rule coincidence domain between different pieces of consensus verification rule information based on the applied fingerprint authentication environment and the access digital watermark authentication environment configured for recording the financial authentication environment information of the block chain digital currency financial terminal, the following exemplary sub-steps can be implemented, which are described in detail as follows.
And a substep S111 of listing application fingerprint authentication configuration sets used for representing authentication rules between the block chain digital currency financial terminal and the digital service platform in the application fingerprint authentication environment according to a time sequence order, listing access digital watermark authentication configuration sets used for representing authentication rules between the block chain digital currency financial terminal and other block chain digital currency financial terminals in the access digital watermark authentication environment according to a time sequence order, generating an application fingerprint authentication label page of the application fingerprint authentication environment based on the application fingerprint authentication configuration sets, and generating an access digital watermark authentication label page of the access digital watermark authentication environment based on the access digital watermark authentication configuration sets.
For example, the number of first tab objects in an application fingerprint authentication tab is different from the number of second tab objects in an access digital watermark authentication tab, the first tab objects and the second tab objects having different tab dimensions.
And a substep S112, obtaining authentication session tag distribution for representing financial authentication environment information and table axis anchor information of an authentication table entry of the financial authentication environment information, which are represented by a tag dimension corresponding to one of the first tag page objects in the application fingerprint authentication tag page, determining a second tag page object with a maximum tag dimension in the access digital watermark authentication tag page as a target tag page object, and encapsulating the table axis anchor information into the authentication session tag distribution according to a tag page interval between the application fingerprint authentication tag page and the access digital watermark authentication tag page, so as to obtain configuration information corresponding to the table axis anchor information in the authentication session tag distribution.
On the basis, the time sequence consistency weight between the applied fingerprint authentication environment and the accessed digital watermark authentication environment can be determined according to the matching degree between the configuration information and the table entry axis anchor position information.
And a substep S113, performing time sequence correction on the application fingerprint authentication tab page and the access digital watermark authentication tab page by adopting the time sequence consistency weight, and splicing the corrected application fingerprint authentication tab page and the corrected access digital watermark authentication tab page to obtain a third tab page object.
On this basis, the node description information corresponding to each third tab page object in the third tab page objects can be extracted and classified to obtain the first description representation and the second description representation.
And a substep S114, determining a plurality of pieces of first consensus verification rule information to be verified for determining the anti-intrusion performance index of the financial authentication environment information based on the node description information under the first description representation, determining a plurality of pieces of second consensus verification rule information to be verified for determining the block chain node for extracting the financial authentication environment information based on the node description information under the second description representation, and screening out a plurality of pieces of third consensus verification rule information to be verified for determining the anti-intrusion performance index of the financial authentication environment information and for extracting the block chain link point of the financial authentication environment information according to the first consensus verification rule information and the second consensus verification rule information.
On this basis, the tag index value corresponding to each piece of third consensus verification rule information may be mapped to a preset numerical value list to obtain the block chain authentication distribution weight corresponding to each piece of third consensus verification rule information. Therefore, the hash deviation length between the information vectors of every two pieces of the third consensus verification rule information can be calculated, and the calculated hash deviation lengths are weighted to obtain the verification rule superposition domains among the plurality of pieces of the third consensus verification rule information.
Exemplarily, in the sub-step S113, in the process of classifying the node description information corresponding to each third tab object to obtain the first description representation and the second description representation, the following specific implementation manner may be implemented, and the detailed description is as follows.
(1) Dividing the node description information corresponding to the third tab page object into a plurality of anti-intrusion performance index features according to a preset description separator, calculating a performance index for representing the performance sustainability of each anti-intrusion performance index feature, generating a performance index distribution list corresponding to the third tab page object according to the performance index, and performing first classification on the node description information corresponding to each third tab page object based on the list clustering information of the list information in the performance index distribution list to obtain a first initial classification result and a second initial classification result.
(2) When the fact that information compatibility identification exists between the node description information under the first initial classification result and the node description information under the second initial classification result is determined, at least one node description information under the first initial classification result is adjusted to be under the second initial classification result based on the information compatibility degree between the node description information under the first initial classification result and the node description information under the second initial classification result.
(3) And calculating a first information configuration coefficient of the node description information under the first initial classification result after the adjustment and a second information configuration coefficient of the node description information under the second initial classification result after the adjustment, and determining a coefficient difference value between the first information configuration coefficient and the second information configuration coefficient. And judging whether the coefficient difference is larger than a set difference or not.
And when the coefficient difference is larger than the set difference, determining the first initial classification result after the adjustment is finished as a first description representation and determining the second initial classification result after the adjustment is finished as a second description representation. And when the coefficient difference is smaller than or equal to the set difference, continuing to adjust at least one piece of node description information under the first initial classification result to a second initial classification result, and returning to the step of executing the first information configuration coefficient for calculating the node description information under the adjusted first initial classification result and the second information configuration coefficient for finishing the node description information under the adjusted second initial classification result.
In one possible implementation manner, for step S120, in the process of performing security simulation analysis on the multiple pieces of consensus verification rule information based on the determined block chain authentication distribution weights of the multiple pieces of consensus verification rule information and the verification rule overlap regions between different pieces of consensus verification rule information, and counting the target consensus verification rule information passing through the security simulation analysis, the following exemplary sub-steps may be implemented, which are described in detail below.
In the substep S121, the determined blockchain authentication distribution weights of the plurality of consensus verification rule information are mapped to the verification rule overlap regions between different consensus verification rule information, so as to generate a plurality of blockchain authentication distribution regions of the consensus verification rule information.
And a substep S122, performing security simulation analysis on the plurality of consensus verification rule information according to the authentication distribution elements in the block chain authentication distribution domain of the plurality of consensus verification rule information and a preset security simulation program corresponding to each authentication distribution element, and counting the target consensus verification rule information passing the security simulation analysis.
For example, the target consensus verification rule information analyzed by the security simulation is used to represent target consensus verification rule information that conforms to the security verification passing rule of the preset security simulation program.
In one possible implementation, step S130 can be implemented by the following exemplary sub-steps, which are described in detail below.
And a substep S131 of sending the analog configured digital currency transaction response information to the blockchain digital currency financial terminal, so that the blockchain digital currency financial terminal determines the transaction request environment information in the current transaction configuration request based on the digital currency transaction response information.
For example, the transaction request environment information is information constituted by all transaction request environment elements that the blockchain digital currency financial terminal can currently open capture.
In the substep S132, the block chain authentication distribution weight of the target consensus verification rule information is mapped to the verification rule coincidence domain between different target consensus verification rule information, so as to generate the block chain authentication distribution domain of the target consensus verification rule information.
And a substep S133, generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to the verification process information of the transaction request environment information under each target consensus verification rule information and the block chain authentication distribution domain of the target consensus verification rule information, and extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request.
In one possible implementation manner, for step S110, the applied fingerprint authentication environment and the access digital watermark authentication environment for recording the financial authentication environment information of the blockchain digital currency financial terminal are determined by the following steps:
step S101, obtaining target biometric authentication credentials embedded with a security code calling program corresponding to the plurality of mobile internet devices 200, performing access verification encryption deployment on each mobile internet device 200 according to the target biometric authentication credentials embedded with the security code calling program, and obtaining encryption deployment data of each mobile internet device 200.
Step S102, terminal access authentication information uploaded by a target service terminal which performs mutual authentication and interconnection with each service member unit is obtained.
Step S103, aiming at each service member unit, extracting the terminal access authentication information of the service member unit to obtain extraction information, and determining the application fingerprint mapping information of the service member unit and the access digital watermark mapping information of the service member unit based on the extraction information.
Step S104, according to the application fingerprint mapping information of the service member unit and the encrypted deployment data of the mobile Internet equipment 200 in the service member unit, configuring the application fingerprint authentication environment of the mobile Internet equipment 200 in the service member unit, and according to the access digital watermark mapping information of the service member unit, configuring the access digital watermark authentication environment of the mobile Internet equipment 200 in the service member unit.
In this embodiment, the mobile internet device 200 is located in different service member units in the target internet service member group, and each service member unit may be configured with an internet service type of an internet service member in advance, such as a self-media service type, a game service type, and the like, but is not limited thereto.
In this embodiment, the encrypted deployment data may specifically include application fingerprint encryption deployment information and access digital watermark encryption deployment information of the mobile internet device 200. For example, after acquiring the target biometric authentication credentials embedded with the security code invoker corresponding to the plurality of mobile internet devices 200, the application fingerprint interception index and the access digital watermark interception index matching the security code invoker may be obtained from the target biometric authentication credentials embedded with the security code invoker, and the access verification encryption deployment may be performed on each mobile internet device 200 according to the application fingerprint interception index and the access digital watermark interception index.
In this embodiment, for each target service terminal, mutual authentication interconnection may be established with each service member unit in advance, specifically, the mutual authentication interconnection may be established by uploading a series of identity authentication information, and the corresponding terminal access authentication information may be uploaded in real time or at preset time intervals, and specifically, the terminal access authentication information may include application fingerprint configuration information and access digital watermark configuration information. For example, the terminal access authentication information may specifically include application fingerprint configuration information and access digital watermark configuration information allowed by its own device, or application fingerprint configuration information and access digital watermark configuration information extended by software, but is not limited thereto.
In this embodiment, the application fingerprint authentication environment may be used to represent an authentication environment of an application fingerprint generated during biometric authentication, and the access digital watermark authentication environment may be used to represent an authentication environment of a digital watermark associated with an application fingerprint generated during biometric authentication.
Based on the above steps, in this embodiment, the terminal access authentication information uploaded by the target service terminal performing mutual authentication and interconnection with each service member unit is acquired, and the terminal access authentication information of the service member unit is extracted to obtain the extraction information, and then the application fingerprint mapping information of the service member unit and the access digital watermark mapping information of the service member unit are determined, so that the application fingerprint authentication environment of the mobile internet device in the service member unit is configured according to the application fingerprint mapping information of the service member unit and the encrypted deployment data of the mobile internet device in the service member unit, and the access digital watermark authentication environment of the mobile internet device in the service member unit is configured synchronously according to the access digital watermark mapping information of the service member unit. Therefore, an effective encryption deployment scheme can be provided for the target service terminal, so that subsequent error-free verification is facilitated, and the condition that the target service terminal is abnormal in verification is avoided.
In a possible implementation manner, for step S103, for example, in the process of extracting the terminal access authentication information of the service member unit to obtain the extracted information, the following exemplary sub-steps may be implemented, which are described in detail below.
And step S1031, if the terminal access authentication information is access digital watermark configuration information, converting the access digital watermark configuration information into watermark scrambling character string information.
And a substep S1032, segmenting and analyzing the watermark scrambling character string information to obtain character string service segments in the watermark scrambling character string information, and identifying the character string service segments according to the corresponding relation before the preset character string and the digital watermark are matched with the service to obtain access digital watermark mapping information corresponding to the watermark scrambling character string information.
And a substep S1033 of obtaining the extraction information according to the access digital watermark mapping information.
In another possible implementation manner, for step S103, for example, in the process of extracting the terminal access authentication information of the service member unit to obtain the extracted information, the following exemplary sub-steps may be further implemented, which are described in detail below.
And in the substep S1034, if the terminal access authentication information of the service member unit is the application fingerprint configuration information, determining an application fingerprint key generation list of the target service terminal corresponding to the application fingerprint configuration information, where the application fingerprint key generation list is used for representing an application fingerprint key generation strategy of the target service terminal corresponding to the application fingerprint configuration information.
And a substep S1035 of determining an application fingerprint matrix of the target service terminal corresponding to the application fingerprint configuration information according to the application fingerprint key generation list and performing decision classification on the application fingerprint configuration information according to the application fingerprint matrix to obtain target application fingerprint configuration information.
And the substep S1036 is to divide the target application fingerprint configuration information into a plurality of bidirectional certificate table entries corresponding to the target application fingerprint configuration information, list the certificate authorization services of each bidirectional certificate table entry, establish a certificate authorization service matrix, wherein the certificate authorization service matrix comprises a plurality of matrix distribution elements, each matrix distribution element corresponds to one certificate authorization service, and the matrix distance between every two matrix distribution elements represents the service association degree between the certificate authorization services corresponding to the two matrix distribution elements.
And a substep S1037, clustering all matrix distribution elements in the certificate authority service matrix according to a matrix distance between every two matrix distribution elements in the certificate authority service matrix to obtain at least a plurality of target matrix distribution element queues, determining a service authentication item of each target matrix distribution element queue according to service coverage information of the certificate authority service corresponding to each matrix distribution element in each target matrix distribution element queue, and determining a current queue corresponding to a preset authentication item from the service authentication items.
And a substep S1038 of determining application fingerprint mapping information corresponding to the target application fingerprint configuration information according to the fingerprint authorization protocol channel information in the certificate authorization service corresponding to each matrix distribution element in the current queue, and determining extraction information according to the application fingerprint mapping information, wherein the fingerprint authorization protocol channel information is used for representing the application fingerprint mapping information in each bidirectional certificate table entry in the certificate authorization service.
In a possible implementation manner, still referring to step S1030, in the process of determining the application fingerprint mapping information of the service member unit and the access digital watermark mapping information of the service member unit based on the extracted information, the following exemplary sub-steps may be specifically implemented, which are described in detail below.
And a substep S10391 of determining application fingerprint mapping information of the service member unit according to the first extraction information in the extraction information.
The first extraction information is extraction information corresponding to the application fingerprint configuration information of the service member unit.
And a substep S10392, determining the access digital watermark mapping information of the service member unit according to the second extraction information in the extraction information.
And the second extraction information is extraction information corresponding to the access digital watermark configuration information of the service member unit.
In one possible implementation manner, regarding step S101, in the process of acquiring the target biometric authentication credentials embedded with the security code invoking program corresponding to the plurality of mobile internet devices 200, the method may be implemented by various exemplary embodiments, for example, by the following exemplary sub-steps, which are described in detail below.
Step S1011, performing credential matching analysis on the biometric authentication verification information obtained in the biometric authentication process of the mobile internet device 200 within the preset time period, to obtain self-signed digital certificate matching information of the biometric authentication verification information.
Step S1012, performing element matching on the self-signed digital certificate matching information according to the preset token root certificate node set, to obtain a root certificate matching node set.
Step S1013, using the first security identification program and the second security identification program to respectively perform security credential identification on each root certificate matching node in the root certificate matching node set, so as to obtain a security credential identification result of the root certificate matching node set.
And step S1014, based on the identification result of the security certificate, performing certificate signing processing on each root certificate matching node corresponding to the root certificate matching node set to obtain the target biological authentication certificate embedded with the security code calling program.
Based on the same inventive concept, please refer to fig. 3, which is a schematic diagram illustrating functional modules of the information management apparatus 300 based on blockchain digital currency finance according to an embodiment of the present application, and the embodiment can divide the functional modules of the information management apparatus 300 based on blockchain digital currency finance according to the above method embodiment. For example, the functional blocks may be divided for the respective functions, or two or more functions may be integrated into one processing block. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation. For example, in the case of dividing each function module in correspondence to each function, the information management apparatus 300 based on the blockchain digital money finance illustrated in fig. 3 is only an apparatus diagram. The device 300 for managing information based on blockchain digital currency finance may include a determining module 310, an analog analyzing module 320, a generating module 330, and a setting module 340, and the functions of the functional modules of the device 300 are described in detail below.
The determining module 310 is configured to determine, for each blockchain digital currency financial terminal, a blockchain authentication distribution weight of the multiple pieces of consensus verification rule information to be verified, the multiple pieces of consensus verification rule information being used for determining an anti-intrusion performance index of the financial authentication environment information and extracting the block link points of the financial authentication environment information, and a verification rule coincidence domain between different pieces of consensus verification rule information, based on an application fingerprint authentication environment and an access digital watermark authentication environment configured to record financial authentication environment information of the blockchain digital currency financial terminal. It is understood that the determining module 310 can be used to perform the step S110, and the detailed implementation of the determining module 310 can refer to the content related to the step S110.
The simulation analysis module 320 is configured to perform security simulation analysis on the multiple pieces of consensus verification rule information based on the determined block chain authentication distribution weights of the multiple pieces of consensus verification rule information and the verification rule coincidence domains between different pieces of consensus verification rule information, and count target consensus verification rule information that passes the security simulation analysis. The block chain authentication distribution weight of the target consensus verification rule information is larger than the set distribution weight, and the verification rule coincidence domain between the target consensus verification rule information is smaller than the set coincidence domain range. It is understood that the simulation analysis module 320 can be used to perform the above step S120, and for the detailed implementation of the simulation analysis module 320, reference can be made to the above description regarding the step S120.
The generating module 330 is configured to obtain transaction request environment information of the blockchain digital currency financial terminal in the current transaction configuration request determined based on the digital currency transaction response information of the digital service platform, generate an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to verification process information of the transaction request environment information under each target consensus verification rule information, a blockchain authentication distribution weight of each target consensus verification rule information, and a verification rule coincidence domain between the target consensus verification rule information, and extract a blockchain link point queue of the transaction request environment information in the current transaction configuration request. It is understood that the generating module 330 may be configured to perform the step S130, and for the detailed implementation of the generating module 330, reference may be made to the content related to the step S130.
The setting module 340 is configured to determine whether the blockchain digital currency financial terminal has a transaction intrusion risk based on the anti-intrusion performance index feature library and the blockchain link point queue. And if so, setting an access interception mechanism for carrying out security protection on the block chain digital currency financial terminal according to configuration information indicated by the existing transaction intrusion risk. It is understood that the setting module 340 can be used to execute the step S140, and for the detailed implementation of the setting module 340, reference can be made to the above description about the step S140.
It should be noted that the division of the modules of the above apparatus is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules may all be implemented in software invoked by a processing element. Or may be implemented entirely in hardware. And part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the determining module 310 may be a processing element separately set up, or may be implemented by being integrated into a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and the function of the determining module 310 may be called and executed by a processing element of the apparatus. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. For another example, when some of the above modules are implemented in the form of a processing element scheduler code, the processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor that can call program code. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Fig. 4 is a schematic diagram illustrating a hardware structure of the digital service platform 100 for implementing the above-mentioned information management method based on blockchain digital currency finance, according to an embodiment of the present invention, as shown in fig. 4, the digital service platform 100 may include a processor 110, a machine-readable storage medium 120, a bus 130, and a transceiver 140.
In an implementation process, at least one processor 110 executes computer-executable instructions stored in the machine-readable storage medium 120 (for example, the determining module 310, the analog analyzing module 320, the generating module 330, and the setting module 340 included in the device 300 for managing information based on digital currency finance illustrated in fig. 3), so that the processor 110 may execute the method for managing information based on digital currency finance according to the above method embodiment, where the processor 110, the machine-readable storage medium 120, and the transceiver 140 are connected via the bus 130, and the processor 110 may be configured to control transceiving actions of the transceiver 140, so as to transceive data with the aforementioned terminal 200.
For a specific implementation process of the processor 110, reference may be made to the above-mentioned method embodiments executed by the digital service platform 100, which implement principles and technical effects similar to each other, and details of this embodiment are not described herein again.
In the embodiment shown in fig. 4, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
The machine-readable storage medium 120 may comprise high-speed RAM memory and may also include non-volatile storage NVM, such as at least one disk memory.
The bus 130 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus 130 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.
In addition, the embodiment of the invention also provides a readable storage medium, wherein the readable storage medium stores computer-executable instructions, and when a processor executes the computer-executable instructions, the method for managing the information based on the block chain digital currency finance is realized.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements, and offset processing may occur to those skilled in the art, though not expressly stated herein. Such modifications, improvements, and offset processing are suggested in this specification and still fall within the spirit and scope of the exemplary embodiments of this specification.
Also, the description uses specific words to describe embodiments of the description. Such as "one possible implementation," "one possible example," and/or "exemplary" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "one possible implementation," "one possible example," and/or "exemplary" in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or contexts, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of this specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or digital service platform. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which the elements and lists are processed, the use of alphanumeric characters, or other designations in this specification is not intended to limit the order in which the processes and methods of this specification are performed, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented through interactive services, they may also be implemented through software-only solutions, such as installing the described system on an existing digital service platform or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.

Claims (10)

1. The information management method based on the blockchain digital currency finance is applied to a digital service platform which is in communication connection with a plurality of blockchain digital currency finance terminals, and comprises the following steps:
for each block chain digital currency financial terminal, determining to-be-verified block chain authentication distribution weights of a plurality of pieces of common identification authentication rule information of block chain link points used for determining an anti-intrusion performance index of the financial authentication environment information and for extracting the financial authentication environment information, and authentication rule coincidence domains among different pieces of common identification authentication rule information based on an application fingerprint authentication environment and an access digital watermark authentication environment which are configured and used for recording financial authentication environment information of the block chain digital currency financial terminal;
performing security simulation analysis on the plurality of consensus verification rule information based on the determined block chain authentication distribution weights of the plurality of consensus verification rule information and verification rule coincidence domains among different consensus verification rule information, and counting target consensus verification rule information passing the security simulation analysis; the block chain authentication distribution weight of the target consensus verification rule information is greater than the set distribution weight, and the verification rule coincidence domain between the target consensus verification rule information is smaller than the set coincidence domain range;
acquiring transaction request environment information of the block chain digital currency financial terminal in a current transaction configuration request determined based on digital currency transaction response information of the digital service platform, generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to verification process information of the transaction request environment information under each target consensus verification rule information, block chain authentication distribution weight of each target consensus verification rule information and a verification rule coincidence domain between the target consensus verification rule information, and extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request;
judging whether the block chain digital currency financial terminal has a transaction intrusion risk or not based on the anti-intrusion performance index feature library and the block chain node queue; and if so, setting an access interception mechanism for carrying out security protection on the block chain digital currency financial terminal according to configuration information indicated by the existing transaction intrusion risk.
2. The method of claim 1, wherein determining whether the blockchain digital currency financial terminal has a risk of transaction intrusion based on the anti-intrusion performance index feature library and the blockchain node queue comprises:
obtaining critical anti-intrusion performance index features in the anti-intrusion performance index feature library, wherein the critical anti-intrusion performance index features comprise anti-intrusion performance index features of critical points with performance indexes larger than set index values; equally dividing the critical anti-intrusion performance index feature into at least two index feature segments; calculating the performance index change coefficient included in each index feature segment in the at least two index feature segments in parallel; mapping each performance index change coefficient obtained by calculation into a preset value interval and calculating the weighted sum of the mapping values of each performance index change coefficient in the preset value interval;
when the weighted sum is larger than a target value, extracting a consensus verification hash value of each block link node in the block link point queue, performing fuzzy regression fusion on the extracted consensus verification hash values based on random distribution characteristics corresponding to the anti-intrusion performance index characteristic library to obtain at least two fuzzy regression fusion sequences, and calculating a hash loss value between the consensus verification hash values in each fuzzy regression fusion sequence;
when the difference value between each Hash loss value and a set loss value is smaller than a preset threshold value, selecting a fuzzy regression fusion sequence corresponding to the maximum Hash loss value as a judgment sequence, determining consensus verification Hash value distribution corresponding to the judgment sequence, and searching whether a target consensus verification Hash value distribution with the distribution similarity between the target consensus verification Hash value distribution and the consensus verification Hash value distribution larger than the set similarity exists or not from a preset database; if yes, judging that the block chain digital currency financial terminal has a transaction intrusion risk; and the distribution elements in the target consensus verification hash value distribution are elements corresponding to the chain links of the abnormal block.
3. The information management method based on blockchain digital currency finance according to claim 2, wherein the step of performing fuzzy regression fusion on the extracted multiple consensus verification hash values based on the random distribution features corresponding to the anti-intrusion performance index feature library to obtain at least two fuzzy regression fusion sequences, and calculating the hash loss value between the consensus verification hash values in each fuzzy regression fusion sequence includes:
determining the random distribution density of the random distribution characteristics, normalizing the distribution sequence of each distribution node in the distribution interval corresponding to the random distribution characteristics in the distribution interval to obtain distribution sequence information corresponding to each distribution node, performing offset processing on each distribution node by adopting the distribution sequence information to obtain an offset processing value corresponding to each distribution node, and calculating an offset updating parameter corresponding to the random distribution characteristics according to the offset processing value; the offset updating parameters are used for updating preset model parameters of a preset fuzzy regression fusion model, and the preset model parameters are fuzzy regression fusion model parameters;
extracting current model parameters of the preset fuzzy regression fusion model, and calculating the current fuzzy regression fusion deviation degree of the preset fuzzy regression fusion model according to a correlation coefficient between the current model parameters and the offset updating parameters; updating the preset fuzzy regression fusion model by adopting the offset updating parameter when the current fuzzy regression fusion deviation degree is lower than a set deviation degree;
determining a fuzzy regression fusion characteristic number based on the updated preset fuzzy regression fusion model, and judging whether the hash length of the consensus verification hash value is equal to the fuzzy regression fusion characteristic number or not; if not, adjusting the hash length of the consensus verification hash value based on the offset updating parameter so that the hash length of the consensus verification hash value is equal to the fuzzy regression fusion characteristic number;
inputting the adjusted consensus verification hash values into the updated preset fuzzy regression fusion model and obtaining at least two fuzzy regression fusion sequences output by the updated preset fuzzy regression fusion model, calculating hash deviation lengths between each consensus verification hash value in the fuzzy regression fusion sequence and other consensus verification hash values aiming at each fuzzy regression fusion sequence, screening the hash deviation lengths according to the fuzzy regression fusion weight of each consensus verification hash value in the fuzzy regression fusion sequence, and performing mean calculation on the screened hash deviation lengths to obtain hash loss values.
4. The information management method based on blockchain digital currency finance according to any one of claims 1 to 3, wherein the step of determining the blockchain authentication distribution weight of the plurality of consensus verification rule information to be verified for determining the anti-intrusion performance index of the financial authentication environment information and for extracting the blockchain link points of the financial authentication environment information and the verification rule coincidence domain between different consensus verification rule information based on the applied fingerprint authentication environment and the access digital watermark authentication environment configured for recording the financial authentication environment information of the blockchain digital currency financial terminal comprises:
listing application fingerprint authentication configuration sets used for representing authentication rules between the block chain digital currency financial terminal and the digital service platform in the application fingerprint authentication environment according to a time sequence order, listing access digital watermark authentication configuration sets used for representing authentication rules between the block chain digital currency financial terminal and other block chain digital currency financial terminals in the access digital watermark authentication environment according to a time sequence order, generating an application fingerprint authentication label page of the application fingerprint authentication environment based on the application fingerprint authentication configuration sets, and generating an access digital watermark authentication label page of the access digital watermark authentication environment based on the access digital watermark authentication configuration sets; wherein the number of first tab page objects in the application fingerprint authentication tab page is different from the number of second tab page objects in the access digital watermark authentication tab page, the first tab page object and the second tab page object having different tab dimensions;
obtaining authentication session tag distribution which is represented by a tag dimension corresponding to one of the first tag page objects in the application fingerprint authentication tag page and is used for representing the financial authentication environment information and table entry axis anchor position information of an authentication table entry of the financial authentication environment information, determining a second tag page object with the largest tag dimension in the access digital watermark authentication tag page as a target tag page object, and packaging the table entry axis anchor position information into the authentication session tag distribution according to a tag page interval between the application fingerprint authentication tag page and the access digital watermark authentication tag page so as to obtain configuration information corresponding to the table entry axis anchor position information in the authentication session tag distribution; determining the time sequence consistency weight between the application fingerprint authentication environment and the access digital watermark authentication environment according to the matching degree between the configuration information and the table entry axis anchor position information;
performing time sequence correction on the application fingerprint authentication tab page and the access digital watermark authentication tab page by adopting the time sequence consistency weight, and splicing the corrected application fingerprint authentication tab page and the corrected access digital watermark authentication tab page to obtain a third tab page object; extracting node description information corresponding to each third tab object in the third tab objects and classifying the node description information corresponding to each third tab object to obtain a first description representation and a second description representation;
determining a plurality of pieces of first consensus verification rule information to be verified for determining an anti-intrusion performance index of the financial authentication environment information based on the node description information under the first description representation, determining a plurality of pieces of second consensus verification rule information to be verified for determining a block chain node for extracting the financial authentication environment information based on the node description information under the second description representation, and screening out a plurality of pieces of third consensus verification rule information to be verified for determining the anti-intrusion performance index of the financial authentication environment information and for extracting the block chain node of the financial authentication environment information according to the first consensus verification rule information and the second consensus verification rule information; mapping the label index value corresponding to each piece of third consensus verification rule information to a preset numerical value list to obtain the block chain authentication distribution weight corresponding to each piece of third consensus verification rule information; and calculating the Hash deviation length between the information vectors of every two pieces of third consensus verification rule information, and weighting the calculated Hash deviation length to obtain the verification rule coincidence domain among the pieces of third consensus verification rule information.
5. The method of claim 4, wherein the classifying the node description information corresponding to each third tab object into the first description representation and the second description representation comprises:
dividing the node description information corresponding to the third tab page object into a plurality of anti-intrusion performance index features according to preset description separators, calculating performance indexes for representing the performance sustainability of each anti-intrusion performance index feature, generating a performance index distribution list corresponding to the third tab page object according to the performance indexes, and performing first classification on the node description information corresponding to each third tab page object based on list clustering information of list information in the performance index distribution list to obtain a first initial classification result and a second initial classification result;
when it is determined that an information compatibility identifier exists between the node description information under the first initial classification result and the node description information under the second initial classification result, adjusting at least one node description information under the first initial classification result to be under the second initial classification result based on the determined information compatibility between the node description information under the first initial classification result and the node description information under the second initial classification result;
calculating a first information configuration coefficient of the node description information under the first initial classification result after the adjustment and a second information configuration coefficient of the node description information under the second initial classification result after the adjustment, and determining a coefficient difference value between the first information configuration coefficient and the second information configuration coefficient; judging whether the coefficient difference is larger than a set difference or not; when the coefficient difference is larger than the set difference, determining a first initial classification result after adjustment as the first description representation and determining a second initial classification result after adjustment as the second description representation; and when the coefficient difference is smaller than or equal to the set difference, continuing to adjust at least one piece of node description information under the first initial classification result to the second initial classification result, and returning to the step of executing the first information configuration coefficient of the node description information under the first initial classification result after the adjustment is completed and the second information configuration coefficient of the node description information under the second initial classification result after the adjustment is completed.
6. The method for managing information on digital currency finance based on blockchain according to any one of claims 1 to 3, wherein the step of performing security simulation analysis on the plurality of consensus validation rule information based on the determined blockchain authentication distribution weights of the plurality of consensus validation rule information and validation rule coincidence fields between different consensus validation rule information, and counting target consensus validation rule information that passes the security simulation analysis includes:
mapping the determined block chain authentication distribution weights of the plurality of consensus verification rule information to verification rule coincidence domains among different consensus verification rule information to generate the block chain authentication distribution domains of the plurality of consensus verification rule information;
and according to the authentication distribution elements in the block chain authentication distribution domain of the plurality of pieces of consensus verification rule information and a preset safety simulation program corresponding to each authentication distribution element, performing safety simulation analysis on the plurality of pieces of consensus verification rule information, and counting target consensus verification rule information passing the safety simulation analysis, wherein the target consensus verification rule information passing the safety simulation analysis is used for representing target consensus verification rule information meeting a safety verification passing rule of the preset safety simulation program.
7. The information management method based on blockchain digital currency finance according to any one of claims 1 to 3, wherein the step of obtaining transaction request environment information of the blockchain digital currency financial terminal in a current transaction configuration request determined based on digital currency transaction response information of the digital service platform, generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to verification process information of the transaction request environment information under each target consensus verification rule information, a blockchain authentication distribution weight of each target consensus verification rule information and a verification rule coincidence domain between the target consensus verification rule information, and extracting a blockchain link point queue of the transaction request environment information in the current transaction configuration request, the method comprises the following steps:
sending analog configured digital currency transaction response information to the blockchain digital currency financial terminal so that the blockchain digital currency financial terminal determines transaction request environment information in a current transaction configuration request based on the digital currency transaction response information, wherein the transaction request environment information is information formed by all transaction request environment elements which can be captured by the blockchain digital currency financial terminal in a currently openable mode;
mapping the block chain authentication distribution weight of the target consensus verification rule information to a verification rule coincidence domain among different target consensus verification rule information to generate a block chain authentication distribution domain of the target consensus verification rule information;
and generating an anti-intrusion performance index feature library of the transaction request environment information in the current transaction configuration request according to the verification process information of the transaction request environment information under each target consensus verification rule information and the block chain authentication distribution domain of the target consensus verification rule information, and extracting a block chain link point queue of the transaction request environment information in the current transaction configuration request.
8. The information management method based on blockchain digital currency finance according to any one of claims 1 to 3, wherein the application fingerprint authentication environment and the access digital watermark authentication environment for recording the financial authentication environment information of the blockchain digital currency financial terminal are determined by:
the method comprises the steps of obtaining target biological authentication certificates embedded with a security code calling program corresponding to a plurality of block chain digital currency financial terminals during biological authentication identification, carrying out access verification encryption deployment on each block chain digital currency financial terminal according to the target biological authentication certificates embedded with the security code calling program, and obtaining encryption deployment data of each block chain digital currency financial terminal, wherein the block chain digital currency financial terminals are located in different service member units in a target internet service member group, and the encryption deployment data comprises application fingerprint encryption deployment information and access digital watermark encryption deployment information of the block chain digital currency financial terminals;
acquiring terminal access authentication information uploaded by a target service terminal which performs bidirectional authentication interconnection with each service member unit, wherein the terminal access authentication information comprises application fingerprint configuration information and access digital watermark configuration information;
for each service member unit, extracting terminal access authentication information of the service member unit to obtain extraction information, and determining application fingerprint mapping information of the service member unit and access digital watermark mapping information of the service member unit based on the extraction information;
and configuring an application fingerprint authentication environment of the blockchain digital currency financial terminal in the service member unit according to the application fingerprint mapping information of the service member unit and the encrypted deployment data of the blockchain digital currency financial terminal in the service member unit, and configuring an access digital watermark authentication environment of the blockchain digital currency financial terminal in the service member unit according to the access digital watermark mapping information of the service member unit.
9. The method for managing information based on blockchain digital currency finance according to claim 8, wherein said determining application fingerprint mapping information of the business member unit and access digital watermark mapping information of the business member unit based on the extracted information comprises:
determining application fingerprint mapping information of the service member unit according to first extraction information in the extraction information, wherein the first extraction information is extraction information corresponding to application fingerprint configuration information of the service member unit;
and determining the access digital watermark mapping information of the service member unit according to second extraction information in the extraction information, wherein the second extraction information is extraction information corresponding to the access digital watermark configuration information of the service member unit.
10. A digital service platform comprising a processor, a machine-readable storage medium, and a network interface, the machine-readable storage medium, the network interface, and the processor being connected by a bus system, the network interface being configured to communicatively connect with at least one blockchain digital money financial terminal, the machine-readable storage medium being configured to store a program, instructions, or code, and the processor being configured to execute the program, instructions, or code in the machine-readable storage medium to perform the method for information management based on blockchain digital money finance of any one of claims 1 to 9.
CN202010841203.9A 2020-08-20 2020-08-20 Information management method based on block chain digital currency finance and digital service platform Active CN112016911B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202110167734.9A CN112883112A (en) 2020-08-20 2020-08-20 Information management method and information management system based on block chain digital currency finance
CN202110167727.9A CN112883111A (en) 2020-08-20 2020-08-20 Information management method, system and platform based on block chain digital currency finance
CN202010841203.9A CN112016911B (en) 2020-08-20 2020-08-20 Information management method based on block chain digital currency finance and digital service platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010841203.9A CN112016911B (en) 2020-08-20 2020-08-20 Information management method based on block chain digital currency finance and digital service platform

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202110167734.9A Division CN112883112A (en) 2020-08-20 2020-08-20 Information management method and information management system based on block chain digital currency finance
CN202110167727.9A Division CN112883111A (en) 2020-08-20 2020-08-20 Information management method, system and platform based on block chain digital currency finance

Publications (2)

Publication Number Publication Date
CN112016911A CN112016911A (en) 2020-12-01
CN112016911B true CN112016911B (en) 2021-08-27

Family

ID=73505197

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202110167727.9A Withdrawn CN112883111A (en) 2020-08-20 2020-08-20 Information management method, system and platform based on block chain digital currency finance
CN202110167734.9A Withdrawn CN112883112A (en) 2020-08-20 2020-08-20 Information management method and information management system based on block chain digital currency finance
CN202010841203.9A Active CN112016911B (en) 2020-08-20 2020-08-20 Information management method based on block chain digital currency finance and digital service platform

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN202110167727.9A Withdrawn CN112883111A (en) 2020-08-20 2020-08-20 Information management method, system and platform based on block chain digital currency finance
CN202110167734.9A Withdrawn CN112883112A (en) 2020-08-20 2020-08-20 Information management method and information management system based on block chain digital currency finance

Country Status (1)

Country Link
CN (3) CN112883111A (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115168878A (en) * 2021-07-24 2022-10-11 苏州宝凡电子科技有限公司 Cloud computing type block chain data processing system for digital product protection
CN116132142B (en) * 2022-12-30 2024-04-12 中国银联股份有限公司 Block chain attack interception method and device
CN116684870B (en) * 2023-08-03 2023-10-20 中国电力科学研究院有限公司 Access authentication method, device and system of electric power 5G terminal

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113904785A (en) * 2017-05-16 2022-01-07 江峰 Multi-center finite-area block chain authentication system with ownership currency issuing mechanism and block chain issuing mechanism
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
US20190180276A1 (en) * 2017-12-07 2019-06-13 Bank Of America Corporation Automated Event Processing Computing Platform for Handling and Enriching Blockchain Data
CN108985772B (en) * 2018-07-02 2022-03-18 上海达家迎信息科技有限公司 Block chain verification method, device, equipment and storage medium
CN109560938A (en) * 2019-01-23 2019-04-02 广州微盾科技股份有限公司 Based on the block catenary system for referring to human body biological characteristics identification technology
CN110991622B (en) * 2019-08-22 2021-06-04 腾讯科技(深圳)有限公司 Machine learning model processing method based on block chain network and node
CN110912712B (en) * 2019-12-18 2022-03-08 东莞市大易产业链服务有限公司 Service operation risk authentication method and system based on block chain
CN111461731A (en) * 2020-04-02 2020-07-28 江苏德绅智股权投资有限公司 Block chain monitoring system and method applied to financial transactions

Also Published As

Publication number Publication date
CN112883111A (en) 2021-06-01
CN112883112A (en) 2021-06-01
CN112016911A (en) 2020-12-01

Similar Documents

Publication Publication Date Title
CN112016911B (en) Information management method based on block chain digital currency finance and digital service platform
US11526614B2 (en) Continuous vulnerability management system for blockchain smart contract based digital asset using sandbox and artificial intelligence
CN100485702C (en) Method and apparatus for sequential authentication of user
US9697058B2 (en) Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor
CN111507470A (en) Abnormal account identification method and device
WO2021012904A1 (en) Data updating method and related device
CN113468520A (en) Data intrusion detection method applied to block chain service and big data server
CN112711757A (en) Data security centralized management and control method and system based on big data platform
CN113505394A (en) Data security processing method based on big data and cloud server
CN112214781A (en) Remote sensing image big data processing method and system based on block chain
CN114090985A (en) Method and device for setting user operation permission in block chain and electronic equipment
CN112069539B (en) Information protection method and artificial intelligence platform based on cloud computing and block chain service
CN114219596A (en) Data processing method based on decision tree model and related equipment
CN112115507B (en) Cloud service interaction method and big data platform based on cloud computing and information digitization
CN114780932B (en) Cross-block chain data interaction verification method, system and equipment for management three-mode platform
CN112019532B (en) Information management method based on mobile internet and biological authentication and cloud service platform
CN117546166A (en) Computer-implemented method and system for checking data anonymization
WO2019143360A1 (en) Data security using graph communities
US20220368701A1 (en) Automated clustering of sessions of unstructured traffic
CN113435517A (en) Abnormal data point output method and device, computer equipment and storage medium
CN112671774A (en) Cloud computing and block chain based big data analysis method and digital financial system
CN116977069A (en) Data processing method, device, equipment, medium and product
CN114862396A (en) Wind control method for sharing service platform, electronic equipment and storage medium
CN115115372A (en) Method and device for risk assessment of object, electronic equipment and readable storage medium
CN117742626A (en) Multi-factor authentication cloud printer access control method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210707

Address after: 450000 room 406, 4th floor, unit 1, building 6, 88 Hongda street, Jinshui District, Zhengzhou City, Henan Province

Applicant after: Henan Shengshi SongGe commercial operation management Co.,Ltd.

Address before: 650032 No.2, 17th floor, building 1, Baida international school, Shangyuan Road, high tech Zone, Kunming City, Yunnan Province

Applicant before: Wang Honggen

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant