CN112559489B - Cross-chain-based blockchain supervision method, device and storage medium - Google Patents
Cross-chain-based blockchain supervision method, device and storage medium Download PDFInfo
- Publication number
- CN112559489B CN112559489B CN202011449907.8A CN202011449907A CN112559489B CN 112559489 B CN112559489 B CN 112559489B CN 202011449907 A CN202011449907 A CN 202011449907A CN 112559489 B CN112559489 B CN 112559489B
- Authority
- CN
- China
- Prior art keywords
- chain
- custody
- supervision
- information
- blockchain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a block chain supervision method, device and storage medium based on cross-chain, wherein the method comprises the following steps: receiving registration requests of a plurality of regulated chains; verifying the connection state between the chain of custody and the plurality of regulated chains; receiving report information sent by a chain of custody before storing and uploading the blockchain data; checking the reported information to determine whether the reported information contains sensitive words; when the chain of custody detects that the report information contains sensitive words, the report information is stored, and warning information is sent to the corresponding chain of custody; and receiving a processing result which is sent by the chain of custody and is used for processing the blockchain data. The block chain supervision method based on the cross chain solves the problem that a plurality of chains have unified supervision demands, can carry out penetrating supervision on all the supervised chains by the unified supervision chains, unifies supervision rules, and evidences supervision behaviors and results.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a blockchain supervision method, device, and storage medium based on a cross-chain.
Background
Blockchain technology has evolved through multiple stages since its advent, and is becoming an important engine and motive force to promote economic development and to improve government efficiency. The blockchain industry in China is also in a high-speed development stage at present, along with continuous inflow of entrepreneurs and capital, the number of enterprises is rapidly increased, the blockchain application is also accelerating the landing, and the traditional industry transformation and upgrading are continuously assisted, so that the method is "cost reduction" and "efficiency improvement" for entity economy.
At the same time, a plurality of unknown potential safety hazards still exist in the new application state derived from the method, and the method brings unprecedented challenges to government management departments in the aspects of promoting the technological and industrial health, safety and sustainable development, preempting new ideological and political publicity areas, ensuring the controllable supervision of network content and the like.
In order to better supervise and manage the blockchain service in the environment, an on-chain supervision service construction scheme of the application of the interior blockchain is proposed according to the supervision requirement of the blockchain, and a comprehensive supervision and management mechanism is matched with the blockchain service in the environment.
The current supervision of the blockchain has the difficulty of communication among cross chains, the blockchain data is disclosed transparent and cannot be tampered, the centralized supervision system has great supervision difficulty on the decentralized blockchain service, does not have the functions of risk assessment, information active detection, content supervision and the like, and cannot provide the supervision capability of the blockchain service in the aspect of safety of content information.
Disclosure of Invention
The invention provides a block chain supervision method, device and storage medium based on cross-chain, which solve the technical problems and adopt the following technical scheme:
a cross-chain based blockchain supervision method, the method being suitable for a chain of supervision node, comprising the steps of:
receiving registration requests of a plurality of regulated chains;
verifying the connection state between the chain of custody and the plurality of regulated chains;
receiving report information sent by a chain of custody before storing and uploading the blockchain data;
checking the reported information to determine whether the reported information contains sensitive words;
when the chain of custody detects that the report information contains sensitive words, the report information is stored, and warning information is sent to the corresponding chain of custody;
and receiving a processing result which is sent by the chain of custody and is used for processing the blockchain data.
Further, receiving registration requests for several chains of custody includes:
registering a plurality of chain of custody through intelligent contracts running on the chain of custody, and storing registration information of each chain of custody in the chain of custody;
the rights of each chain of custody are set.
Further, the registration information includes: company code, company name, blockchain name, access address, and port number;
the supervision chain takes the company code as key, takes the company name, the blockchain name, the access address and the port number as value to form key value pairs and stores the key value pairs in a database of the supervision user;
the data structure of the company code as key is a mapping data structure, and the data structure of the company name, the blockchain name, the access address, and the port number as value is a struct data structure.
Further, the specific method for verifying the connection state between the chain of custody and the plurality of regulated chains is as follows:
the chain of custody sends heartbeat detection signals to the chain of custody at regular time to judge whether the chain of custody is normally connected with the chain of custody.
Further, the method further comprises: the chain of custody also judges the liveness of the chain of custody according to the return data of the chain of custody to the heartbeat detection.
Further, the warning information includes a risk level.
Further, the reported information includes a unique identification of blockchain data and transaction content;
the specific method for receiving the processing result of the blockchain data sent by the chain of custody comprises the following steps:
the chain of custody receives the first processing result or the second processing result of the chain of custody which is sent from the received warning information;
the method comprises the steps that a first processing result is analyzed by a chain under supervision to determine to discard a uplink after the block chain data which is tried to store the uplink at this time is analyzed, and the block chain data is cancelled to store the uplink operation and then is sent to the chain under supervision, wherein the first processing result information comprises a unique identifier and discard uplink marking information to select to discard the uplink;
and the second processing result is analyzed by the chain under supervision to determine to continue the uplink after the block chain data which is tried to be stored and uplink is stored and is sent to the chain under supervision, and the second processing result information comprises a unique identifier, a continuous uplink mark and transaction detailed information.
Further, after receiving second processing result information of continuous uplink sent by the chain under supervision, the chain under supervision saves the second processing result information and sends a control instruction to the chain under supervision to mask sensitive words in the block chain data of the uplink; and the chain of supervision also carries out verification on the shielding processing result after sending the control instruction.
Further, when the word stock for storing the sensitive words in the chain of custody is updated, the chain of custody sends a patrol instruction to the plurality of chains of custody to control the chain of custody to rescan all data that has been up-chain.
An electronic device, the electronic device comprising:
a processor; and
a memory having stored thereon a computer program executable by the processor;
the processor runs a computer program to implement the steps of the cross-chain based blockchain supervision method described previously.
A computer readable storage medium having stored thereon computer instructions which when executed by a processor implement the steps of the cross-chain based blockchain supervision method described above.
The cross-chain-based blockchain supervision method, device and storage medium provided by the invention have the beneficial effects that the problem that multiple chains have unified supervision demands is solved, all the supervised chains can be subjected to penetrating supervision by the unified supervision chain, the supervision rules are unified, and the supervision behaviors and results are verified.
Drawings
FIG. 1 is a flow diagram of a cross-chain based blockchain supervision method provided by embodiments of the present application;
fig. 2 is a block diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The invention is described in detail below with reference to the drawings and the specific embodiments.
As shown in fig. 1, the block chain supervision method based on cross-chain of the present invention is suitable for a supervision chain node, and comprises the following steps: s1: a registration request is received for a number of chains under supervision. S2: the connection state between the chain of custody and the number of the chain of custody is verified. S3: and receiving report information sent by the chain of custody before storing and uploading the blockchain data. S4: and checking the reported information to determine whether the reported information contains sensitive words. S5: and when the chain of custody detects that the report information contains the sensitive word, the report information is stored, and warning information is sent to the corresponding chain of custody. S6: and receiving a processing result which is sent by the chain of custody and is used for processing the blockchain data. Through the block chain supervision method based on the cross chain, the unified supervision chain can carry out penetration supervision on all the supervised chains, unified supervision rules and store supervision behaviors and results. The above steps are specifically described below.
For step S1: a registration request is received for a number of chains under supervision.
Registration and permission admission are performed on the chain of custody by using the public transparent executable characteristics of the intelligent contract. Specifically, several chains under supervision are registered by means of an intelligent contract running on the chain under supervision, and registration information of each chain under supervision is stored in the chain under supervision. And the authority of each chain under supervision is set, so that each chain under supervision can only check own information on the chain under supervision, and the information security is ensured. Wherein the registration information includes: company code, company name, blockchain name, access address, and port number. The company code is a social unified identification code of the company. The blockchain name is the name of the blockchain registered at the current level. It will be appreciated that a company may operate several different services, which correspond to different blockchains. Each blockchain is assigned a name that distinguishes between different blockchains under the same corporate name. The chain of custody may be connected into the blockchain of registration by access addresses and port numbers.
Further, in the present invention, the chain of custody stores company codes as keys and company names, blockchain names, access addresses, and port numbers as value constituent key pairs in the monitoring user database. The data structure of the company code as the key is a mapping data structure, and the data structure of the company name, the blockchain name, the access address and the port number as the value is a struct data structure. The data structure in the form of key value pairs can quickly find out the registration information of a certain company under the condition of knowing the unique identification, and the behavior belongs to random reading, so that the efficiency can be improved by using the data structure. value is taken as an information field of a company, the company is attached with a specific attribute, and the expansibility of the company is considered, so that the struct data structure meets the condition.
For step S2: the connection state between the chain of custody and the number of the chain of custody is verified.
After registering the chain of custody through step S1, the chain of custody accesses the chain of custody through the registered access address and port number. And the chain of custody sends heartbeat detection signal to the chain of custody at regular time and judges whether to connect with the chain of custody normally. And if the connection is abnormal, notifying the chain to be regulated to perform manual intervention treatment. Under the condition of normal connection, the chain of custody judges the activity degree of the chain of custody according to the return data of the chain of custody to the heartbeat detection. The data returned by the heartbeat detection comprises block information and transaction summary information.
For step S3: and receiving report information sent by the chain of custody before storing and uploading the blockchain data.
The chain of custody needs to store and uplink the blockchain data corresponding to the transaction when the transaction occurs in the blockchain during operation. Before the chain of custody stores and uploads the blockchain data, reporting information is sent to the chain of custody. Wherein the reported information includes a unique identification of blockchain data and transaction content. The unique identifier is the number corresponding to the blockchain data and is the unique identification code of the blockchain data. The transaction content is the content which needs to be uplink at this time.
For step S4: and checking the reported information to determine whether the reported information contains sensitive words.
Specifically, the chain of custody stores a sensitive word stock, automatically compares and matches the reported information with keywords in the sensitive word stock, and identifies whether the blockchain data of the transaction contains the sensitive word. When the sensitive word is not matched, the chain of custody returns confirmation information to the corresponding chain of custody, and the chain of custody uplinks the blockchain data.
For step S5: and when the chain of custody detects that the report information contains the sensitive word, the report information is stored, and warning information is sent to the corresponding chain of custody.
When the matching result in the step S4 shows that the report information includes a sensitive word, the chain of custody first stores the report information and sends the warning information to the corresponding chain of custody. Wherein, the warning information contains a risk level. The risk level is dependent on the level of matching to the sensitive word. Specifically, when the chain of custody detects that the report information contains the sensitive word, the chain of custody is carried out on the report information to generate a hash, and the generated hash can be used for tracing the detection behavior of the sensitive word of the chain of custody.
For step S6: and receiving a processing result which is sent by the chain of custody and is used for processing the blockchain data.
The chain under supervision who receives warning information processes the chain of block data who tries to store the chain of block this time and sends the processing result to the chain of supervision, chain of supervision can report to be processed the result of chain of supervision and report and go on chain of supervision and deposit the certificate and generate the hash, and the hash of formation can be used to the traceability of chain of supervision sensitive word detection action, prevents chain of supervision repudiation.
Specifically, the chain under supervision analyzes the blockchain data that is attempting to store the uplink this time to determine whether to continue storing the uplink. When the discard of the uplink is selected, the storage of the uplink operation on the blockchain data is canceled, and first processing result information of the discard of the uplink is sent to the chain of custody, wherein the first processing result information comprises a unique identification and a discard uplink mark. And when the continuous uplink is selected, storing the blockchain data, and sending second processing result information of the continuous uplink to the chain of custody, wherein the second processing result information comprises a unique identifier, a continuous uplink mark and transaction detailed information, and the transaction detailed information is added with detailed transaction content on the basis of the transaction information. The transaction detailed information includes transaction information, a transaction initiator account, a transaction receiver account, a transaction type, a time of transaction production, and the like.
For transactions with sensitive word risks, the operator of the chain of custody first judges whether canceling the transaction brings great influence to the current service, if the influence is not great, the transaction can be selectively terminated, and the corresponding blockchain data cannot be uplink. In this case, the chain of custody transmits the first processing result information to the chain of custody. It will be appreciated that in some cases, terminating a current transaction may have a significant impact on the chain of custody business. And the party of the chain of custody chooses to continue the transaction in order not to influence the normal operation of the service, saves the block chain data uplink in the block chain, and sends second processing result information to the chain of custody.
Preferably, after receiving the second processing result information of the continuous uplink sent by the chain under supervision, the supervision link stores the second processing result information and sends a supervision instruction to the chain under supervision to mask the sensitive words in the block chain data of the uplink. Because the blockchain is an decentralized service application, the management and control instruction needs to be commonly recognized to each node on the monitored chain in order to realize the decentralized management and control, and therefore, the basic intelligent contract is adopted, namely, the management and control intelligent contract is generated when the blockchain system is started.
Further, the chain of custody also verifies the masking results after sending the management and control instructions. The verification method can be set according to actual needs. In this embodiment, verification is performed by accessing a sensitive word on the chain of custody that issues a management instruction. If the shielding is successful, the verification is passed, and if the shielding is unsuccessful, the verification is not passed, and the manual intervention is performed.
It will be appreciated that when a thesaurus update in the chain of custody is used to store sensitive words, sensitive information may exist for content that the chain of custody has originally been trained on. Therefore, each time the word stock for storing the sensitive words in the chain of supervision is updated, the chain of supervision sends a patrol instruction to a plurality of chains of supervision, and each chain of supervision carries out rescanning detection on all data which are already in the chain after receiving the patrol instruction, and the sensitive words in the chain of supervision data are identified. After the scanning detection is completed, the chain of supervision sends the scanning detection result back to the chain of supervision. And if the existence of the sensitive information is found after rescanning and detection, shielding the detected sensitive information.
Fig. 2 is a block diagram of an electronic device based on a cross-chain blockchain supervision method according to an embodiment of the present application, and the electronic device is intended to represent various forms of digital computers, such as desktop computers, workstations, servers, and other suitable computers. The electronic device may also represent various forms of mobile devices, such as smartphones, wearable smartphones, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the application described and/or claimed herein.
As shown in fig. 2, the electronic device includes: the processor 21 and the memory 22 and interfaces for connecting the respective components include a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. Wherein the memory 22 has stored thereon a computer program executable by the processor 21. The steps of the cross-chain based blockchain supervision method provided in the embodiments of the present application are not described herein in detail.
The electronic device may further include: an input device 23 and an output device 24. The processor 21, the memory 22, the input device 23 and the output device 24 may be connected by a bus or otherwise, in fig. 2 by a bus. The input device 23 may receive input numeric or character information such as a touch screen, a keypad, a mouse, a track pad, a touch pad, etc. The output means 24 may include a display device, auxiliary lighting means, tactile feedback means, and the like.
The embodiments of the present application provide a storage medium storing executable instructions, where the executable instructions are stored, when the executable instructions are executed by a processor, the executable instructions will cause the processor to perform the method provided in the embodiments of the present application, and therefore, a detailed description will not be given here. In addition, the description of the beneficial effects of the same method is omitted. In some embodiments, the storage medium may be a flash memory, a magnetic surface memory, an optical disk, or a disk memory; but may be a variety of devices including one or any combination of the memories 22 described above. In some embodiments, the executable instructions may be in the form of programs, software modules, scripts, or code, written in any form of programming language (including compiled or interpreted languages, or declarative or procedural languages), and they may be deployed in any form, including as stand-alone programs or as modules, components, subroutines, or other units suitable for use in a computing environment. As an example, the executable instructions may, but need not, correspond to files in a file system, may be stored as part of a file that holds other programs or data, for example, in one or more scripts in a hypertext markup language (Hyper Text Markup Language, HTML) document, in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub-programs, or portions of code). As an example, executable instructions may be deployed to be executed on one onboard computing device or on multiple computing devices located at one site or, alternatively, on multiple computing devices distributed across multiple sites and interconnected by a communication network.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be appreciated by persons skilled in the art that the above embodiments are not intended to limit the invention in any way, and that all technical solutions obtained by means of equivalent substitutions or equivalent transformations fall within the scope of the invention.
Claims (8)
1. A cross-chain based blockchain supervision method, the method being applicable to a chain of custody, comprising the steps of:
receiving registration requests of a plurality of regulated chains;
verifying a connection state between the chain of custody and a number of the chain of custody;
receiving report information sent by the chain under supervision before storing and uploading the blockchain data;
checking the reported information to determine whether the reported information contains sensitive words or not;
when the chain of custody detects that the report information contains sensitive words, the report information is stored, and warning information is sent to the corresponding chain of custody;
receiving a processing result which is sent by the chain of custody and used for processing the blockchain data;
the reported information comprises a unique identifier of the blockchain data and transaction content;
the specific method for receiving the processing result of the blockchain data sent by the chain of custody comprises the following steps:
the chain of custody receives a first processing result or a second processing result sent from the chain of custody receiving the alert information;
the first processing result is analyzed by the chain under supervision to determine to give up the uplink after the block chain data which is tried to store the uplink this time, and the block chain data is canceled from storing the uplink operation and then is sent to the chain under supervision, and the first processing result information comprises the unique identifier and the uplink giving up mark information to select to give up the uplink;
the second processing result is analyzed by the chain under supervision to determine to continue the uplink after the block chain data which is tried to be stored and uplink is carried out on the block chain data, and then the second processing result is sent to the chain under supervision, wherein the second processing result information comprises the unique identifier, the continuous uplink mark and transaction detailed information;
the supervision link stores the second processing result information after receiving the second processing result information which is sent by the supervision link and is used for continuing to uplink, and sends a management and control instruction to the supervision link to carry out shielding processing on sensitive words in the block chain data of the uplink;
and the chain of custody also checks the shielding processing result after sending the management and control instruction.
2. The cross-chain based blockchain supervision method of claim 1, wherein,
receiving registration requests for several chains under supervision includes:
registering a plurality of the chain of custody through an intelligent contract running on the chain of custody, and storing registration information of each of the chain of custody in the chain of custody;
the authority of each chain of supervision is set.
3. The cross-chain based blockchain supervision method of claim 2, wherein,
the registration information includes: company code, company name, blockchain name, access address, and port number;
the chain of custody takes the company code as a key, takes the company name, the blockchain name, the access address and the port number as a value composition key value pair and stores the key value pair in a user database of a monitoring user;
the data structure of the company code as key is a mapping data structure, and the data structures of the company name, the blockchain name, the access address and the port number as value are struct data structures.
4. The cross-chain based blockchain supervision method of claim 1, wherein,
the specific method for verifying the connection state between the chain of custody and the plurality of the chain of custody comprises the following steps:
and the chain of custody sends heartbeat detection signals to the chain of custody at regular time to judge whether the chain of custody is normally connected with the chain of custody.
5. The cross-chain based blockchain supervision method of claim 4, further comprising:
and the chain of custody also judges the activity degree of the chain of custody according to the return data of the chain of custody to the heartbeat detection.
6. The cross-chain based blockchain supervision method of claim 1, wherein,
when the word stock for storing the sensitive words in the chain of custody is updated, the chain of custody sends a patrol instruction to a plurality of the chains of custody to control the chain of custody to rescan all data which is already in the chain of custody.
7. An electronic device, the electronic device comprising:
a processor; and
a memory having stored thereon a computer program executable by the processor;
the processor runs the computer program to implement the steps of the cross-chain based blockchain supervision method as defined in any one of claims 1 to 6.
8. A computer readable storage medium having stored thereon computer instructions which when executed by a processor implement the steps of the cross-chain based blockchain supervision method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011449907.8A CN112559489B (en) | 2020-12-11 | 2020-12-11 | Cross-chain-based blockchain supervision method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011449907.8A CN112559489B (en) | 2020-12-11 | 2020-12-11 | Cross-chain-based blockchain supervision method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112559489A CN112559489A (en) | 2021-03-26 |
CN112559489B true CN112559489B (en) | 2023-07-07 |
Family
ID=75061500
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011449907.8A Active CN112559489B (en) | 2020-12-11 | 2020-12-11 | Cross-chain-based blockchain supervision method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112559489B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113672989A (en) * | 2021-07-30 | 2021-11-19 | 广东浪潮智慧计算技术有限公司 | Block chain key information detection method, system, device and readable storage medium |
CN115439249B (en) * | 2022-09-01 | 2023-09-26 | 国网区块链科技(北京)有限公司 | Method, device and system for realizing business service of cross-region block chain |
CN116257190B (en) * | 2023-05-16 | 2023-07-18 | 启迪万众网络科技(北京)有限公司 | Data supervision system based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902080A (en) * | 2019-01-24 | 2019-06-18 | 北京太一智源科技有限公司 | The data monitoring and managing method of block chain |
CN110457957A (en) * | 2019-08-22 | 2019-11-15 | 腾讯科技(深圳)有限公司 | Information processing method, device, electronic equipment and the medium of electronic bill |
CN111683059A (en) * | 2020-05-18 | 2020-09-18 | 国网浙江省电力有限公司信息通信分公司 | Method, system, equipment and storage medium for monitoring main chain-side chain |
CN112055002A (en) * | 2020-08-24 | 2020-12-08 | 杭州云象网络技术有限公司 | Cross-link network supervision method based on public governance link |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019237126A1 (en) * | 2018-06-08 | 2019-12-12 | Gcp Ip Holdings I, Llc | Blockchain overwatch |
-
2020
- 2020-12-11 CN CN202011449907.8A patent/CN112559489B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109902080A (en) * | 2019-01-24 | 2019-06-18 | 北京太一智源科技有限公司 | The data monitoring and managing method of block chain |
CN110457957A (en) * | 2019-08-22 | 2019-11-15 | 腾讯科技(深圳)有限公司 | Information processing method, device, electronic equipment and the medium of electronic bill |
CN111683059A (en) * | 2020-05-18 | 2020-09-18 | 国网浙江省电力有限公司信息通信分公司 | Method, system, equipment and storage medium for monitoring main chain-side chain |
CN112055002A (en) * | 2020-08-24 | 2020-12-08 | 杭州云象网络技术有限公司 | Cross-link network supervision method based on public governance link |
Also Published As
Publication number | Publication date |
---|---|
CN112559489A (en) | 2021-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112559489B (en) | Cross-chain-based blockchain supervision method, device and storage medium | |
CN110462623B (en) | System and method for role-based computer security configuration | |
CN112187792A (en) | Network information safety protection system based on internet | |
CN102176722B (en) | Method and system for preventing page tampering based on front-end gateway | |
CN101777062A (en) | context-aware real-time computer-protection systems and methods | |
CN114612103B (en) | Method, device, system, medium and electronic equipment for cross-block chain transaction | |
CN102037472A (en) | Software reputation establishment and monitoring system and method | |
US20210104326A1 (en) | Detecting prescription drug abuse using a distributed ledger and machine learning | |
CN114844792B (en) | Dynamic monitoring method, device, equipment and storage medium based on LUA language | |
CN112948275A (en) | Test data generation method, device, equipment and storage medium | |
CN112528307A (en) | Service request checking method and device, electronic equipment and storage medium | |
US9230105B1 (en) | Detecting malicious tampering of web forms | |
WO2021247913A1 (en) | Dynamic, runtime application programming interface parameter labeling, flow parameter tracking and security policy enforcement | |
CN111782456B (en) | Anomaly detection method, device, computer equipment and storage medium | |
WO2021192191A1 (en) | Abnormal access prediction system, abnormal access prediction method, and program recording medium | |
US11805096B2 (en) | Technique for restricting access to information | |
CN116112194A (en) | User behavior analysis method and device, electronic equipment and computer storage medium | |
CN115081016A (en) | Log desensitization method and device, electronic equipment and storage medium | |
CN111899018A (en) | Order data processing method, device, server and storage medium | |
CN115086047B (en) | Interface authentication method and device, electronic equipment and storage medium | |
CN116089920A (en) | Sensitive field early warning method, system, computer equipment and medium | |
US20130046560A1 (en) | System and method for deterministic and probabilistic match with delayed confirmation | |
CN114357032A (en) | Data quality monitoring method and device, electronic equipment and storage medium | |
CN102103507A (en) | System updating method and computer system | |
CN112597490A (en) | Security threat arrangement response method and device, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |