CN112954037A - Domain name abuse processing method and system based on alliance chain - Google Patents

Domain name abuse processing method and system based on alliance chain Download PDF

Info

Publication number
CN112954037A
CN112954037A CN202110150049.5A CN202110150049A CN112954037A CN 112954037 A CN112954037 A CN 112954037A CN 202110150049 A CN202110150049 A CN 202110150049A CN 112954037 A CN112954037 A CN 112954037A
Authority
CN
China
Prior art keywords
node
nodes
initial
processing result
target processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110150049.5A
Other languages
Chinese (zh)
Inventor
尉迟学彪
曾宇
李洪涛
董科军
延志伟
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Internet Network Information Center
Original Assignee
China Internet Network Information Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Internet Network Information Center filed Critical China Internet Network Information Center
Priority to CN202110150049.5A priority Critical patent/CN112954037A/en
Publication of CN112954037A publication Critical patent/CN112954037A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a domain name abuse processing method and system based on a alliance chain, wherein the alliance chain consists of all monitoring authorities, each monitoring authority corresponds to at least one node on the alliance chain, and the domain name abuse reporting data is broadcasted to all nodes on the alliance chain in response to the fact that an initial node receives the domain name abuse reporting data, so that at least part of the nodes of all the nodes conduct initial audit on the domain name abuse reporting data; sending the received initial audit information aiming at the domain name abuse report data to an initial node; responding to the initial node to identify the initial audit information and obtaining a target processing result; and feeding back the target processing result to all nodes on the alliance chain, so that all nodes can acquire the target processing result. The invention realizes the unified auditing and processing of domain abuse based on the alliance chain, ensures the objectivity of the domain abuse auditing and processing and improves the accuracy of the processing result.

Description

Domain name abuse processing method and system based on alliance chain
Technical Field
The invention relates to the technical field of domain name supervision, in particular to a domain name abuse processing method and system based on a alliance chain.
Background
Domain name abuse is accompanied with domain name service, has become a big feature of domain name service ecology, and shows a rapid spreading trend. In recent years, with the rapid development of the internet and the continuous introduction of New generic top-level domain names (New gTLD), and influenced by the numerical background of scene transition from offline to online, the number of global top-level domain names is continuously increased, domain name service organizations are also rapidly increased, the amount of global domain names kept is continuously increased, the price of domain names kept is continuously reduced, the cost of domain name abuse is reduced, and the domain name abuse phenomenon is very common.
Domain abuse audit handling is a key core environment for domain abuse processing. At present, although the industry has adopted many ways to implement domain name abuse auditing, the existing domain name abuse auditing process still has many problems. If the auditing processing mechanisms are not uniform, the auditing processing standards of different organizations are different; the audit processing data is lack of sharing, and the data among the organizations is not transparent; the auditing processing result is not authoritative and has larger interference by subjective factors. Therefore, the existing monitoring and auditing processing result for domain name abuse lacks objectivity, so that the processing result is inaccurate.
Disclosure of Invention
In order to solve the problems, the invention provides a domain name abuse processing method and system based on a federation chain, which ensure the objectivity of domain name abuse examination and verification processing and improve the accuracy of processing results.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for domain name abuse handling based on a federation chain, the federation chain consisting of individual supervisors, each supervisors corresponding to at least one node on the federation chain, the method comprising:
responding to the initial node receiving the domain misuse reporting data, broadcasting the domain misuse reporting data to all nodes on the alliance chain, and enabling at least part of nodes of all nodes to conduct initial audit on the domain misuse reporting data;
sending the received initial audit information aiming at the domain name abuse report data to the initial node;
responding to the initial node to identify the initial auditing information and obtaining a target processing result;
and feeding back the target processing result to all nodes on the alliance chain, so that all nodes can acquire the target processing result.
Optionally, the method further comprises:
and responding to the initial node to generate the target processing result, and determining the credit value of the part of nodes subjected to initial examination.
Optionally, at least some of the nodes include nodes having a rating condition for the domain name abuse reporting data.
Optionally, the performing, by responding to the initial node, a determination process on the initial audit information to obtain a target processing result includes:
and performing weighting processing on the initial auditing information generated by each node of the partial nodes and the credit value corresponding to each node to obtain a target processing result.
Optionally, the determining the credit value of the partial node performing the initial audit in response to the initial node generating the target processing result includes:
if the initial audit information of a first node in the part of the initially audited nodes is consistent with the target processing result, broadcasting to each node of the alliance chain to increase a first credit value for the first node;
and if the initial audit information of the second node in the part of the initially audited nodes is inconsistent with the target processing result, broadcasting to each node of the alliance chain to reduce a second credit value for the first node.
A domain name abuse processing system based on a federation chain, the federation chain being composed of individual supervisors, each supervisor corresponding to at least one node on the federation chain, the system comprising:
the initial node is used for receiving the domain misuse reporting data and broadcasting the domain misuse reporting data to all nodes on the alliance chain;
at least part of all the nodes are used for performing initial audit on the domain name abuse report data, generating initial audit information and sending the initial audit information to the initial nodes;
the initial node is further configured to identify the initial audit information and obtain a target processing result;
the initial node is further configured to feed back the target processing result to all nodes in the federation chain, so that all nodes learn the target processing result.
Optionally, the initial node is further configured to:
and determining the credit value of the part of the nodes subjected to the initial examination based on the target processing result.
Optionally, at least some of the nodes include nodes having a rating condition for the domain name abuse reporting data.
Optionally, all nodes on the federation chain are configured to:
when the domain misuse reporting data is received, determining whether an evaluation condition of the domain misuse reporting data is satisfied, so that the node satisfying the evaluation condition is determined as the partial node.
Optionally, the initial node is specifically configured to:
if the initial audit information of a first node in the part of the initially audited nodes is consistent with the target processing result, broadcasting to each node of the alliance chain to increase a first credit value for the first node;
and if the initial audit information of the second node in the part of the initially audited nodes is inconsistent with the target processing result, broadcasting to each node of the alliance chain to reduce a second credit value for the first node.
Compared with the prior art, the invention provides a domain name abuse processing method and system based on a alliance chain, wherein the alliance chain consists of all monitoring authorities, each monitoring authority corresponds to at least one node on the alliance chain, and the domain name abuse reporting data is broadcasted to all nodes on the alliance chain in response to the initial node receiving the domain name abuse reporting data, so that at least part of the nodes of all the nodes perform initial audit on the domain name abuse reporting data; sending the received initial audit information aiming at the domain name abuse report data to an initial node; responding to the initial node to identify the initial audit information and obtaining a target processing result; and feeding back the target processing result to all nodes on the alliance chain, so that all nodes can acquire the target processing result. The invention realizes the unified auditing and processing of domain abuse based on the alliance chain, ensures the objectivity of the domain abuse auditing and processing and improves the accuracy of the processing result.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of a domain name abuse processing method based on a federation chain according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a domain name abuse processing system based on a federation chain according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first" and "second," and the like in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not set forth for a listed step or element but may include steps or elements not listed.
The embodiment of the invention provides a domain name abuse processing method based on a alliance chain, which can effectively integrate the functions of all monitoring organizations, and realize the unified audit and unified processing of domain name abuse by taking the alliance chain as a unified inlet and a unified outlet of the domain name abuse supervision, thereby effectively realizing the sharing problem of the domain name abuse treatment process and effectively solving the problems of non-unified standard, opaque data and great influence of subjective factors of the current traditional domain name abuse audit processing.
Referring to fig. 1, a schematic flowchart of a domain name abuse processing method based on a federation chain is shown, where the federation chain is composed of various supervisors, and each supervisors corresponds to at least one node on the federation chain, and the method includes:
s101, responding to the fact that the initial node receives domain misuse reporting data, and broadcasting the domain misuse reporting data to all nodes on the alliance chain.
The alliance chain is formed by all monitoring organizations, and after any initial node receives the reporting data abused by the domain name, the reporting data is broadcasted to all nodes on the alliance chain, so that at least part of nodes of all the nodes conduct initial examination on the reporting data abused by the domain name. The reporting data abused by the domain name can be data received by an entrance of the alliance chain and can be data sent by a node under the chain.
The initial node refers to a node corresponding to any supervision institution. Each node (i.e. nodes corresponding to all regulatory agencies) in the federation first determines whether the reporting data has evaluation capability, that is, after each node receives broadcast domain misuse reporting data, it first determines whether its own node meets evaluation conditions, and if so, it will perform initial evaluation on the current reporting data. The evaluation condition can be determined according to the node authority and the capability of the corresponding node of the supervision mechanism and the attribute information related to the reported data. For example, if the domain name camouflage level related to the current domain name misuse reporting data is high, a node having the domain name identification level needs to perform preliminary review. Further, in order to ensure the efficiency of the processing, the partial nodes capable of performing the initial audit need to feed back the initial opinion regarding the report data to the initial node within a predetermined time limit, that is, step S102 is executed.
S102, sending the received initial auditing information aiming at the domain name abuse report data to the initial node.
S103, responding to the initial node to identify the initial auditing information, and obtaining a target processing result.
S104, feeding the target processing result back to all nodes on the alliance chain, so that all the nodes can acquire the target processing result.
The initial node integrates the initial auditing information of each node on the reported data and the credit value corresponding to each node, finally determines whether the reported data has domain name abuse, and obtains the final target processing result of the reported data of the officer, namely the final determination opinion. The report data may then be processed accordingly based on the target processing result, such as to prohibit receiving an access request for information at the domain name. And simultaneously, feeding back the target processing result to all nodes on the alliance chain.
Correspondingly, the embodiment of the invention also comprises the following steps:
and responding to the initial node to generate the target processing result, and determining the credit value of the part of nodes subjected to initial examination.
That is, after the initial node determines the target processing result, the credit reward of each node participating in the initial assessment may be determined based on the validation process of the reported data, i.e., the credit value of each node participating in the initial assessment may be updated.
Each node on the federation chain in an embodiment of the present invention corresponds to an entity authority such as a domain name authority, a domain name registrar, a network security vendor, an academic research institute, a third party evaluation institute, and so forth. Any entity authority that wants to join the federation chain needs to be given more than half of the nodes' consent to join.
The invention provides a domain name abuse processing method based on a alliance chain, wherein the alliance chain consists of all monitoring authorities, each monitoring authority corresponds to at least one node on the alliance chain, the domain name abuse reporting data is broadcasted to all nodes on the alliance chain in response to the fact that an initial node receives the domain name abuse reporting data, and at least part of the nodes conduct initial audit on the domain name abuse reporting data; sending the received initial audit information aiming at the domain name abuse report data to an initial node; responding to the initial node to identify the initial audit information and obtaining a target processing result; and feeding back the target processing result to all nodes on the alliance chain, so that all nodes can acquire the target processing result. The invention realizes the unified auditing and processing of domain abuse based on the alliance chain, ensures the objectivity of the domain abuse auditing and processing and improves the accuracy of the processing result.
The following is a description of a specific implementation process that can be implemented in the embodiments of the present invention.
The consensus mechanism of the blockchain has the characteristics of 'few obedience majority' and 'human-equal', wherein the 'few obedience majority' does not complete the number of nodes, and can also be the computing power, the stock weight or other characteristic quantities which can be compared by a computer. "equal people" means that when the nodes meet the condition, all the nodes have the right to present the consensus node in priority, are directly identified by other nodes, and finally can become the final consensus result.
The block chains are further divided into a common chain, a private chain and a federation chain according to different application scenarios. The common chain is a block chain which is disclosed in the whole network and has no user authorization mechanism. All nodes in the network in the private chain master the blockchain in the hands of one organization. Federation chains allow authorized nodes to join a network, can view information according to permissions, are often used for blockchains between enterprises, and may also be referred to as industry chains.
The domain abuse processing method based on the alliance chain provided by the embodiment of the invention adopts the alliance chain as a data storage and transmission carrier in the domain abuse supervision processing process, and adopts the decentralized characteristic of the block chain to audit the domain abuse through the intelligent contract specification, so that the unification of the reporting and confirming standards in the domain abuse supervision process is realized, and the safe and reliable opening and sharing of supervision data and audit results are realized.
Specifically, after any initial node on the federation chain receives the report data abused by the domain name, the report data is broadcasted to all nodes on the federation chain. Each node in the federation chain will first determine whether the reporting data has the rating capability and feed back initial audit information (i.e., initial opinion) about the reporting data to the initiating node within a specified time limit. The embodiment of the invention does not specifically limit the acquisition mode of the evaluation capability of the report data by each node.
The initial nodes integrate the initial affirmation opinions of the reporting data and the credit values of the nodes, carry out final comprehensive affirmation on whether domain name abuse exists in the reporting data or not, obtain the final affirmation opinions about the reporting data through preset rule calculation, collect the final affirmation opinions to carry out corresponding treatment on the reporting data, feed the final affirmation opinions and the processing results back to all the nodes on a alliance chain, and carry out corresponding credit awards on the nodes based on the affirmation process of the reporting data.
Correspondingly, if the initial audit information of a first node in the part of the nodes subjected to initial audit is consistent with the target processing result, broadcasting to each node of the alliance chain to increase a first credit value for the first node; and if the initial audit information of the second node in the part of the initially audited nodes is inconsistent with the target processing result, broadcasting to each node of the alliance chain to reduce a second credit value for the first node. The first node and the second node are only nodes used for distinguishing whether the nodes are consistent with the target processing result, and correspondingly, the number of the first node and the second node may be one or more. The first credit value may represent an increasing credit value by one magnitude and the second credit value may represent a decreasing credit value by one magnitude, wherein the first credit value may represent the same value or a different value than the second credit value, depending on the particular application scenario.
It should be noted that, in the present invention, the predetermined time limit is a preset time period, which is not limited in the present invention, and the time period may be set according to the processing performance and the response failure. The final affirmation opinion is calculated based on a preset rule, the rule is obtained based on the initial affirmation opinion of each node on the reported data and the credit value of each node in a weighted and integrated mode, and other calculation modes can be adopted to predict a target processing result according to the initial auditing information through a data processing model. The credit reward process is mainly performed based on whether the initial opinion and the final opinion of each node are consistent. If the two are consistent, a certain number of preset credit values are added to the node, otherwise, a certain number of preset credit values are deducted from the node, and the embodiment does not specifically limit the specific number of the preset credit values.
In the embodiment of the invention, the target processing result is obtained based on the initial auditing of part of nodes of the alliance block chain and the target processing of the initial nodes, so that the subjective interference of a single mechanism is avoided in the authentication process of abusing the reported data by the domain name, the accuracy and the reliability are high, and the fair and efficient auditing processing of the reported data can be realized. In addition, the process does not relate to the improvement of the existing systems of all organizations for the supervision organization, can realize smooth access, is transparent to internet users, and can submit complaint report information through the existing entrance. The domain name abuse reporting standard is unified in a co-treatment sharing mode, the subjective factors of a single mechanism are avoided, and the disposal efficiency of a supervision mechanism is improved; the intelligent contract is used for rewarding the auditing process of the organization, so that the organization is promoted to promote the self public trust by efficient participation and disposal; meanwhile, respective service flows and service systems of different supervision authorities are fully considered, and the alliance chain is only used as a unified entry and a processing result exit of data reporting, and does not relate to the transformation of the existing service systems of the supervision authorities; the alliance chain is adopted to record domain name abuse data which is determined and handled by each monitoring organization, the data is opened and shared uniformly for each monitoring organization, and replacement and tampering in the later period are avoided.
Referring to fig. 2, in an embodiment of the present invention, a domain name abuse processing system based on a federation chain is further provided, where the federation chain is composed of various monitoring authorities, and each monitoring authority corresponds to at least one node on the federation chain, as shown in fig. 2, a monitoring authority a corresponds to a node 1, a monitoring authority B corresponds to a node 2, a monitoring authority C corresponds to a node 3, and a monitoring authority D corresponds to a node 4, and an initial node is a node corresponding to any monitoring authority, and in fig. 2, is a node N corresponding to a monitoring authority N.
The initial node is used for receiving the domain misuse reporting data and broadcasting the domain misuse reporting data to all nodes on the alliance chain;
at least part of all the nodes are used for performing initial audit on the domain name abuse report data, generating initial audit information and sending the initial audit information to the initial nodes;
the initial node is further configured to identify the initial audit information and obtain a target processing result;
the initial node is further configured to feed back the target processing result to all nodes in the federation chain, so that all nodes learn the target processing result.
Further, the initial node is further configured to:
and determining the credit value of the part of the nodes subjected to the initial examination based on the target processing result.
Further, at least some of the nodes include nodes having a rating condition for the domain name abuse reporting data.
Further, all nodes on the federation chain are to:
when the domain misuse reporting data is received, determining whether an evaluation condition of the domain misuse reporting data is satisfied, so that the node satisfying the evaluation condition is determined as the partial node.
Further, the initial node is specifically configured to:
if the initial audit information of a first node in the part of the initially audited nodes is consistent with the target processing result, broadcasting to each node of the alliance chain to increase a first credit value for the first node;
and if the initial audit information of the second node in the part of the initially audited nodes is inconsistent with the target processing result, broadcasting to each node of the alliance chain to reduce a second credit value for the first node.
The embodiment of the invention provides a domain misuse processing system based on a alliance chain, wherein the alliance chain consists of various monitoring authorities, each monitoring authority corresponds to at least one node on the alliance chain, and the domain misuse reporting data is broadcasted to all nodes on the alliance chain in response to the fact that the initial node receives the domain misuse reporting data, so that at least part of the nodes of all the nodes conduct initial audit on the domain misuse reporting data; sending the received initial audit information aiming at the domain name abuse report data to an initial node; responding to the initial node to identify the initial audit information and obtaining a target processing result; and feeding back the target processing result to all nodes on the alliance chain, so that all nodes can acquire the target processing result. The invention realizes the unified auditing and processing of domain abuse based on the alliance chain, ensures the objectivity of the domain abuse auditing and processing and improves the accuracy of the processing result.
Based on the foregoing embodiments, embodiments of the present application provide a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement the federation chain-based domain name abuse processing method steps as in any one of the above.
The embodiment of the present invention further provides a domain name abuse processing apparatus based on a federation chain, where the federation chain is composed of various regulatory agencies, each regulatory agency corresponds to at least one node on the federation chain, and the apparatus includes:
the broadcasting unit is used for responding to the fact that the initial node receives domain misuse reporting data, broadcasting the domain misuse reporting data to all nodes on the alliance chain, and enabling at least part of nodes of all the nodes to conduct initial examination on the domain misuse reporting data;
a sending unit, configured to send the received initial audit information for the domain misuse report data to the initial node;
the processing unit is used for responding to the initial node to identify the initial audit information and obtaining a target processing result;
and the feedback unit is used for feeding the target processing result back to all the nodes on the alliance chain, so that all the nodes can acquire the target processing result.
The device further comprises:
and the credit determining unit is used for responding to the target processing result generated by the initial node and determining the credit value of the part of nodes subjected to initial auditing.
On the basis of the above embodiment, at least some of the nodes include a node having a rating condition for the domain name abuse report data.
Optionally, the processing unit is specifically configured to:
and performing weighting processing on the initial auditing information generated by each node of the partial nodes and the credit value corresponding to each node to obtain a target processing result.
Optionally, the credit determination unit is specifically configured to:
if the initial audit information of a first node in the part of the initially audited nodes is consistent with the target processing result, broadcasting to each node of the alliance chain to increase a first credit value for the first node;
and if the initial audit information of the second node in the part of the initially audited nodes is inconsistent with the target processing result, broadcasting to each node of the alliance chain to reduce a second credit value for the first node.
The computer storage medium/Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a magnetic Random Access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); but may also be various terminals such as mobile phones, computers, tablet devices, personal digital assistants, etc., that include one or any combination of the above-mentioned memories.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing module, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit. Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable Memory device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk.
The methods disclosed in the several method embodiments provided in the present application may be combined arbitrarily without conflict to obtain new method embodiments.
Features disclosed in several of the product embodiments provided in the present application may be combined in any combination to yield new product embodiments without conflict.
The features disclosed in the several method or apparatus embodiments provided in the present application may be combined arbitrarily, without conflict, to arrive at new method embodiments or apparatus embodiments.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A federation chain-based domain name abuse processing method, wherein the federation chain is composed of individual regulators, each regulator corresponding to at least one node in the federation chain, the method comprising:
responding to the initial node receiving the domain misuse reporting data, broadcasting the domain misuse reporting data to all nodes on the alliance chain, and enabling at least part of nodes of all nodes to conduct initial audit on the domain misuse reporting data;
sending the received initial audit information aiming at the domain name abuse report data to the initial node;
responding to the initial node to identify the initial auditing information and obtaining a target processing result;
and feeding back the target processing result to all nodes on the alliance chain, so that all nodes can acquire the target processing result.
2. The method of claim 1, further comprising:
and responding to the initial node to generate the target processing result, and determining the credit value of the part of nodes subjected to initial examination.
3. The method of claim 1, wherein at least some of the nodes comprise nodes having a rating condition for the domain name abuse report data.
4. The method of claim 1, wherein the identifying the initial audit information in response to the initial node to obtain a target processing result comprises:
and performing weighting processing on the initial auditing information generated by each node of the partial nodes and the credit value corresponding to each node to obtain a target processing result.
5. The method of claim 2, wherein determining a credit value for a portion of nodes undergoing an initial audit in response to the initial node generating the target processing result comprises:
if the initial audit information of a first node in the part of the initially audited nodes is consistent with the target processing result, broadcasting to each node of the alliance chain to increase a first credit value for the first node;
and if the initial audit information of the second node in the part of the initially audited nodes is inconsistent with the target processing result, broadcasting to each node of the alliance chain to reduce a second credit value for the first node.
6. A federation chain-based domain name abuse processing system, wherein the federation chain is composed of individual regulators, each regulator corresponding to at least one node in the federation chain, the system comprising:
the initial node is used for receiving the domain misuse reporting data and broadcasting the domain misuse reporting data to all nodes on the alliance chain;
at least part of all the nodes are used for performing initial audit on the domain name abuse report data, generating initial audit information and sending the initial audit information to the initial nodes;
the initial node is further configured to identify the initial audit information and obtain a target processing result;
the initial node is further configured to feed back the target processing result to all nodes in the federation chain, so that all nodes learn the target processing result.
7. The system of claim 6, wherein the initial node is further configured to:
and determining the credit value of the part of the nodes subjected to the initial examination based on the target processing result.
8. The system of claim 6, wherein at least some of the nodes comprise nodes having a rating condition for the domain name abuse report data.
9. The method of claim 6, wherein all nodes on the federation chain are configured to:
when the domain misuse reporting data is received, determining whether an evaluation condition of the domain misuse reporting data is satisfied, so that the node satisfying the evaluation condition is determined as the partial node.
10. The system of claim 7, wherein the initial node is specifically configured to:
if the initial audit information of a first node in the part of the initially audited nodes is consistent with the target processing result, broadcasting to each node of the alliance chain to increase a first credit value for the first node;
and if the initial audit information of the second node in the part of the initially audited nodes is inconsistent with the target processing result, broadcasting to each node of the alliance chain to reduce a second credit value for the first node.
CN202110150049.5A 2021-02-03 2021-02-03 Domain name abuse processing method and system based on alliance chain Pending CN112954037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110150049.5A CN112954037A (en) 2021-02-03 2021-02-03 Domain name abuse processing method and system based on alliance chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110150049.5A CN112954037A (en) 2021-02-03 2021-02-03 Domain name abuse processing method and system based on alliance chain

Publications (1)

Publication Number Publication Date
CN112954037A true CN112954037A (en) 2021-06-11

Family

ID=76243033

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110150049.5A Pending CN112954037A (en) 2021-02-03 2021-02-03 Domain name abuse processing method and system based on alliance chain

Country Status (1)

Country Link
CN (1) CN112954037A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640513A (en) * 2022-03-04 2022-06-17 中国互联网络信息中心 Domain name abuse management method and system based on credit incentive

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474584A (en) * 2018-10-29 2019-03-15 中化能源科技有限公司 A kind of rule-based block chain network permits Adding Way automatically
CN109831545A (en) * 2019-01-31 2019-05-31 中国互联网络信息中心 A kind of domain name abuse processing method and system based on block chain
CN110138592A (en) * 2019-04-09 2019-08-16 苏宁易购集团股份有限公司 A kind of management method and system of intelligence contract
WO2019157740A1 (en) * 2018-02-14 2019-08-22 华为技术有限公司 Method for processing data, apparatus for processing data and device for processing data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019157740A1 (en) * 2018-02-14 2019-08-22 华为技术有限公司 Method for processing data, apparatus for processing data and device for processing data
CN109474584A (en) * 2018-10-29 2019-03-15 中化能源科技有限公司 A kind of rule-based block chain network permits Adding Way automatically
CN109831545A (en) * 2019-01-31 2019-05-31 中国互联网络信息中心 A kind of domain name abuse processing method and system based on block chain
CN110138592A (en) * 2019-04-09 2019-08-16 苏宁易购集团股份有限公司 A kind of management method and system of intelligence contract

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640513A (en) * 2022-03-04 2022-06-17 中国互联网络信息中心 Domain name abuse management method and system based on credit incentive

Similar Documents

Publication Publication Date Title
Blass et al. Using elicited choice probabilities to estimate random utility models: Preferences for electricity reliability
US20160180480A1 (en) System & Method For Assessing & Responding to Intellectual Property Rights Proceedings/Challenges
Carroll et al. The structure of utility in spatial models of voting
Chondrakis et al. Information disclosure and the market for acquiring technology companies
Bendix Bypassing Congressional Committees: Parties, Panel Rosters, and Deliberative Processes
CN109831545B (en) Domain name abuse processing method and system based on block chain
Carmody WTO obligations as collective
CN112488787A (en) Shared resource leasing method and device based on block chain and computer equipment
Tanverakul et al. Impacts of metering on residential water use in California
Yan Search for the hidden punishments: An alternative approach to studying alternative sanctions
CN111695831B (en) Open source code use risk assessment method and device and electronic equipment
CN103279884A (en) Consultation service providing method and system
CN112954037A (en) Domain name abuse processing method and system based on alliance chain
CN103299336A (en) Information processing system, information processing method, and storage medium
Yaşar Direct and indirect exporting and productivity: Evidence from firm‐level data
Palmer Does the Chief Justice Make Partisan Appointments to Special Courts and Panels?
CN109636627B (en) Insurance product management method, device, medium and electronic equipment based on block chain
Carthy et al. Demographic variation in active consumer behaviour: On-line search for retail broadband services
CN115358894A (en) Intellectual property life cycle trusteeship management method, device, equipment and medium
Smoot The juvenile justice reform Act of 2018: Updating the federal approach to youth involved, and at‐risk of becoming involved, in the juvenile justice system
Pakenaite et al. Investigation of the Blockchain’s influence on traditional banking: challenges and opportunities
Chen et al. Does appellate precedent matter?: Stock price responses to appellate court decisions on FCC actions
Andersson et al. Empirical Evidence on the Relationship between Mobile Termination Rates and Firms' Profits
Kathuria et al. Quantifying the value of an open Internet for India
Bianchi et al. Targeted letters: Effects on sample composition and item non-response

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210611

RJ01 Rejection of invention patent application after publication