CN115065458A - Electronic commerce transaction system with data encryption transmission - Google Patents
Electronic commerce transaction system with data encryption transmission Download PDFInfo
- Publication number
- CN115065458A CN115065458A CN202210944450.0A CN202210944450A CN115065458A CN 115065458 A CN115065458 A CN 115065458A CN 202210944450 A CN202210944450 A CN 202210944450A CN 115065458 A CN115065458 A CN 115065458A
- Authority
- CN
- China
- Prior art keywords
- particles
- transaction
- particle
- chaotic
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/06—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons
- G06N3/061—Physical realisation, i.e. hardware implementation of neural networks, neurons or parts of neurons using biological neurons, e.g. biological neurons connected to an integrated circuit
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Molecular Biology (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Mathematical Physics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Computational Linguistics (AREA)
- Computing Systems (AREA)
- Neurology (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Artificial Intelligence (AREA)
- Technology Law (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
An electronic commerce transaction system with data encryption transmission comprises an intelligent parameter setting module, a block chain module, an encryption module, an electronic commerce transaction evaluation module and a transaction module, wherein the intelligent parameter setting module is used for setting quantization requirements of a user, the block chain module is used for safely storing, updating and recording data and transaction activities, the encryption module adopts a symmetric block encryption algorithm based on a neural network chaotic sequence and an asymmetric encryption algorithm based on a neural network chaotic attractor to carry out secondary encryption on the data, the electronic commerce transaction evaluation module selects a support vector machine, selects a proper electronic commerce transaction type for the user, and completes transactions in the transaction module. The invention has the beneficial effects that: the method can effectively prevent the leakage of personal information and transaction information of the client, and guarantee the electronic commerce transaction of the client.
Description
Technical Field
The invention relates to the field of electronic commerce, in particular to an electronic commerce transaction system for data encryption transmission.
Background
With the development of internet technology, network space has become the basis of people's survival and development in modern society, however, due to the insecurity of the internet, various information security problems exist, and network attacks include disguise, deception, eavesdropping, illegal access, tampering, repudiation, counterfeiting, denial of service, spreading viruses, and the like. The block chain is a new data structure, has dispersivity, does not need trust, is owned, managed and supervised by all nodes in the network, is not controlled by a single party, is a novel financial mode of commercial banks at present, mainly takes a core enterprise in electronic commerce as an entry point, provides related financial products and electronic commerce services through the contact of a plurality of enterprises in the electronic commerce, and can improve the business structure of the commercial banks to a certain extent, so that the commercial banks have stronger competitive advantages. Generally, the authenticity of data depends on the trust of a system center or a third-party entity, such as a main node, a central database, a system leader, a database manager and the like, once the system center is not trusted any more, the authenticity of the data is damaged and is difficult to find, so that it is necessary to encrypt the data of an e-commerce platform, the encrypted data of the digital e-commerce platform does not have the centralization of nodes, servers and databases, the operation and maintenance of the system are independent of managers, network nodes strictly package digital fingerprints of transaction information in a certain time into blocks and quickly broadcast the blocks to the whole network, and a hash technology is combined to form a tightly-linked chain among the blocks so as to form a highly-safe public account, namely a block chain, so that the block chain technology has a good effect on data encryption, but for the e-commerce platform data encryption adopting the block chain technology, the encryption process is complex, and the encrypted data is easy to be distorted and even lost, which affects the security and reliability of the data encryption of the e-commerce platform.
Disclosure of Invention
In view of the above problems, the present invention is directed to an e-commerce transaction system with encrypted data transmission.
The purpose of the invention is realized by the following technical scheme:
an electronic commerce transaction system for data encryption transmission is characterized by comprising an intelligent parameter setting module, a blockchain module, an encryption module, an electronic commerce transaction evaluation module and a transaction module, wherein the intelligent parameter setting module is used for quantifying the requirements of users and comprises transaction IDs, transaction types, timestamps, privacy levels, transaction objects, transaction addresses and transaction amounts, the intelligent parameter setting module is established in a dictionary mode and comprises keys and key values, the quantified requirements of the users are stored in the blockchain module, the blockchain module is used for safely storing, updating, recording data and transaction activities, electronic commerce transaction behaviors recorded in the blockchain are sorted, the data are grouped according to the transaction types, completely repeated data are deleted, default data are marked and supplemented in time, whether the key value result of each type of data in each group of transaction types falls into a certain interval or not is detected, the intervals comprise normal value intervals, abnormal value intervals and untrusted intervals, wherein the normal value intervals indicate that the key value stored by the user is correct, the abnormal value intervals indicate that the key value stored by the user is incorrect, the abnormal value is highlighted at the moment, the untrusted intervals indicate that the key value stored by the user is problematic, whether the result of data input is correct or not needs to be rechecked for the storage of the key value of the current time by the user, if the result of the key value input by the user is incorrect, the transaction behavior stored in the block chain is modified, and if the result of the key value input by the user is correct, the transaction behavior of the user needs to be rechecked; the encryption module adopts a symmetric block encryption algorithm based on a neural network chaotic sequence and an asymmetric encryption algorithm based on a neural network chaotic attractor to carry out secondary encryption on data, the e-commerce transaction evaluation module selects a support vector machine to select a proper e-commerce transaction type for a user, and the user completes the transaction at the transaction module.
Furthermore, the intelligent parameter setting module is used for quantifying the requirements of the user, including transaction ID, transaction type, timestamp, security level, transaction object, transaction address and transaction amount, and is established in a dictionary manner, including keys and key values, and recorded as key valuesThe timestamps are uniformly numbered through a hash function after being input according to standard time, the selection range of the timestamps is the combination of numbers and 26 lower case letters, and the security level comprises three levels of public security, common security and special security.
Further, by the block chain module, transaction behaviors in the block chain are sorted, data are distinguished according to transaction types, completely repeated data are deleted, default data need to be marked and supplemented in time, the key value result of each data in each group of transaction types falls into a certain interval, the interval comprises a normal value interval, an abnormal value interval and an untrusted interval, wherein the normal value interval represents that the key value stored by the user is correct, the abnormal value interval represents that the key value stored by the user is incorrect, the abnormal value can be highlighted at the moment, the untrusted interval represents that the key value stored by the user is problematic, whether the result of data input is correct or not needs to be rechecked for the storage of the key value of the current time by the user, if the result of the key value input by the user is incorrect, the transaction behaviors stored in the block chain are modified, and if the result of the key value input by the user is correct, then the transaction behavior of the user needs to be re-detected.
Furthermore, the encryption module adopts a symmetric block encryption algorithm based on a neural network chaotic sequence to encrypt data, and the assumption is thatIndicating an encryption operation, M indicates data that needs to be encrypted,representing decryption, C representing data needing decryption after encryption, and satisfying the following conditions:,and has:the symmetric block encryption algorithm based on the neural network chaotic sequence needs to meet the requirements that a plaintext to be encrypted is 56 bits, a check bit is 8 bits, and a total bit is 64 bits, and the method specifically comprises the following steps:
(1) firstly, carrying out initial transformation on a plaintext, dividing an information block into two parts, and then transforming a product through a function, wherein 16 times of execution are needed;
(2) after the product transformation, the two parts of information are combined to execute the inverse initial transformation operation, and the left-shifted message is changed into 48 bits;
(3) replace 32 bits of new data with the final result;
(4) and (4) executing replacement operation according to the steps (1) to (3), and finishing the encryption process after 16 execution cycles.
Further, the encryption module, assuming a given key, is adapted to encrypt the data streamIf, ifThe generated subkey is,,Then, thenCalled weak key, satisfies:
wherein the content of the first and second substances,to representBased on the symmetric block encryption algorithm of the neural network chaotic sequence,a decryption algorithm representing symmetric blocks based on a neural network chaotic sequence, ifIn all, there isWhere M ', C ', and k ' are non-operational, a public key is used for encrypting data, and a private key is used for decrypting data, the same key is used for encryption and decryption each time in the conventional symmetric encryption system, and the public key encryption system uses two unrelated keys to ensure the security of the network, the security of data, and the security of the key itself, the expression is as follows:
a symmetric block encryption algorithm based on a neural network chaotic sequence encrypts data of an electronic commerce platform, wherein the chaotic neural network consists of chaotic neurons, external input and internal feedback input, a single chaotic neuron is provided with feedback and external input items from the internal neuron as well as unstable items and threshold values from the neuron per se, and the chaotic neural network is composed ofOf chaotic neural networks comprising chaotic neuronsThe equation for each neuron is as follows:
wherein the content of the first and second substances,is the firstA chaotic neuron in discrete timeIs then outputted from the output of (a),is the firstThe continuous output function of each chaotic neuron,is the number of chaotic neurons that are,is the firstA chaotic neuron andthe connection weight of each chaotic neuron,is the firstThe axonal transformation transfer function of a chaotic neuron,is the number of external inputs that the user has,is the firstAn input and aThe connection weight of each chaotic neuron,is a discrete time of (To get it atThe intensity of the input,Is the firstThe refractoriness function of each chaotic neuron,is the attenuation coefficient of the degree of fire resistance,is a self-feedback coefficient, and,is the firstA complete or unexcited threshold of chaotic neurons, ifIs shown asA chaotic neuron in discrete timeThe iteration of the chaotic neural network is represented as follows:
for all neurons, functionAndis defined asIn whichAs a function of the sign, i.e.:the external input intensity of each neuron at any time is set to the initial external input intensity value, i.e.:the value is 0 or 1, assuming that all firing thresholds per neuron areThe method comprises the following steps:wherein, in the step (A),andare respectively the firstA chaotic neuron in discrete timeAndinternal state of (2), assumeMay take values of 1, 0 and-1, which, when in an excited state,when they are in the inhibition state, thenWhen they are not directly connected to each other,based on the statistical characteristics of the neural network, the number of excitation connections and the number of inhibition connections are equal, the unpredictability of the output sequence of the neural network is increased, and because the chaotic neural network is introduced on the basis of a Hopfield neural network model with time lag, the requirement of constructing a connection matrix according to the Hopfield is met whenWhen, suppose thatTo obtain the values of the connection weight matrix.
Further, for the parameters、Andis selected from the group consisting of integers, secondlyTo make the non-periodic fluctuation centered at 0, the designed chaotic neural network is updated as follows:
whereinFor the correction factor, define a correction factor havingA discrete Hopfield neural network of interconnected neurons, each neuron having a state of,Is 0 or 1, the next stateDependent on the current state of the neuron, i.e.Wherein, in the step (A),is a neuronAndis a symmetric matrix,is a neuronThe threshold value of (a) is set,is thatTime of dayThe state of the individual neurons is determined,is thatTime of dayThe state of the individual neurons is known,is thatTime of dayState of individual neuron, neural network inThe energy over time is given in the following table:
the energy function is monotonically decreased along with the evolution of the system state, and the neural network finally reaches a stable state due to limited energy, and is defined as an attractor, the attractor is a chaotic attractor, namely, the attractor is not related to the rule between the attractor and the initial state, and unpredictable relation exists between state messages in the attraction domain of each attractor, if the weight matrix is connectedThe attractors and their corresponding attraction fields will change accordingly, introducing a random transformation matrixThen, the original initial state is setAnd an attractorRespectively converted into new initial statesAnd an attractorThe method comprises the following steps:
the matrix of synaptic connections between neurons consists of +1, 0 and-1, with + l, 0 and-1 indicating that two neurons are in an excitatory state, no direct connection and an inhibitory state, respectively, and according to statistical probabilities, if there are more unpredictable attractors, the number of excitatory synaptic connections in the network is equal to the number of inhibitory synaptic connections, assuming that the number of samples stored in the network is 8 and the convergence field element is 20, the matrix of connecting synapses is given by:
in order to ensure the encryption effect, it is necessary to perform security analysis on the symmetric block encryption algorithm based on the neural network chaotic sequence, and assuming that it is converted into a binary sequence C, it is derived by the following formula:
wherein the content of the first and second substances,,the binary autocorrelation function R is as follows:
on the basis, the design of a symmetric packet encryption algorithm based on a neural network chaotic sequence and an asymmetric packet encryption algorithm based on a neural network chaotic attractor is analyzed, and the method has safety in electronic commerce transaction transmission.
Furthermore, the electronic commerce transaction evaluation module optimizes kernel function parameters and punishment factors of the support vector machine by adopting a particle swarm algorithm.
Further, the particle swarm optimization is set to be carried out in a search space by adopting the following stepsUpdating the time:
step (1): performing similar updating detection on each particle in the particle swarm: order toRepresents the second in the particle groupThe number of the particles is one,represents the second in the particle groupParticles ofAnd particlesIn thatThe time meets the following conditions:and isWhen it is, the particles are determinedAnd particlesIn thatThe time instants are similar update particles, wherein,to representTime particleAt the location of the search space,representTime particleAt the location of the search space,to representTime particleAt the individual optimal position in the search space,to representTime particleAt the individual optimal position of the search space,is a group of particles inA similarity detection threshold for the time of day, andwherein, in the step (A),representTime particleIn the neighborhood of the search space, andwherein, in the step (A),to representDistance position in time particle swarmFirst, theThe position of the particles that are close to each other,is a given positive integer, an,Is the total number of particles in the population;
classifying the particles which are judged to be similar updating particles in the particle swarm specifically as follows: is provided withTo representThe first one obtained by classifying the particles in the particle group and the like updated particlesClass I, class IIThe particles in (a) are selected from the group of particles in the following way: randomly selecting one particle from the unclassified particles of the current particle swarm to be added into the classWhen the randomly selected particle does not have similar updating particle in the particle swarm, the selection of the particle in the swarm is stopped to add the classWhen the randomly selected particle has similar renewing particles in the particle group, adding the similar renewing particles of the randomly selected particle into the classAnd continuing to neutralize the current class with the population of particlesAny one of the particles is a particle addition class of similarly updated particlesIn (1), until classStopping selecting particles in the population to join the class when the medium particles do not have similar updating particles in the current populationPerforming the following steps;
is provided withTo representA class set obtained by classifying the particles in the particle swarm and the similar updated particles thereof at all times, anWherein, in the step (A),representation collectionThe number of middle classes;
step (2): separately pair collections in the following mannerIn the above-mentioned classes of particlesUpdating the time: is provided withPresentation classThe number of the particles in (2) is,given positive integer, for determining the setIn a manner of updating the middle class particles, andclass III of the related artThe medium particle satisfies:then, the following method is adopted to classifyMiddle particle ofUpdating the time:
in the above updating formula, letPresentation classTo (1)The number of the particles is one,andrespectively representTime particleAt the location and step size of the search space,andrespectively representTime particleAt the location and step size of the search space,represents a group of particles inAn inertial weight factor of a time of day, and,andrespectively given a maximum inertia weight factor and a minimum inertia weight factor, and,,the maximum number of iterations is indicated,andare respectively in the intervalThe random number generated in the random number generator is used,to representTime particleAt the individual optimal position of the search space,to representThe time of day the particle swarm is at the global optimum location of the search space,a local learning factor representing a population of particles,a global learning factor representing a population of particles,andthe value of (d) may take:,;
when classThe medium particle satisfies:then, the following method is adopted to classifyMiddle particle ofUpdating the time:
in the above-described update formula,to representTime particleInertial weight factor in the search spaceThe values of (A) are set as:
wherein the content of the first and second substances,presentation classThe historical similarity coefficient of mesoparticle, andwherein, in the process,presentation classTo (1)The number of the particles is one,to representTime particleAt the location of the search space,to representTime of day particleAt the location of the search space in the search space,is shown in the intervalInternally generated random numbers.
The invention has the beneficial effects that: the encryption module adopts a symmetric block encryption algorithm based on a neural network chaotic sequence and an asymmetric encryption algorithm based on a neural network chaotic attractor to carry out secondary encryption on data, and after electronic commerce data is encrypted and decrypted, the noise in the data is small, so that the accuracy of data encryption and decryption is ensured, the loss and distortion influence of the encrypted data are reduced, and the accuracy of the encrypted and decrypted data is ensured; the electronic commerce transaction evaluation module adopts an optimized particle swarm algorithm to optimize parameters of a support vector machine, firstly, similar update detection is carried out on particles in a particle swarm, the particles with similar update modes are classified, when the particles are updated, when the number of the particles in the similar update modes in the class of the particles is less, the class of the particles is set to be updated continuously according to the update mode of the standard particle swarm algorithm, so that the advantages of the standard particle swarm algorithm in optimization are kept, when the number of the particles in the similar update modes in the class of the particles is more, in order to ensure the diversity after particle swarm update, the similarity of the previous update step length of the class of the particles is judged by detecting the similarity of the previous positions of the class of the particles, when the previous positions of the class of the particles have larger differences, the step length when the class of the particles is updated previously is shown to have larger differences, at the moment, the inertia weight factors of the particles in the class are enhanced in the updating process, so that the particles in the class enhance the exploration of a new area, and the diversity of the positions of the particles in the class after updating is increased.
Drawings
The invention is further described with the aid of the accompanying drawings, in which, however, the embodiments do not constitute any limitation to the invention, and for a person skilled in the art, without inventive effort, further drawings may be derived from the following figures.
FIG. 1 is a schematic diagram of the present invention.
Detailed Description
The invention is further described with reference to the following examples.
Referring to fig. 1, the electronic commerce transaction system for data encryption transmission of this embodiment includes an intelligent parameter setting module, a blockchain module, an encryption module, an electronic commerce transaction evaluation module, and a transaction module, wherein the intelligent parameter setting module is configured to quantify a user's requirement, including a transaction ID, a transaction type, a timestamp, a privacy level, a transaction object, a transaction address, and a transaction amount, and is established in a dictionary manner, including a key and a key value, store the quantified user requirement in the blockchain module, the blockchain module is configured to securely store, update, record data and transaction activities, and arrange electronic commerce transaction behaviors recorded in the blockchain, group data according to the transaction type, delete completely repeated data, mark and timely supplement default data, detect whether a key value result of each data in each group of transaction types falls into a certain interval, the intervals comprise normal value intervals, abnormal value intervals and untrusted intervals, wherein the normal value intervals indicate that the key value stored by the user is correct, the abnormal value intervals indicate that the key value stored by the user is incorrect, the abnormal value is highlighted at the moment, the untrusted intervals indicate that the key value stored by the user is problematic, whether the result of data input is correct or not needs to be rechecked for the storage of the key value of the current time by the user, if the result of the key value input by the user is incorrect, the transaction behavior stored in the block chain is modified, and if the result of the key value input by the user is correct, the transaction behavior of the user needs to be rechecked; the encryption module adopts a symmetric block encryption algorithm based on a neural network chaotic sequence and an asymmetric encryption algorithm based on a neural network chaotic attractor to carry out secondary encryption on data, the e-commerce transaction evaluation module selects a support vector machine to select a proper e-commerce transaction type for a user, and the user completes the transaction at the transaction module.
Specifically, the intelligent parameter setting module is used for quantifying the requirements of the user, including transaction ID, transaction type, timestamp, security level, transaction object, transaction address and transaction amount, and is established in a dictionary manner, including keys and key values, and recorded asThe timestamps are uniformly numbered through a hash function after being input according to standard time, the selection range of the timestamps is the combination of numbers and 26 lower case letters, and the security level comprises three levels of public security, common security and special security.
Specifically, by using the blockchain module, transaction behaviors in the blockchain are sorted, data are distinguished according to transaction types, completely repeated data are deleted, default data need to be marked and supplemented in time, the key value result of each data in each group of transaction types falls into a certain interval, the interval comprises a normal value interval, an abnormal value interval and an untrusted interval, wherein the normal value interval indicates that the key value stored by the user is correct, the abnormal value interval indicates that the key value stored by the user is incorrect, the abnormal value can be highlighted at the moment, the untrusted interval indicates that the key value stored by the user is problematic, whether the result of data input is correct or not needs to be rechecked for the storage of the key value of the user at this time, if the result of the key value input by the user is incorrect, the transaction behaviors stored in the blockchain are modified, and if the result of the key value input by the user is correct, then the transaction behavior of the user needs to be re-detected.
Specifically, the encryption module encrypts data by adopting a symmetric block encryption algorithm based on a neural network chaotic sequence, and supposing thatIndicating an encryption operation, M indicates data that needs to be encrypted,representing decryption, C representing data needing decryption after encryption, and satisfying the following conditions:,and has the following:the symmetric block encryption algorithm based on the neural network chaotic sequence needs to meet the requirements that a plaintext to be encrypted is 56 bits, a check bit is 8 bits, and a total bit is 64 bits, and the method specifically comprises the following steps:
(1) firstly, carrying out initial transformation on a plaintext, dividing an information block into two parts, and then transforming a product through a function, wherein 16 times of execution are needed;
(2) after the product transformation, the two parts of information are combined to execute the inverse initial transformation operation, and the left-shifted message is changed into 48 bits;
(3) replace 32 bits of new data with the final result;
(4) and (4) executing replacement operation according to the steps (1) to (3), and finishing the encryption process after 16 execution cycles.
Preferably, the encryption module, assuming a given key, is adapted to encrypt the encrypted data streamIf, ifGenerated subkeyIs that,,Then, thenCalled weak key, satisfies:
wherein the content of the first and second substances,represents a symmetric block encryption algorithm based on a neural network chaotic sequence,a decryption algorithm representing symmetric blocks based on a neural network chaotic sequence, ifIn all, there isWherein, M ', C ' and k ' are non-operation, public key is used for encrypting data, private key is used for decrypting data, and the traditional symmetric encryption system uses the same key to encrypt and decrypt data each timeThe key encryption system uses two unrelated keys to ensure the security of the network, the security of data and the security of the key itself, and the expression is as follows:
a symmetric block encryption algorithm based on a neural network chaotic sequence encrypts data of an electronic commerce platform, wherein the chaotic neural network consists of chaotic neurons, external input and internal feedback input, a single chaotic neuron is provided with feedback and external input items from the internal neuron as well as unstable items and threshold values from the neuron per se, and the chaotic neural network is composed ofOf chaotic neural networks comprising chaotic neuronsThe equation for each neuron is as follows:
wherein, the first and the second end of the pipe are connected with each other,is the firstA chaotic neuron in discrete timeIs then outputted from the output of (a),is the firstThe continuous output function of each chaotic neuron,is the number of chaotic neurons that are,is the firstA chaotic neuron andthe connection weight of each chaotic neuron,is the firstThe axonal transformation transfer function of the individual chaotic neurons,is the number of external inputs that the user has,is the firstAn input and aThe connection weight of each chaotic neuron,is a discrete time(To get it atThe intensity of each input,Is the firstThe refractoriness function of each chaotic neuron,is the attenuation coefficient of the degree of fire resistance,is a self-feedback coefficient, and,is the firstComplete or unexcited threshold of chaotic neuron ifIs shown asA chaotic neuron in discrete timeThe iteration of the chaotic neural network is represented as follows:
for all neurons, functionAndis defined asWhereinAs a function of the sign, i.e.:the external input intensity of each neuron at any time is set to the initial external input intensity value, i.e.:the value is 0 or 1, assuming that all firing thresholds per neuron areThe method comprises the following steps:wherein, in the step (A),andare respectively the firstA chaotic neuron in discrete timeAndinternal state of (2), assumeMay take values of 1, 0 and-1, which, when in an excited state,when they are in the inhibition state, thenWhen they are not directly connected to each other,based on the statistical property of the neural network, the number of excitation connections and suppression connections is equal, the unpredictability of the output sequence of the neural network is increased, and the chaotic neural network is introduced on the basis of a Hopfield neural network model with time lag, so that the requirement of constructing a connection matrix according to Hopfield can be met when the chaotic neural network is used for solving the problem that the output sequence of the chaotic neural network is unpredictableWhen, suppose thatTo obtain the values of the connection weight matrix, the present embodiment takes the case where for M =8, the connection matrix is given by:
in particular, for parameters、Andis selected from the group consisting of integers, secondlyTo make the non-periodic fluctuation centered at 0, the designed chaotic neural network is updated as follows:
whereinFor the correction factor, define a correction factor havingA discrete Hopfield neural network of interconnected neurons, each neuron having a state of,Is 0 or 1, the next stateDependent on the current state of the neuron, i.e.Wherein, in the step (A),is a neuronAndis a symmetric matrix,is a neuronThe threshold value of (2) is set,is thatTime toThe state of the individual neurons is known,is thatTime toThe state of the individual neurons is determined,is thatTime of dayState of individual neuron, neural network inThe energy over time is given in the following table:
the energy function is monotonically decreased along with the evolution of the system state, and the neural network finally reaches a stable state due to limited energy, and is defined as an attractor, the attractor is a chaotic attractor, namely, the attractor is not related to the rule between the attractor and the initial state, and unpredictable relation exists between state messages in the attraction domain of each attractor, if the weight matrix is connectedThe attractors and their corresponding attraction fields will change accordingly, introducing a random transformation matrixThen, the original initial state is setAnd an attractorRespectively converted into new initial statesAnd an attractorThe method comprises the following steps:
the matrix of synaptic connections between neurons consists of +1, 0 and-1, with + l, 0 and-1 indicating that two neurons are in an excitatory state, no direct connection and an inhibitory state, respectively, and according to statistical probabilities, if there are more unpredictable attractors, the number of excitatory synaptic connections in the network is equal to the number of inhibitory synaptic connections, assuming that the number of samples stored in the network is 8 and the convergence field element is 20, the matrix of connecting synapses is given by:
in order to ensure the encryption effect, it is necessary to perform security analysis on the symmetric block encryption algorithm based on the neural network chaotic sequence, and assuming that it is converted into a binary sequence C, it is derived by the following formula:
wherein, the first and the second end of the pipe are connected with each other,,the binary autocorrelation function R is as follows:
on the basis, the design of a symmetric packet encryption algorithm based on a neural network chaotic sequence and an asymmetric packet encryption algorithm based on a neural network chaotic attractor is analyzed, and the method has safety in electronic commerce transaction transmission.
Furthermore, the electronic commerce transaction evaluation module optimizes kernel function parameters and punishment factors of the support vector machine by adopting a particle swarm algorithm.
Further, the particle swarm optimization is set to be carried out in a search space by adopting the following stepsUpdating the time:
step (1): performing similar updating detection on each particle in the particle swarm: order toRepresents the second in the particle groupThe number of the particles is one,represents the second in the particle groupParticles ofAnd particlesIn thatThe time meets the following conditions:and isWhen it is, the particles are determinedAnd particlesIn thatThe time instants are similar update particles, wherein,representTime particleAt the location of the search space,to representTime particleAt the location of the search space,to representTime particleAt the individual optimal position of the search space,representTime particleAt the individual optimal position of the search space,is a group of particles inA similarity detection threshold for the time of day, andwherein, in the step (A),to representTime particleIn the neighborhood of the search space, andwherein, in the step (A),to representDistance position in time particle swarmFirst, theThe position of the particles that are close to each other,is a given positive integer, an,Are particlesThe total number of particles in the population;
classifying the particles judged as similar update particles in the particle swarm, specifically comprising the following steps: is provided withTo representThe first to classify the particles in the particle group and their similar updated particlesClass I, class IIThe particles in (a) are selected from the group of particles in the following way: randomly selecting one particle from the unclassified particles of the current particle swarm to be added into the classWhen the randomly selected particle does not have similar updating particle in the particle swarm, the selection of the particle in the swarm is stopped to add the classWhen the randomly selected particle has similar renewing particles in the particle group, adding the similar renewing particles of the randomly selected particle into the classAnd continuing to neutralize the current class with the population of particlesAny one of the particles is a particle addition class of similarly updated particlesIn (1), until classStopping selecting particles in the population to join the class when the medium particles do not have similar updating particles in the current populationPerforming the following steps;
is provided withTo representA class set obtained by classifying the particles in the particle swarm and the similar updated particles thereof at all times, anWherein, in the step (A),representation collectionThe number of middle classes;
step (2): separately pair collections in the following mannerIn the above-mentioned classes of particlesUpdating the time: is provided withPresentation classThe number of particles in (a) is,given positive integer, for determining the setThe update method of the class-I particles, andclass III of the related artThe medium particle satisfies:then, the following method is adopted to classifyMiddle particle ofUpdating the time:
in the above updating formula, letRepresentation classTo (1)The number of the particles is one,andrespectively representTime of day particleAt the location and step size of the search space,andrespectively representTime of day particleAt the location and step size of the search space,represents a group of particles inAn inertial weight factor of a time of day, and,andrespectively given a maximum inertia weight factor and a minimum inertia weight factor, and,,represents the maximumThe number of iterations is,andare respectively in the intervalThe random number generated in the random number generator is used,to representTime particleAt the individual optimal position of the search space,to representThe time of day the particle swarm is at the global optimum location of the search space,a local learning factor representing a population of particles,a global learning factor that represents a population of particles,andthe value of (d) may take:,;
class IIIThe medium particle satisfies:then, the following method is adopted to classifyMiddle particle ofUpdating the time:
in the above-described update formula,to representTime particleInertial weight factor in the search spaceThe values of (A) are set as:
wherein the content of the first and second substances,presentation classThe historical similarity coefficient of mesoparticle, andwherein, in the step (A),presentation classToThe number of the particles is one,to representTime particleAt the location of the search space,to representTime particleAt the location of the search space,is shown in the intervalInternally generated random numbers.
The invention has the beneficial effects that: the encryption module adopts a symmetric block encryption algorithm based on a neural network chaotic sequence and an asymmetric encryption algorithm based on a neural network chaotic attractor to carry out secondary encryption on data, and after electronic commerce data is encrypted and decrypted, the noise in the data is small, so that the accuracy of data encryption and decryption is ensured, the loss and distortion influence of the encrypted data are reduced, and the accuracy of the encrypted and decrypted data is ensured; the electronic commerce transaction evaluation module adopts an optimized particle swarm algorithm to optimize parameters of a support vector machine, firstly, similar update detection is carried out on particles in a particle swarm, the particles with similar update modes are classified, when the particles are updated, when the number of the particles in the similar update modes in the class of the particles is less, the class of the particles is set to be updated continuously according to the update mode of the standard particle swarm algorithm, so that the advantages of the standard particle swarm algorithm in optimization are kept, when the number of the particles in the similar update modes in the class of the particles is more, in order to ensure the diversity after particle swarm update, the similarity of the previous update step length of the class of the particles is judged by detecting the similarity of the previous positions of the class of the particles, when the previous positions of the class of the particles have larger differences, the step length when the class of the particles is updated previously is shown to have larger differences, at the moment, the inertia weight factors of the particles in the class are enhanced in the updating process, so that the particles in the class strengthen the exploration of a new area, and the diversity of the updated positions of the particles in the class is increased, on the contrary, when the previous positions of the particles in the class have greater similarity, the step length of the particles in the class during previous updating is indicated to have greater similarity, at the moment, the diversity of the particles in the class after updating is increased by setting the randomness of the current inertia weight factor values of the particles in the class, so that the optimizing precision and the convergence speed of the particle swarm algorithm are enhanced, and the support vector machine optimized based on the improved particle swarm algorithm has higher accuracy in the electronic commerce transaction evaluation process.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the protection scope of the present invention, although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.
Claims (8)
1. An electronic commerce transaction system for data encryption transmission is characterized by comprising an intelligent parameter setting module, a blockchain module, an encryption module, an electronic commerce transaction evaluation module and a transaction module, wherein the intelligent parameter setting module is used for quantifying the requirements of users and comprises transaction IDs, transaction types, timestamps, privacy levels, transaction objects, transaction addresses and transaction amounts, the intelligent parameter setting module is established in a dictionary mode and comprises keys and key values, the quantified requirements of the users are stored in the blockchain module, the blockchain module is used for safely storing, updating, recording data and transaction activities, electronic commerce transaction behaviors recorded in the blockchain are sorted, the data are grouped according to the transaction types, completely repeated data are deleted, default data are marked and supplemented in time, whether the key value result of each type of data in each group of transaction types falls into a certain interval or not is detected, the intervals comprise normal value intervals, abnormal value intervals and untrusted intervals, wherein the normal value intervals indicate that the key value stored by the user is correct, the abnormal value intervals indicate that the key value stored by the user is incorrect, the abnormal value is highlighted at the moment, the untrusted intervals indicate that the key value stored by the user is problematic, whether the result of data input is correct or not needs to be rechecked for the storage of the key value of the current time by the user, if the result of the key value input by the user is incorrect, the transaction behavior stored in the block chain is modified, and if the result of the key value input by the user is correct, the transaction behavior of the user needs to be rechecked; the encryption module adopts a symmetric block encryption algorithm based on a neural network chaotic sequence and an asymmetric encryption algorithm based on a neural network chaotic attractor to carry out secondary encryption on data, the e-commerce transaction evaluation module selects a support vector machine to select a proper e-commerce transaction type for a user, and the user completes the transaction at the transaction module.
2. The system of claim 1, wherein the intelligent parameter setting module is configured to quantify user requirements, including transaction ID, transaction type, timestamp, security level, transaction object, transaction address, and transaction amount, and is established in a dictionary manner, including keys and key values, and recorded as the key valuesThe timestamps are uniformly numbered through a hash function after being input according to standard time, the selection range of the timestamps is the combination of numbers and 26 lower case letters, and the security level comprises three levels of public security, common security and special security.
3. The system of claim 1, wherein the blockchain module is configured to organize transaction behaviors in the blockchain, distinguish data according to transaction types, delete completely duplicated data, and default data needs to be labeled and supplemented in time, and the key value result of each data in each group of transaction types falls into a certain interval, where the interval includes a normal value interval, an abnormal value interval, and an untrusted interval, where the normal value interval indicates that the key value stored by the user is correct, the abnormal value interval indicates that the key value stored by the user is incorrect, the abnormal value is highlighted at the time, the untrusted interval indicates that the key value stored by the user is problematic, the user needs to recheck the storage of the key value of this time to see whether the result of data input is correct, and if the result of the key value input by the user is incorrect, the transaction behavior stored in the blockchain is modified, and if the result of the key value input by the user is correct, the transaction behavior of the user needs to be detected again.
4. The system of claim 1, wherein the encryption module encrypts the data using a symmetric block encryption algorithm based on a neural network chaotic sequence, assuming that the data is encrypted by the symmetric block encryption algorithmIndicating an encryption operation, M indicates data that needs to be encrypted,representing decryption, C representing data needing decryption after encryption, and satisfying the following conditions:,and has:the symmetric block encryption algorithm based on the neural network chaotic sequence needs to meet the requirements that a plaintext to be encrypted is 56 bits, a check bit is 8 bits, and a total bit is 64 bits, and the method specifically comprises the following steps:
(1) firstly, carrying out initial transformation on a plaintext, dividing an information block into two parts, and then transforming a product through a function, wherein 16 times of execution are needed;
(2) after the product transformation, the two parts of information are combined to execute the inverse initial transformation operation, and the left-shifted message is changed into 48 bits;
(3) replace 32 bits of new data with the final result;
(4) and (4) executing replacement operation according to the steps (1) to (3), and finishing the encryption process after 16 execution cycles.
5. The system of claim 4, wherein the encryption module assumes a given keyIf it is determined thatThe generated subkey is,,Then, thenCalled weak key, satisfies:
wherein the content of the first and second substances,represents a symmetric block encryption algorithm based on a neural network chaotic sequence,a decryption algorithm representing symmetric blocks based on a neural network chaotic sequence, ifIn all, there isWhere M ', C ', and k ' are non-operational, a public key is used for encrypting data, and a private key is used for decrypting data, the same key is used for encryption and decryption each time in the conventional symmetric encryption system, and the public key encryption system uses two unrelated keys to ensure the security of the network, the security of data, and the security of the key itself, the expression is as follows:
a symmetric block encryption algorithm based on a neural network chaotic sequence encrypts data of an electronic commerce platform, wherein the chaotic neural network consists of chaotic neurons, external input and internal feedback input, a single chaotic neuron is provided with feedback and external input items from the internal neuron as well as unstable items and threshold values from the neuron per se, and the chaotic neural network is composed ofOf chaotic neural networks comprising chaotic neuronsThe equation for each neuron is as follows:
wherein the content of the first and second substances,is the firstA chaotic neuron in discrete timeThe output of (a) is obtained,is the firstThe continuous output function of each chaotic neuron,is the number of chaotic neurons that are,is the firstA chaotic neuron andthe connection weight of each chaotic neuron,is the firstThe axonal transformation transfer function of a chaotic neuron,is the number of external inputs that the user has,is the firstAn input and aThe connection weight of each chaotic neuron,is a discrete time of (To get it atThe intensity of each input,Is the firstThe refractoriness function of each chaotic neuron,is the attenuation coefficient of the degree of fire resistance,is a self-feedback coefficient, and,is the firstComplete or unexcited threshold of chaotic neuron ifIs shown asA chaotic neuron in discrete timeThe iteration of the chaotic neural network is represented as follows:
for all neurons, functionAndis defined asWhereinAs a function of the sign, i.e.:the external input intensity of each neuron at any time is set to the initial external input intensity value, i.e.:values of 0 or 1, each of which is assumed to beAll firing thresholds of neurons areThe method comprises the following steps:wherein, in the step (A),andare respectively the firstA chaotic neuron in discrete timeAndinternal state of (2), assumeMay take values of 1, 0 and-1, which, when in an excited state,when they are in the inhibition state, thenWhen they are not directly connected to each other,equalizing the number of excitatory connections and inhibitory connections based on statistical properties of the neural network and increasing unpredictability of the neural network output sequence since the chaotic neural network is at Ho with a time lagIntroduced on the basis of the model of the pfield neural network, and therefore, according to the requirement of constructing a connection matrix by the HopfieldWhen, supposeTo obtain the values of the connection weight matrix.
6. The system of claim 5, wherein the parameter is a parameter of the electronic commerce transaction system、Andis selected from the group consisting of integers, secondlyTo make the non-periodic fluctuation centered at 0, the designed chaotic neural network is updated as follows:
whereinFor the correction factor, define a correction factor havingA discrete Hopfield neural network of interconnected neurons, each neuron having a state of,Is 0 or 1, the next stateDependent on the current state of the neuron, i.e.Wherein, in the step (A),is a neuronAndis a symmetric matrix,is a neuronThe threshold value of (a) is set,is thatTime of dayThe state of the individual neurons is known,is thatTime toThe state of the individual neurons is known,is thatTime of dayState of individual neuron, neural network inThe energy over time is given in the following table:
the energy function is monotonically decreased along with the evolution of the system state, and the neural network finally reaches a stable state due to limited energy, and is defined as an attractor, the attractor is a chaotic attractor, namely, the attractor is not related to the rule between the attractor and the initial state, and unpredictable relation exists between state messages in the attraction domain of each attractor, if the weight matrix is connectedThe attractors and their corresponding attraction fields will change accordingly, introducing a random transformation matrixThen, the original initial state is setAnd an attractorRespectively converted into new initial statesAnd an attractorThe method comprises the following steps:
the matrix of synaptic connections between neurons consists of +1, 0 and-1, with + l, 0 and-1 indicating that two neurons are in an excitatory state, no direct connection and an inhibitory state, respectively, and according to statistical probabilities, if there are more unpredictable attractors, the number of excitatory synaptic connections in the network is equal to the number of inhibitory synaptic connections, assuming that the number of samples stored in the network is 8 and the convergence field element is 20, the matrix of connecting synapses is given by:
in order to ensure the encryption effect, it is necessary to perform security analysis on the symmetric block encryption algorithm based on the neural network chaotic sequence, and assuming that it is converted into a binary sequence C, it is derived by the following formula:
wherein the content of the first and second substances,,the binary autocorrelation function R is as follows:
on the basis, the design of a symmetric packet encryption algorithm based on a neural network chaotic sequence and an asymmetric packet encryption algorithm based on a neural network chaotic attractor is analyzed, and the method has safety in electronic commerce transaction transmission.
7. The system of claim 1, wherein the e-commerce transaction evaluation module optimizes the kernel function parameters and penalty factors of the SVM using a PSO algorithm.
8. The system of claim 7, wherein the particle swarm algorithm is configured to perform the following steps in the search spaceUpdating the time:
step (1): performing similar updating detection on each particle in the particle swarm: order toRepresents the second in the particle groupThe number of the particles is one,represents the second in the particle groupParticles ofAnd particlesIn thatThe time meets the following conditions:and isWhen it is, the particles are determinedAnd particlesIn thatThe time instants are similar update particles, wherein,to representTime particleAt the location of the search space,to representTime particleAt the location of the search space,to representTime particleAt the individual optimal position of the search space,to representTime particleAt the individual optimal position of the search space,is a group of particles inA similarity detection threshold for the time of day, andwherein, in the step (A),to representTime particleIn the neighborhood of the search space, andwherein, in the step (A),to representDistance position in time particle swarmFirst, theThe position of the particles that are close to each other,is a given positive integer, an,Is the total number of particles in the population;
classifying the particles which are judged to be similar updating particles in the particle swarm specifically as follows: is provided withTo representThe first one obtained by classifying the particles in the particle group and the like updated particlesClass I, class IIThe particles in (a) are selected from the group of particles in the following way: randomly selecting one particle from the unclassified particles of the current particle swarm to be added into the classWhen the randomly selected particle does not have similar updating particle in the particle swarm, the selection of the particle in the swarm is stopped to add the classWhen the randomly selected particle has similar renewing particles in the particle group, adding the similar renewing particles of the randomly selected particle into the classAnd continuing to neutralize the current class with the population of particlesAny one of the particles is a particle addition class of similar update particlesIn (1), until classStopping selecting particles in the population to join the class when the medium particles do not have similar updating particles in the current populationPerforming the following steps;
is provided withTo representA class set obtained by classifying the particles in the particle swarm and the similar updated particles thereof at all times, anWherein, in the step (A),representation collectionThe number of middle classes;
step (2): separately pair collections in the following mannerIn the above-mentioned classes of particlesUpdating the time: is provided withPresentation classThe number of the particles in (2) is,for a given positive integer, for determining the setThe update method of the class-I particles, andclass III of the related artThe medium particle satisfies:then, the following method is adopted to classifyMiddle particle ofUpdating the time:
in the above updating formula, letPresentation classTo (1)The number of the particles is one,andrespectively representTime particleAt the location and step size of the search space,andrespectively representTime particleAt the location and step size of the search space,represents a group of particles inAn inertial weight factor of a time of day, and,andrespectively given a maximum inertia weight factor and a minimum inertia weight factor, and,,the maximum number of iterations is indicated,andare respectively in the intervalThe random number generated in the random number generator is used,to representTime of day particleAt the individual optimal position in the search space,to representThe time of day the particle swarm is at the global optimum location of the search space,a local learning factor representing a population of particles,a global learning factor representing a population of particles,andthe value of (d) may take:,;
class IIIThe medium particle satisfies:then, the following method is adopted to classifyMiddle particle ofUpdating the time:
in the above-described update formula,to representTime of day particleInertial weight factor in the search spaceThe values of (A) are set as:
wherein, the first and the second end of the pipe are connected with each other,representation classThe historical similarity coefficient of mesoparticle, andwherein, in the step (A),representation classTo (1)The number of the particles is one,to representTime particleAt the location of the search space,to representTime particleAt the location of the search space,is shown in the intervalInternally generated random numbers.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211235695.2A CN115619555B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system with data encryption transmission function |
CN202211235708.6A CN115622774B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system based on improved particle swarm optimization and supporting data encryption transmission of vector machine |
CN202210944450.0A CN115065458B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system with data encryption transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210944450.0A CN115065458B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system with data encryption transmission |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211235695.2A Division CN115619555B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system with data encryption transmission function |
CN202211235708.6A Division CN115622774B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system based on improved particle swarm optimization and supporting data encryption transmission of vector machine |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115065458A true CN115065458A (en) | 2022-09-16 |
CN115065458B CN115065458B (en) | 2022-11-15 |
Family
ID=83208514
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210944450.0A Active CN115065458B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system with data encryption transmission |
CN202211235708.6A Active CN115622774B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system based on improved particle swarm optimization and supporting data encryption transmission of vector machine |
CN202211235695.2A Active CN115619555B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system with data encryption transmission function |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211235708.6A Active CN115622774B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system based on improved particle swarm optimization and supporting data encryption transmission of vector machine |
CN202211235695.2A Active CN115619555B (en) | 2022-08-08 | 2022-08-08 | Electronic commerce transaction system with data encryption transmission function |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN115065458B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116308655A (en) * | 2023-03-17 | 2023-06-23 | 北京未来链技术有限公司 | Intelligent community commodity big data intelligent bill spelling and settlement system based on blockchain |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116405283B (en) * | 2023-04-06 | 2023-11-24 | 广州大有网络科技有限公司 | Data encryption authentication system based on information data protection |
CN116308813B (en) * | 2023-05-17 | 2023-08-08 | 青岛农村商业银行股份有限公司 | Different-industry combined financial equity safety management system |
CN117035836A (en) * | 2023-10-08 | 2023-11-10 | 深圳市焕想科技有限公司 | Electronic commerce transaction data processing method and system based on artificial intelligence |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109165224A (en) * | 2018-08-24 | 2019-01-08 | 东北大学 | A kind of indexing means being directed to keyword key on block chain database |
CN110611701A (en) * | 2018-08-21 | 2019-12-24 | 汇链丰(北京)科技有限公司 | Parameter configuration and transaction processing method based on block chain |
US20200371833A1 (en) * | 2019-05-24 | 2020-11-26 | International Business Machines Corporation | Anomalous transaction commitment prevention for database |
CN112927072A (en) * | 2021-01-20 | 2021-06-08 | 北京航空航天大学 | Block chain-based anti-money laundering arbitration method, system and related device |
CN113723954A (en) * | 2021-06-15 | 2021-11-30 | 复旦大学 | Method for detecting and supervising abnormal transaction nodes in block chain |
US20210397891A1 (en) * | 2020-06-17 | 2021-12-23 | Capital One Services, Llc | Anomaly analysis using a blockchain, and applications thereof |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001144746A (en) * | 1999-11-11 | 2001-05-25 | Japan Science & Technology Corp | Enchiper system and decoding system using chaos neural network |
JP2003023421A (en) * | 2001-07-09 | 2003-01-24 | C4 Technology Inc | Encryption method, program thereof, recording medium recorded with the program, encryption device, decoding method, and decoder |
CN101977112B (en) * | 2010-11-04 | 2013-10-09 | 厦门大学 | Public key cipher encrypting and decrypting method based on neural network chaotic attractor |
CN106485348A (en) * | 2016-09-22 | 2017-03-08 | 中国银联股份有限公司 | A kind of Forecasting Methodology of transaction data and device |
CN107231214B (en) * | 2017-06-12 | 2020-07-28 | 哈尔滨工程大学 | Optimal multi-user detection method based on evolutionary chaotic quantum neural network |
US10542046B2 (en) * | 2018-06-07 | 2020-01-21 | Unifyvault LLC | Systems and methods for blockchain security data intelligence |
CN110852604A (en) * | 2019-11-08 | 2020-02-28 | 湖南商学院 | Dynamic trust calculation method based on mobile Agent |
CN112632842A (en) * | 2020-12-23 | 2021-04-09 | 国网北京市电力公司 | Trading harmony based power grid and building energy consumption trading matching method and system |
CN112765271B (en) * | 2020-12-31 | 2023-02-07 | 杭州趣链科技有限公司 | Block chain transaction index storage method and device, computer equipment and medium |
CN113554511B (en) * | 2021-06-23 | 2023-06-27 | 河海大学 | Active power distribution network power transaction method based on blockchain and particle swarm optimization |
CN114331436A (en) * | 2021-12-30 | 2022-04-12 | 江苏九一网络科技有限公司 | E-commerce safe transaction system based on block chain |
-
2022
- 2022-08-08 CN CN202210944450.0A patent/CN115065458B/en active Active
- 2022-08-08 CN CN202211235708.6A patent/CN115622774B/en active Active
- 2022-08-08 CN CN202211235695.2A patent/CN115619555B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611701A (en) * | 2018-08-21 | 2019-12-24 | 汇链丰(北京)科技有限公司 | Parameter configuration and transaction processing method based on block chain |
CN109165224A (en) * | 2018-08-24 | 2019-01-08 | 东北大学 | A kind of indexing means being directed to keyword key on block chain database |
US20200371833A1 (en) * | 2019-05-24 | 2020-11-26 | International Business Machines Corporation | Anomalous transaction commitment prevention for database |
US20210397891A1 (en) * | 2020-06-17 | 2021-12-23 | Capital One Services, Llc | Anomaly analysis using a blockchain, and applications thereof |
CN112927072A (en) * | 2021-01-20 | 2021-06-08 | 北京航空航天大学 | Block chain-based anti-money laundering arbitration method, system and related device |
CN113723954A (en) * | 2021-06-15 | 2021-11-30 | 复旦大学 | Method for detecting and supervising abnormal transaction nodes in block chain |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116308655A (en) * | 2023-03-17 | 2023-06-23 | 北京未来链技术有限公司 | Intelligent community commodity big data intelligent bill spelling and settlement system based on blockchain |
CN116308655B (en) * | 2023-03-17 | 2023-09-15 | 北京未来链技术有限公司 | Intelligent community commodity big data intelligent bill spelling and settlement system based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN115622774B (en) | 2024-01-12 |
CN115619555B (en) | 2023-06-09 |
CN115622774A (en) | 2023-01-17 |
CN115065458B (en) | 2022-11-15 |
CN115619555A (en) | 2023-01-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Akcora et al. | Bitcoinheist: Topological data analysis for ransomware detection on the bitcoin blockchain | |
CN115065458B (en) | Electronic commerce transaction system with data encryption transmission | |
Feng et al. | Mining network data for intrusion detection through combining SVMs with ant colony networks | |
Wazirali | An improved intrusion detection system based on KNN hyperparameter tuning and cross-validation | |
Pradeep Mohan Kumar et al. | Intrusion detection system based on GA‐fuzzy classifier for detecting malicious attacks | |
McDermott et al. | Investigation of computational intelligence techniques for intrusion detection in wireless sensor networks. | |
Prabhakaran et al. | Hybrid semantic deep learning architecture and optimal advanced encryption standard key management scheme for secure cloud storage and intrusion detection | |
Subaira et al. | Efficient classification mechanism for network intrusion detection system based on data mining techniques: a survey | |
Panigrahi et al. | Two-stage database intrusion detection by combining multiple evidence and belief update | |
Torabi et al. | Practical autoencoder based anomaly detection by using vector reconstruction error | |
Benmalek et al. | Security of federated learning: Attacks, defensive mechanisms, and challenges | |
Kadry et al. | Intrusion detection model using optimized quantum neural network and elliptical curve cryptography for data security | |
Moorthy et al. | A study of Intrusion Detection using data mining | |
Ge et al. | A review of secure federated learning: Privacy leakage threats, protection technologies, challenges and future directions | |
Wang et al. | Practical blockchain-based steganographic communication via adversarial ai: A case study in bitcoin | |
Hasan et al. | Optimization algorithms for intrusion detection system: a review | |
Babbar et al. | FRHIDS: Federated Learning Recommender Hydrid Intrusion Detection System Model in Software Defined Networking for Consumer Devices | |
Shorfuzzaman | Detection of cyber attacks in IoT using tree-based ensemble and feedforward neural network | |
Tauscher et al. | Learning to detect: A data-driven approach for network intrusion detection | |
Luqman et al. | Privacy and Security Implications of Cloud-Based AI Services: A Survey | |
Pal et al. | InfoSec: A Comprehensive Study | |
Vähäkainu et al. | Adversarial Poisoning Attack's Impact on Prediction Functionality of ML-Based Feedback Loop System in Cyber-Physical Context | |
Kannari et al. | Network Intrusion Detection, Prevention and Sustainable Mechanisms: A Survey. | |
Chen et al. | VerFHS: Verifiable image retrieval on forward privacy in blockchain-enabled IoT | |
Selvamani et al. | An efficacious intellectual framework for host based intrusion detection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20221024 Address after: Room 1401, No. 169, Yingchun Street, Laishan District, Yantai City, Shandong Province, 264000 Applicant after: Shandong Dingxin Digital Technology Co.,Ltd. Address before: 100000 Beijing city Haidian District Xitucheng Road No. 10 Applicant before: Beijing University of Posts and Telecommunications |
|
GR01 | Patent grant | ||
GR01 | Patent grant |