CN115329349A - Application supervision platform based on alliance block chain and supervision method thereof - Google Patents

Application supervision platform based on alliance block chain and supervision method thereof Download PDF

Info

Publication number
CN115329349A
CN115329349A CN202210043151.XA CN202210043151A CN115329349A CN 115329349 A CN115329349 A CN 115329349A CN 202210043151 A CN202210043151 A CN 202210043151A CN 115329349 A CN115329349 A CN 115329349A
Authority
CN
China
Prior art keywords
application
information
monitoring
chain
evolution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210043151.XA
Other languages
Chinese (zh)
Inventor
王帅
孙权
才华
肖普山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN202210043151.XA priority Critical patent/CN115329349A/en
Publication of CN115329349A publication Critical patent/CN115329349A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to an application supervision platform based on a federation blockchain and an application supervision method based on the federation blockchain. The platform includes: the information evidence storing system is used for storing the evidence of the sandbox test related information of the financial innovation application on the chain of the block chain of the alliance; the risk monitoring system is used for monitoring the running state of the application and outputting a monitoring result according to the sandbox test related information of the application stored on the chain from the information storage system; and the achievement evaluation system is used for evaluating the application according to the monitoring result from the risk monitoring system based on a preset rule. According to the invention, systematic and comprehensive application supervision can be realized on the premise of protecting the security of sensitive data.

Description

Application supervision platform based on alliance block chain and supervision method thereof
Technical Field
The invention relates to a computer technology, in particular to an application supervision platform based on an alliance block chain and an application supervision method based on the alliance block chain.
Background
In the Chinese patent "a customer privacy data management method based on a financial block chain" (application number: CN 201810744569.7), a customer privacy data management method based on a financial block chain is provided, which can realize classification management of different dimensions of customer privacy data, and simultaneously combine the characteristics of block chain data trace, so that customers and supervision departments can quickly inquire and monitor the customer privacy data.
However, the existing solution is only concerned with a single technical point, and lacks systematic and systematic research on a supervision technology platform; secondly, the application field in the prior art is limited to foreground services such as clients, services, online channels and the like, and the application in the background fields such as risk management, compliance audit, internal control and the like is relatively lacking.
Disclosure of Invention
In view of the foregoing problems, the present invention aims to provide an application supervision platform based on federation blockchain and an application supervision method based on federation blockchain, which can implement systematic and comprehensive application supervision on the premise of protecting the security of sensitive data.
The application supervision platform based on the alliance block chain in one aspect of the invention is characterized by comprising:
the information evidence storing system is used for storing the evidence of the sandbox test related information of the financial innovation application on the chain of the block chain of the alliance;
the risk monitoring system is used for monitoring the running state of the application and outputting a monitoring result according to sandbox test related information of the application stored on the chain from the information storage system; and
and the result evaluation system is used for evaluating the application based on a preset rule according to the monitoring result from the risk monitoring system.
Optionally, the information evidence storing system adopts a chain structure in combination with the timestamp and adopts asymmetric encryption to perform chain evidence storing on the applied test-related information.
Optionally, the risk monitoring system monitors risk for technology usage security and business continuity.
Optionally, the risk monitoring system monitors the applied test-related information using a zero-knowledge proof of knowledge technique.
Optionally, the risk monitoring system comprises:
and the wind control early warning system is used for realizing wind control early warning applied to sandbox test operation based on the intelligent contract.
Optionally, the wind-controlled early warning system includes:
the sandbox execution container is used for storing the intelligent contract and carrying out wind control early warning based on the intelligent contract;
a blockchain generator for generating a blockchain from test related information of the application in the sandbox execution container; and
and the database stores the blockchain generated by the blockchain generator in a plurality of blocks through a consensus algorithm.
Optionally, in the sandbox execution container, performing a wind-controlled early warning based on an intelligent contract is performed in the following manner:
compiling a preset related rule protocol into an intelligent contract and deploying the intelligent contract on a alliance chain;
uploading sandbox test related information of the financial innovation application to the alliance chain periodically or in real time, and synchronizing the test related information of the application to other nodes on the alliance chain; and
the intelligent contract is automatically checked, if the intelligent contract is triggered, monitoring is carried out, and once abnormity is found, suspicious transactions are positioned and early warning information is sent out.
Optionally, the risk monitoring system further comprises:
and the public opinion monitoring system is used for monitoring the running state of the application and acquiring public opinion information by adopting a public opinion big data technology.
Optionally, the public opinion monitoring system includes:
the multi-source heterogeneous data combined modeling module is used for acquiring multi-source heterogeneous data of the Internet, fusing a combined modeling strategy of data content and network result relation, and associating content semantics with a network structure to construct a data model;
the knowledge graph building module is used for mining the association relation of the application to build a knowledge graph;
the public opinion analysis module is used for analyzing information based on the text content understanding and obtaining public opinion information; and
and the evolution analysis module is used for realizing the detection of the application evolution stage and the clustering of the application evolution stage and outputting clustering result information.
Optionally, the public opinion analysis module includes:
the media focus analysis submodule extracts independent phrases based on the phrase independence and the semantic integrity, clusters phrase variants through a compressed similar search space and obtains a media intersection analysis result; and
and the netizen emotion analysis submodule is used for identifying the positive emotion indicator words and the negative emotion indicator words based on the Z-Score measurement, adding the positive emotion indicator words and the negative emotion indicator words into an emotion word bank, and obtaining a netizen emotion analysis result based on the netizen information related to application and the emotion word bank.
Optionally, the evolution analysis module comprises:
the evolution detection submodule integrates event information and constructs a corresponding data set to train a stage classifier; and
and the evolution clustering submodule groups the development and evolution processes of different events through different clustering centers, and realizes the automatic clustering process of the event evolution stage by merging the types of adjacent stages for each group of event sequences.
Optionally, the public opinion monitoring system further includes:
and the visualization module is used for visually displaying the public opinion information output by the public opinion analysis module and the clustering result information output by the evolution analysis module.
The application supervision method based on the alliance block chain is characterized by comprising the following steps:
the information evidence storing step, namely performing chain on-chain evidence storage on the sandbox test related information applied to the financial innovation on the block chain of the alliance;
a risk monitoring step, namely monitoring the running state of the application and outputting a monitoring result according to the sandbox test related information of the application which is subjected to chain evidence storage in the information evidence storage step; and
and a result evaluation step of evaluating the application based on a preset rule according to the monitoring result from the risk monitoring step.
Optionally, in the step of storing the information, a chain structure is adopted to combine the timestamp and asymmetric encryption is adopted to store the applied test-related information in a chain manner.
Optionally, in the risk monitoring step, risk monitoring is performed for technology usage security and business continuity.
Optionally, in the risk monitoring step, a zero-knowledge proof technique is used to monitor the test-related information of the application.
Optionally, the risk monitoring step comprises:
and a wind control early warning step, namely realizing wind control early warning applied to sandbox test operation based on an intelligent contract.
Optionally, the risk monitoring step further comprises:
and a public opinion monitoring step, namely monitoring the running state of the application and acquiring public opinion information by adopting a public opinion big data technology.
Optionally, the public opinion monitoring step includes:
a multi-source heterogeneous data combined modeling step, namely acquiring multi-source heterogeneous data of the Internet, fusing a combined modeling strategy of data content and network result relation, and associating content semantics with a network structure to construct a data model;
a knowledge graph construction step, namely excavating the association relation of the application to construct a knowledge graph;
a public opinion analyzing step, which is used for analyzing information based on the comprehension of text content and obtaining public opinion information; and
and an evolution analysis step, namely detecting the application evolution stage and clustering the application evolution stage and outputting clustering result information.
Optionally, the public opinion analyzing step includes:
a media focus analysis substep, extracting independent phrases based on the phrase independence and the semantic integrity, and clustering the phrase variants by compressing a similar search space to obtain a media intersection analysis result; and
and a netizen emotion analysis substep, namely identifying positive emotion indicator words and negative emotion indicator words based on Z-Score measurement, adding the positive emotion indicator words and the negative emotion indicator words into an emotion word bank, and obtaining a net name emotion analysis result based on the netizen information related to application and the emotion word bank.
Optionally, the evolution analysis step comprises:
an evolution detection substep, integrating event information and constructing a corresponding data set to train a stage classifier; and
and the evolution clustering substep is used for grouping the development and evolution processes of different events through different clustering centers, and realizing the automatic clustering process of the event evolution stage by merging the types of adjacent stages for each group of event sequences.
Optionally, the public opinion monitoring step further comprises:
and a visualization step of visually displaying the public sentiment information output by the public sentiment analysis step and the clustering result information output by the evolution analysis step.
A computer-readable medium of an aspect of the invention, on which a computer program is stored, is characterized in that,
the computer program, when executed by a processor, implements the federation blockchain-based application policing method.
The computer device in one aspect of the present invention includes a storage module, a processor, and a computer program stored on the storage module and executable on the processor, and is characterized in that the processor implements the federation blockchain-based application monitoring method when executing the computer program.
Drawings
FIG. 1 is a general framework diagram representing a federation blockchain-based application supervision platform of the present invention.
Fig. 2 is a schematic diagram showing the principle of "double key pair certificate" of the present invention.
FIG. 3 is a schematic diagram illustrating the zero knowledge proof technique of the present invention.
Fig. 4 is a schematic diagram showing the configuration of the wind-controlled early warning system.
Fig. 5 is a specific embodiment of performing a wind-controlled early warning based on an intelligent contract in a sandbox execution container.
Fig. 6 is a schematic structural diagram of a public opinion monitoring system.
Fig. 7 is a flowchart illustrating an application supervision method based on federation blockchains according to the present invention.
Detailed Description
The following description is of some of the several embodiments of the invention and is intended to provide a basic understanding of the invention. It is not intended to identify key or critical elements of the invention or to delineate the scope of the invention.
For the purposes of brevity and explanation, the principles of the present invention are described herein with reference primarily to exemplary embodiments thereof. However, those skilled in the art will readily recognize that the same principles are equally applicable to all types of federation blockchain-based application supervision platforms and federation blockchain-based application supervision methods and that these same principles may be implemented therein, as well as any such variations, without departing from the true spirit and scope of the present patent application.
Moreover, in the following description, reference is made to the accompanying drawings that illustrate certain exemplary embodiments. Electrical, mechanical, logical, and structural changes may be made to these embodiments without departing from the spirit and scope of the invention. In addition, while a feature of the invention may have been disclosed with respect to only one of several implementations/embodiments, such feature may be combined with one or more other features of the other implementations/embodiments as may be desired and/or advantageous for any given or identified function. The following description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined by the appended claims and their equivalents.
Terms such as "comprising" and "comprises" mean that, in addition to having elements (modules) and steps that are directly and explicitly stated in the description and claims, the solution of the invention does not exclude the presence of other elements (modules) and steps that are not directly or explicitly stated.
Before describing the application supervision platform based on the federation block chain of the present invention, some technical terms that will appear in the present invention will be described.
(1) Alliance block chain (Consortium blockchains)
The federated blockchains are also called corporate blockchains, referred to as "federated chains" for short. A federation chain refers to a chain of blocks that are subject to a preselected node in the course of a consensus process. The block chain technology of the alliance chain refers to a block chain which can be controlled by a preselected node in a consensus process; for example, rather than having a community of 15 financial enterprises, each enterprise has a node running and each blockchain needs to be acted upon to get a collective acknowledgement of 10 enterprises to be effective. The blockchain may have access to data by all, may be restricted by participants, or may take mixed types of routes, such as the root hash of the blockchain and the API (application program interface) being open to the outside, the API agreeing to external actions to limit the number of queries accessed and to get status messages for the blockchain. These may be referred to as "a portion of the decentralized" blockchain, also referred to as a federation chain.
(2) Public opinion
Public opinion refers to the socio-political attitude that people create and hold to social managers around the occurrence, development and change of social events in a certain social space. It is the sum of the expressions of beliefs, attitudes, opinions, emotions and the like expressed by the social masses about various phenomena and problems in the society.
(3) Zero knowledge proof
Zero-Knowledge Proof (Zero-Knowledge Proof) refers to a prover that can convince a verifier that some argument is correct without providing the verifier with any useful information. Zero knowledge proof is essentially an agreement involving two or more parties, i.e., a series of steps that are required by two or more parties to complete a task. The prover proves to the verifier and convinces him that he knows or owns a certain message, but the proving process cannot reveal any information about the proven message to the verifier.
(4) Intelligent contract
A Smart contract (Smart contract) is a computer protocol intended to propagate, verify or execute contracts in an informational manner. Smart contracts allow trusted transactions, which are traceable and irreversible, to be conducted without a third party. The goal of smart contracts is to provide a secure method over traditional contracts and to reduce other transaction costs associated with the contracts.
(5) Sand box
Sandbox (Sandbox) is a virtual system program that allows you to run a browser or other program in a Sandbox environment so that changes made by the run can be subsequently removed. The method creates an independent operation environment similar to a sandbox, and programs running in the environment cannot permanently influence a hard disk. In network security, sandboxing refers to the tools used to test the behavior of untrusted files or applications, etc., in an isolated environment.
(6) Supervision sandbox
The supervision sandbox means that a financial supervision department allows financial institutions, financial science and technology enterprises and the like to carry out business tests by utilizing real or virtual market environments under limited license plates according to business risk degree and influence surface and moderately simplified admission standards and flows within a legal authorization range. After the test is passed, the related qualification and license plate are obtained according to the current laws and regulations and are included in the normal supervision range.
(7)Z-Score
Z-Score normalization is a common method of data processing. By which data of different magnitudes can be converted into Z-Score scores of a unified measure for comparison. Z-Score converts two or more groups of data into a unitless Z-Score value through (x-mu)/sigma, so that the data standard is unified, the data comparability is improved, and the data interpretability is weakened.
In the following, the application supervision platform based on the federation blockchain of the present invention and the application supervision system based on the federation blockchain of the present invention are described.
FIG. 1 is a general framework diagram representing a federation blockchain-based application supervision platform of the present invention.
The federation blockchain-based application monitoring platform of the present invention may be applied, for example, to application monitoring for financial applications. The application supervision platform based on the alliance block chain is realized by taking the alliance block chain as a bottom layer.
As shown in fig. 1, the application supervision platform based on federation blockchain of the present invention includes: .
The information evidence storing system 100 is used for storing the evidence on the chain of the alliance block chain for the sandbox test related information applied to the financial innovation;
the risk monitoring system 200 is used for monitoring the running state of the application and outputting a monitoring result by referring to the test related information of the application stored on the chain from the information storage system; and
and the result evaluation system 300 evaluates the application based on a preset rule according to the monitoring result from the risk monitoring system.
Because the full life cycle related to the application has a large amount of information needing to be stored, including application statements, service agreements and the like before the monitoring sandbox test starts, test data and performance indexes in the test process, test reports after the test is finished, feedback complaints and the like, the information storage system 100 of the invention adopts the technology of 'chain structure + timestamp + asymmetric encryption + digital signature' to realize reliable storage and efficient source tracing on the full life cycle chain of the application. Specifically, in the information proof system 100, the hash value is asymmetrically encrypted and the timestamp is added to the applied test-related information, and meanwhile, the digital signature is adopted, so that the processed information is kept on a chain, and thus, the trusted proof storage and the efficient source tracing can be realized.
The risk monitoring system 200 performs risk monitoring for both technical usage security and business continuity. The technology use safety comprises multi-dimensional risk monitoring, so that information protection and transaction safety are realized, and the service continuity comprises an operation state, internal control management and risk early warning.
The achievement evaluation system 300 evaluates the application based on pre-established rules and according to the monitoring results from the risk monitoring system. For example, business rules, technical standards, and regulatory requirements are formulated from the on-chain data, and the monitoring results output by risk monitoring system 200 are evaluated according to the business rules, technical standards, and regulatory requirements.
In the application supervision platform based on the block chain of the alliance, for network security, a P2P network (Peer-to-Peer network) is adopted for networking, and a distributed and trusted consensus network is constructed based on a PKI public key system; for data security, on the basis of a traditional chain type storage structure, the security and the privacy of user data are guaranteed by adopting the combination of an asymmetric encryption algorithm and a symmetric encryption algorithm and adopting modes of a parallel chain, a master chain and the like; for asset security, the user asset security is guaranteed by adopting a single-sign or multi-sign mechanism based on a SM (short message service) cryptographic algorithm, an extensible key technology, a secret sharing algorithm and other technologies.
On the other hand, the scheme of 'double-key certificate' is adopted in the application supervision platform based on the alliance block chain, so that the risk that data cannot be recovered due to key loss is prevented, and supervision by a supervision department is facilitated. Fig. 2 is a schematic diagram showing the principle of "double key pair certificate" of the present invention. As shown in fig. 2, in order to ensure that important data is only visible to authorized parties, the invention also utilizes a combination of "symmetric encryption and public key encryption", so that only authorized users can decrypt protected data with their own private keys.
Specifically, in the process of encrypting data, a random symmetric key is generated first, transaction data is encrypted by using the random symmetric key to obtain a symmetric key ciphertext, the symmetric key ciphertext is further encrypted by using the public key of the user a for the user a authorized to access the transaction data, and the symmetric key ciphertext is further encrypted by using the public key of the user B for the user B authorized to access the transaction data. In the process of decrypting the data, two keys are needed, for example, for a user A authorized to access the transaction data, the private key of the user A is firstly used for decryption to obtain a symmetric key ciphertext, then the random symmetric key is used for decryption to obtain the symmetric key ciphertext to obtain the transaction data, and similarly, for a user B authorized to access the transaction data, the private key of the user B is firstly used for decryption to obtain the symmetric key ciphertext, and then the random symmetric key is used for decryption to obtain the transaction data.
Further, in order to protect the privacy of data, a zero-knowledge proof technology (an encryption algorithm which is difficult to decrypt and easy to verify) is utilized in the application supervision platform based on the alliance block chain, so that whether the transaction record provided by the audited party is consistent with the data recorded on the chain or not is verified under the conditions that the transaction data is not decrypted and the plaintext of specific content is not acquired. The purpose is to meet the requirements of supervision and audit, ensure the data hiding performance of the audited party and realize controllable anonymity. FIG. 3 is a schematic diagram illustrating the zero knowledge proof technique of the present invention. As shown in fig. 3, in case of both parties trading, and encrypting the trade data to the uplink, party a will provide the trade record to the supervisor, and the supervisor verifies whether the trade record is consistent with the connected trade data. The zero-knowledge proof of knowledge technique shown in fig. 3 may be employed in the risk monitoring system 200 of the present invention to monitor the test related information of the application.
The risk monitoring system 200 of the present invention may include (not shown) as one example:
the wind control early warning system 210 is used for realizing wind control early warning in the test operation of the application sandbox based on the intelligent contract;
and the public opinion monitoring system 220 is used for monitoring the running state of the application and acquiring public opinion information by adopting a public opinion big data technology.
First, the wind-controlled early warning system 210 will be explained below.
Next, the wind-controlled warning system will be described with reference to fig. 4.
Fig. 4 is a schematic diagram showing the configuration of the wind-controlled early warning system.
The wind-controlled early warning system 210 of the present invention comprises:
the sandbox execution container 211 is used for storing the intelligent contract and carrying out wind control early warning based on the intelligent contract;
a blockchain generator 212 that generates a blockchain based on the relevant data in the sandbox execution container; and
the database 213 stores the blockchain generated by the blockchain generator in a plurality of blocks by using a consensus algorithm.
As shown in fig. 4, the intelligent contract is a computer program which runs on a distributed ledger, presets rules, has status and conditional responses, and can encapsulate, verify, and execute complex behaviors of distributed nodes, and complete information exchange, value transfer, and asset management. As a program code deployed on a blockchain, once a term in a smart contract is triggered, the code can be automatically enforced, and has the characteristics of transparent credibility, automatic execution, enforcement, programmability, difficult tampering and the like. Thus, the wind control early warning system 210 of the invention utilizes the technical characteristics of the intelligent contract to realize the wind control early warning and audit support applied in the sandbox test operation process.
Fig. 5 is a diagram illustrating an embodiment of performing a pneumatic pre-warning based on a smart contract in the sandbox execution container 211.
As shown in fig. 5, performing the wind-controlled early warning based on the smart contract in the sandbox execution container 211 is performed as follows: compiling a preset related rule protocol into an intelligent contract and deploying the intelligent contract on a alliance chain; uploading the application test related information to the alliance chain periodically or in real time, and synchronizing the application test related information to other nodes on the alliance chain; and automatically checking the intelligent contract, monitoring if the intelligent contract is triggered, positioning the suspicious transaction and sending out early warning information once the abnormity is found.
Specifically, a supervision alliance chain is constructed, and supervision departments, innovation and application research and development enterprises, autonomous organizations, notarization institutions, auditing institutions and the like are used as nodes to join the alliance chain network. And compiling the supervision rules, the compliance requirements and the like into an intelligent contract, deploying the intelligent contract in a distributed alliance chain network, and obtaining the whole network approval. In actual application, the supervised organization uploads the innovative application test operation data to the alliance chain regularly or in real time according to the requirements of the supervision department. After the nodes of the supervision department and the auditing organization synchronize the data, the intelligent contract is triggered, and network fraud and the like are automatically monitored. Once abnormality is found, suspicious transactions are positioned immediately, and early warning information is reported to a supervision department.
Next, the public opinion monitoring system 220 will be described.
Fig. 6 is a schematic structural diagram of a public opinion monitoring system.
As shown in fig. 6, the public opinion monitoring system 220 includes:
the multi-source heterogeneous data joint modeling module 221 is configured to obtain multi-source heterogeneous data (internet source information, such as news, blogs, forums, microblogs and the like) of the internet, combine a joint modeling strategy of data content and network result relationship, associate content semantics with a network structure to construct a data model, for example, mass data unified modeling based on cognitive computation and network structure unified modeling based on diffusion activation;
a knowledge graph construction module 222, configured to mine an association relationship of the application to construct a knowledge graph, for example, the knowledge graph includes implicit relationship mining based on an attention embedding mechanism and construction of a knowledge graph evolving towards an application topic;
a public opinion analyzing module 223 for performing information analysis based on the text content understanding and obtaining public opinion information;
an evolution analysis module 224, configured to implement detection of the application evolution stage and clustering of the application evolution stage, and output clustering result information;
and a visualization module 225 for visually displaying the public opinion information output by the public opinion analysis module and the clustering result information output by the evolution analysis module.
In the multi-source heterogeneous data joint modeling module 221, in order to uniformly model the application massive data, in the invention, a human brain memory activation mechanism is simulated, a joint modeling strategy of data content and network structure relation is fused, and content semantics and a network structure are associated. And then, a novel data modeling and knowledge representation framework based on cognitive computation is constructed, and a new mode of storing, querying, computing and deducing the application topic data is constructed on the basis.
Moreover, aiming at the characteristics of cross-platform, cross-channel and unstructured network structures of financial application scenes, a novel network representation learning method is researched based on an Adaptive Control of depth (ACT) diffusion activation theory. The method realizes the whole non-deviation input of the network and the updating of the diffusion type node vectors through a diffusion activation mode during node updating so as to solve the input deviation problem caused by local input in the traditional method and obtain high-quality network node vector representation through a small amount of iterative learning.
Wherein, further, the public opinion analysis module 222 includes:
the media focus analysis submodule 226 extracts independent phrases based on the phrase independence and semantic integrity by using the hot topic automatic detection technology based on the culture genes, and clusters phrase variants by compressing a similar search space to obtain a media intersection analysis result; and
and the netizen emotion analysis submodule 227 recognizes the positive emotion indicator and the negative emotion indicator based on the Z-Score measure and adds the positive emotion indicator and the negative emotion indicator into an emotion word bank in consideration of the field relevance of emotion analysis, and obtains a net name emotion analysis result based on the netizen information related to application and the emotion word bank.
In addition, in order to ensure the classification robustness of the classifier on mass data, the public opinion monitoring system 220 further introduces a self-learning mechanism to expand the training set.
Wherein, further, the evolution analysis module 224 comprises:
the evolution detection submodule 228 is used for integrating the information quantity of the events, information forwarding links, the number of participators and social networks by combining the action difference of dynamic factors in the development and evolution process of the public sentiment events and constructing a corresponding data set to train a stage classifier; and
the evolutionary clustering submodule 229 combines with a high-efficiency clustering strategy to group the evolutionary processes of different events through different clustering centers, and for each group of event sequences, realizes the automatic clustering process of the event evolutionary stage by merging the types of adjacent stages.
The visualization module 225 performs multi-modal and interactive visualization analysis on the application data, specifically integrates a dynamic network evolution visualization analysis technology based on a pixel matrix array, and performs comparison of large-scale hierarchical structure data based on a BarcodeTree visualization method.
An embodiment of a federation blockchain-based application supervision platform to which the present invention is applied is described below.
The 'mobile phone POS application' of China Union Bank is taken as a case and is accessed to the application supervision platform based on the block chain of the Union. The evaluation result of 'mobile phone POS application' shows that the application supervision platform based on the alliance block chain realizes the full-life-cycle management of financial science and technology innovation application and the dynamic detection and comprehensive evaluation of risks, effectively supports the efficient operation of a sandbox test mechanism, meets the design requirement of system concepts on all functions, and accords with the expected effect.
Specifically, taking the 'mobile phone POS innovation application' of the chinese union bank as an example, before using the application supervision platform based on the union block chain of the present invention, a special team needs to manually compile test operation conditions (including quantitative data: transaction number, transaction amount, suspected cash-out number, suspected fraud conspire number of merchants, and qualitative data: partner condition, difficulty in work, next-stage work plan, etc.) of the innovation application regularly, and report the test operation conditions to the supervision institution through a mail in the form of a double-week report.
After the application supervision platform based on the alliance block chain is accessed, the following index effects are realized: the monitoring alliance chain realizes credible evidence storage and efficient source tracing of the whole process information of the innovative application sandbox test, and early warning of suspected fraud and other application risks is realized through an intelligent contract; and secondly, the public opinion panoramic monitoring system realizes public opinion monitoring on mainstream news media, public numbers, microblogs and self-media, can feed back related information (including public opinion summary, public opinion overview, alarm information, crisis index, popularity index, emotion distribution and the like) to a service team at the first time, and is convenient for public opinion guidance. According to statistics, the automatic extraction accuracy of financial event clues of a public sentiment monitoring platform is more than or equal to 90%, the social sentiment polarity classification accuracy of the netizens is more than or equal to 70%, and the automatic extraction accuracy is in the leading level of the industry; and thirdly, the whole process management of the sandbox test is realized. Because the supervision platform has the function of innovative application and full life cycle management, according to statistics, the time cost of the mobile POS docking personnel investment is reduced by 80 percent.
Next, the application supervision method based on the federation blockchain of the present invention will be described.
Fig. 7 is a flowchart illustrating an application supervision method based on federation blockchains according to the present invention.
As shown in fig. 7, the application supervision method based on federation block chains of the present invention includes:
an information storage step S100: performing chain verification on the applied test related information of the block chain of the alliance;
risk monitoring step S200: monitoring the running state of the application according to the test related information of the application stored on the chain in the information storage step and outputting a monitoring result; and
outcome evaluation step S300: evaluating an application based on a preset rule according to the monitoring result from the risk monitoring step.
In the step S100, chain structure and timestamp are combined, and asymmetric encryption is used to perform chain verification on the applied test related information.
In the risk monitoring step S200, risk monitoring is performed for technology utilization security and business continuity.
In the risk monitoring step S200, a zero-knowledge proof technique is used to monitor the test-related information of the application.
Wherein the risk monitoring step S200 includes:
a wind control early warning step, which is to realize wind control early warning applied to sandbox test operation based on an intelligent contract; and
and a public opinion monitoring step, namely monitoring the running state of the application and acquiring public opinion information by adopting a public opinion big data technology.
Wherein, public opinion monitoring step includes:
a multi-source heterogeneous data combined modeling step, namely acquiring multi-source heterogeneous data of the Internet, fusing a combined modeling strategy of data content and network result relation, and associating content semantics with a network structure to construct a data model;
a knowledge graph construction step, namely excavating the association relation of the application to construct a knowledge graph;
a public opinion analyzing step, which is used for analyzing information based on the comprehension of text content and obtaining public opinion information;
an evolution analysis step, which realizes the detection of the application evolution stage and the clustering of the application evolution stage and outputs clustering result information; and
and a visualization step of visually displaying the public sentiment information output by the public sentiment analysis step and the clustering result information output by the evolution analysis step.
Further, the public opinion analysis step comprises:
a media focus analysis substep, extracting independent phrases based on the phrase independence and the semantic integrity, and clustering the phrase variants by compressing a similar search space to obtain a media intersection analysis result; and
and a netizen emotion analysis substep, namely identifying positive emotion indicator words and negative emotion indicator words based on Z-Score measurement, adding the positive emotion indicator words and the negative emotion indicator words into an emotion word bank, and obtaining a net name emotion analysis result based on the netizen information related to application and the emotion word bank.
Further, the evolution analysis step comprises:
an evolution detection substep, integrating the event information amount, the information forwarding link, the number of participators and the social network, and constructing a corresponding data set to train a stage classifier; and
and the evolution clustering substep is used for grouping the development and evolution processes of different events through different clustering centers, and realizing the automatic clustering process of the event evolution stage by merging the types of adjacent stages for each group of event sequences.
The present invention further provides a computer readable medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the application supervision method based on federation block chains.
The invention also provides a computer device, which comprises a storage module, a processor and a computer program stored on the storage module and capable of running on the processor, and is characterized in that the processor implements the application supervision method based on the federation blockchain when executing the computer program.
According to the application supervision platform based on the alliance block chain and the application supervision method based on the alliance block chain, trusted evidence storage and efficient source tracing on the whole life cycle chain of application supervision data can be achieved according to the alliance block chain technology, and data cooperation without sensitive information leakage is achieved by combining privacy computing technologies such as zero knowledge evidence and secret sharing; based on an intelligent contract technology, the digitization and the programming of the supervision rules are realized, and further, the wind control early warning and the audit support of the application sandbox testing process are realized; based on public opinion big data technology, accurate perception and deep mining of media focus and netizen viewpoint of application are realized.
The above examples mainly illustrate the application supervision platform based on federation blockchain and the application supervision method based on federation blockchain of the present invention. Although only a few embodiments of the present invention have been described in detail, those skilled in the art will appreciate that the present invention may be embodied in many other forms without departing from the spirit or scope thereof. Accordingly, the present examples and embodiments are to be considered as illustrative and not restrictive, and various modifications and substitutions may be made therein without departing from the spirit and scope of the present invention as defined by the appended claims.

Claims (24)

1. An application supervision platform based on federation blockchains, comprising:
the information evidence storing system is used for storing the evidence of the sandbox test related information of the financial innovation application on the chain of the block chain of the alliance;
the risk monitoring system is used for monitoring the running state of the application and outputting a monitoring result according to the sandbox test related information of the application stored on the chain from the information storage system; and
and the result evaluation system is used for evaluating the application based on a preset rule according to the monitoring result from the risk monitoring system.
2. The federation block chain-based application supervision platform of claim 1,
the information evidence storing system adopts a chain structure to combine with the time stamp and adopts asymmetric encryption to carry out chain evidence storing on the applied test related information.
3. A federation blockchain-based application supervision platform as claimed in claim 1,
the risk monitoring system carries out risk monitoring on technical use safety and service continuity.
4. A federation blockchain-based application supervision platform as claimed in claim 1,
the risk monitoring system monitors the applied test related information by adopting a zero-knowledge proof technology.
5. A federation blockchain-based application supervision platform as claimed in claim 1, wherein the risk monitoring system comprises:
and the wind control early warning system is used for realizing wind control early warning applied to sandbox test operation based on the intelligent contract.
6. The federation blockchain-based application surveillance platform of claim 1, wherein the wind-controlled early warning system comprises:
the sandbox execution container is used for storing the intelligent contract and carrying out wind control early warning based on the intelligent contract;
a blockchain generator for generating a blockchain from test related information of the application in the sandbox execution container; and
and the database stores the block chain generated by the block chain generator in a plurality of blocks through a consensus algorithm.
7. The federation block chain-based application supervision platform of claim 6,
in the sandbox execution container, carrying out wind control early warning based on an intelligent contract is carried out in the following mode:
compiling a preset related rule protocol into an intelligent contract and deploying the intelligent contract on a alliance chain;
uploading the testing related information of the application to a alliance chain periodically or in real time, and synchronizing the testing related information of the application to other nodes on the alliance chain; and
the intelligent contract is automatically checked, if the intelligent contract is triggered, monitoring is carried out, and once abnormity is found, suspicious transactions are positioned and early warning information is sent out.
8. The federation blockchain-based application supervision platform of claim 5, wherein the risk monitoring system further comprises:
and the public opinion monitoring system is used for monitoring the running state of the application and acquiring public opinion information by adopting a public opinion big data technology.
9. The federation blockchain-based application surveillance platform of claim 8, wherein the public opinion monitoring system comprises:
the multi-source heterogeneous data combined modeling module is used for acquiring multi-source heterogeneous data of the Internet, fusing a combined modeling strategy of data content and network result relation, and associating content semantics with a network structure to construct a data model;
the knowledge graph building module is used for mining the association relation of the application to build a knowledge graph;
the public opinion analysis module is used for analyzing information based on the text content understanding and obtaining public opinion information; and
and the evolution analysis module is used for realizing the detection of the application evolution stage and the clustering of the application evolution stage and outputting clustering result information.
10. A federation blockchain-based application supervision platform as claimed in claim 9,
public opinion analysis module includes:
the media focus analysis submodule extracts independent phrases based on the phrase independence and the semantic integrity, clusters phrase variants through a compressed similar search space and obtains a media intersection analysis result; and
and the netizen emotion analysis submodule is used for identifying the positive emotion indicator words and the negative emotion indicator words based on the Z-Score measurement, adding the positive emotion indicator words and the negative emotion indicator words into an emotion word bank, and obtaining a netizen emotion analysis result based on the netizen information related to application and the emotion word bank.
11. A federation blockchain-based application supervision platform as claimed in claim 9, wherein the evolution analysis module comprises:
the evolution detection submodule integrates event information and constructs a corresponding data set to train a stage classifier; and
and the evolution clustering submodule groups the development and evolution processes of different events through different clustering centers, and realizes the automatic clustering process of the event evolution stage by merging the types of adjacent stages for each group of event sequences.
12. The federation blockchain-based application surveillance platform of claim 9, wherein the public opinion monitoring system further comprises:
and the visualization module is used for visually displaying the public sentiment information output by the public sentiment analysis module and the clustering result information output by the evolution analysis module.
13. An application supervision method based on a block chain of alliances is characterized by comprising the following steps:
the information evidence storing step, namely performing chain on-chain evidence storage on the sandbox test related information applied to the financial innovation on the block chain of the alliance;
a risk monitoring step, namely monitoring the running state of the application and outputting a monitoring result according to the sandbox test related information of the application which is subjected to chain evidence storage in the information evidence storage step; and
and a result evaluation step of evaluating the application based on a preset rule according to the monitoring result from the risk monitoring step.
14. A federation blockchain-based application policing method as in claim 13,
in the step of storing the information, chain structure is adopted to combine with the time stamp and asymmetric encryption is adopted to store the applied test related information on a chain.
15. A federation block chain-based application supervision method according to claim 13,
in the risk monitoring step, risk monitoring is carried out on technical use safety and business continuity.
16. A federation blockchain-based application policing method as in claim 13,
in the risk monitoring step, zero knowledge proof technology is adopted to monitor the relevant test information of the application.
17. A federation blockchain-based application supervision method as claimed in claim 13 wherein the risk monitoring step comprises:
and a wind control early warning step, namely realizing wind control early warning applied to sandbox test operation based on an intelligent contract.
18. A federation blockchain-based application supervision method as claimed in claim 17 wherein the risk monitoring step further comprises:
and a public opinion monitoring step, namely monitoring the running state of the application and acquiring public opinion information by adopting a public opinion big data technology.
19. The method of claim 18, wherein the public opinion monitoring step comprises:
a multi-source heterogeneous data combined modeling step, namely acquiring multi-source heterogeneous data of the Internet, fusing a combined modeling strategy of data content and network result relation, and associating content semantics with a network structure to construct a data model;
a knowledge graph construction step, namely excavating the association relation of the application to construct a knowledge graph;
a public opinion analyzing step, which is to analyze information based on the text content understanding and obtain public opinion information; and
and an evolution analysis step, namely detecting the application evolution stage and clustering the application evolution stage and outputting clustering result information.
20. A federation blockchain-based application supervision method as claimed in claim 19,
the public opinion analysis step comprises the following steps:
a media focus analysis substep, extracting independent phrases based on the phrase independence and the semantic integrity, and clustering the phrase variants by compressing a similar search space to obtain a media intersection analysis result; and
and a netizen emotion analysis substep, namely identifying positive emotion indicator words and negative emotion indicator words based on Z-Score measurement, adding the positive emotion indicator words and the negative emotion indicator words into an emotion word bank, and obtaining a net name emotion analysis result based on the netizen information related to application and the emotion word bank.
21. A federation blockchain-based application supervision method as claimed in claim 19 wherein the evolution analysis step comprises:
an evolution detection sub-step, namely integrating event information and constructing a corresponding data set to train a stage classifier; and
and the evolution clustering substep is used for grouping the development and evolution processes of different events through different clustering centers, and realizing the automatic clustering process of the event evolution stage by merging the types of adjacent stages for each group of event sequences.
22. The method of claim 19, wherein the public opinion monitoring step further comprises:
and a visualization step of visually displaying the public sentiment information output by the public sentiment analysis step and the clustering result information output by the evolution analysis step.
23. A computer-readable medium, having stored thereon a computer program,
the computer program, when executed by a processor, implements the federation blockchain-based application monitoring method of any one of claims 13 to 22.
24. A computer device comprising a storage module, a processor and a computer program stored on the storage module and running on the processor, wherein the computer program is executed by the processor to implement the federation blockchain-based application supervision method of any one of claims 13 to 22.
CN202210043151.XA 2022-01-14 2022-01-14 Application supervision platform based on alliance block chain and supervision method thereof Pending CN115329349A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210043151.XA CN115329349A (en) 2022-01-14 2022-01-14 Application supervision platform based on alliance block chain and supervision method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210043151.XA CN115329349A (en) 2022-01-14 2022-01-14 Application supervision platform based on alliance block chain and supervision method thereof

Publications (1)

Publication Number Publication Date
CN115329349A true CN115329349A (en) 2022-11-11

Family

ID=83916488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210043151.XA Pending CN115329349A (en) 2022-01-14 2022-01-14 Application supervision platform based on alliance block chain and supervision method thereof

Country Status (1)

Country Link
CN (1) CN115329349A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117436768A (en) * 2023-12-19 2024-01-23 湖南三湘银行股份有限公司 Unified supervision index method based on data management

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117436768A (en) * 2023-12-19 2024-01-23 湖南三湘银行股份有限公司 Unified supervision index method based on data management

Similar Documents

Publication Publication Date Title
US11651082B2 (en) Blockchain applicability framework
Lone et al. Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer
CN110069932B (en) Data lake fusion data security analysis method based on intelligent contract
Patel et al. Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
CN108681966A (en) A kind of information monitoring method and device based on block chain
CN112132198A (en) Data processing method, device and system and server
Eckhart et al. Securing the testing process for industrial automation software
CA3166439A1 (en) Blockchain cybersecurity solutions
Xiong et al. Electronic evidence preservation model based on blockchain
CN115630374A (en) Testing method and device of credible numerical control system, computer equipment and storage medium
de Castro et al. SCRAM: A platform for securely measuring cyber risk
Nelub et al. Economic analysis of data protection in systems with complex architecture using neural network methods.
Nie et al. A controllable privacy data transmission mechanism for internet of things system based on blockchain
CN115329349A (en) Application supervision platform based on alliance block chain and supervision method thereof
Kumar Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships
CN112288566A (en) Cross-chain transaction abnormity detection and early warning method and system based on deep neural network
CN114598707B (en) Alliance chain supervision system
Zhao et al. Privacy-preserving electricity theft detection based on blockchain
Xiao Information security management of sharing economy based on blockchain technology
Pandey et al. Privacy preserved data sharing using blockchain and support vector machine for industrial IOT applications
Xu et al. Blockchain-based solutions for IoT: A tertiary study
Yuan Legal model construction approach of big data transaction management in the digital information perspective
Guo et al. Privacy-Preserving Multi-Label Propagation Based on Federated Learning
Vikhyath et al. Survey on Data Security with Intersection of AI and Blockchain
Yan et al. Research on key technologies of industrial internet data security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination