CN116681435A - Block chain-based network data security monitoring system and method - Google Patents

Block chain-based network data security monitoring system and method Download PDF

Info

Publication number
CN116681435A
CN116681435A CN202310001541.5A CN202310001541A CN116681435A CN 116681435 A CN116681435 A CN 116681435A CN 202310001541 A CN202310001541 A CN 202310001541A CN 116681435 A CN116681435 A CN 116681435A
Authority
CN
China
Prior art keywords
user
mobile phone
data
address
payment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310001541.5A
Other languages
Chinese (zh)
Inventor
邱剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang Shengrail Technology Co ltd
Original Assignee
Heilongjiang Shengrail Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heilongjiang Shengrail Technology Co ltd filed Critical Heilongjiang Shengrail Technology Co ltd
Priority to CN202310001541.5A priority Critical patent/CN116681435A/en
Publication of CN116681435A publication Critical patent/CN116681435A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/017Gesture based interaction, e.g. based on a set of recognized hand gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Human Computer Interaction (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a network data safety monitoring system and method based on a blockchain, and belongs to the field of safety monitoring. The invention collects and stores data information through the blockchain, analyzes the address service condition of the user, automatically sets a default address, and sends a popup window inquiry to the user whether to automatically clean or not; and analyzing the hand gesture of the target user, judging the user identity, controlling the payment authority, automatically updating and cleaning, protecting the data safety of the user, and improving the use experience of the user.

Description

Block chain-based network data security monitoring system and method
Technical Field
The invention relates to the field of safety monitoring, in particular to a network data safety monitoring system and method based on a blockchain.
Background
The mobile phone changes the payment mode of people, people need to carry a wallet when going out, and the mobile phone can directly pay at present without changing, so that the speed is faster and the efficiency is higher. With the continuous development of mobile phone payment modes, small-amount secret-free payment and contactless payment technologies are continuously developed, and although the payment modes of people are faster and more convenient, great potential safety hazards are brought to users, and the mobile phone payment accounts of the users are possibly used by others due to the occurrence of forgetting, losing and other conditions, so that the personal property safety is threatened.
In view of this, how to judge the user identity of the mobile phone without paying, automatically clear and update the historical data, and it is necessary to protect the mobile phone payment account data security of the user. Accordingly, there is a need for a blockchain-based network data security monitoring system and method.
Disclosure of Invention
The invention aims to provide a network data security monitoring system and method based on a block chain, which are used for collecting and storing basic data information of a user through the block chain, analyzing the address use condition when the user uses mobile phone software to pay without secret, automatically setting a default address, and sending a popup window to the user to inquire whether the address with low use probability is automatically cleaned or not; and acquiring the hand gesture of the user when using the contactless payment, comparing the historical data in the blockchain, judging the user identity, and locking the mobile phone payment system when the user identity is inconsistent with the stored data, and periodically cleaning updated data information so as to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: the system comprises a data acquisition module, a data arrangement module, a data analysis module and a system control module;
the data acquisition module is connected with the data arrangement module, the data arrangement module is connected with the data analysis module, and the data analysis module is connected with the system control module; the system comprises a data acquisition module, a data sorting module, a data analysis module and a system control module, wherein the data acquisition module is used for acquiring basic data information, touch condition information and hand gesture information of a user, the data sorting module is used for storing acquired information and analysis results, the data analysis module is used for analyzing and processing the hand gesture of the user and the condition of using a mobile phone, and the system control module is used for controlling the use mode of the mobile phone according to the analysis results.
Further, the data acquisition module comprises a basic data acquisition unit, a touch sensing unit and a hand gesture acquisition unit, wherein the basic data acquisition unit is used for acquiring basic information of a user, such as user address information, payment passwords, the number of times of using the password-free payment and the like, the touch sensing unit is used for acquiring the touch mobile phone state of the user through a touch sensor, and the touch sensor is a device for capturing and recording physical touch or hugging on an object, and enables the device or the object to be generally touched by a human user or an operator, and the touch sensor can be also called a touch detector. The hand gesture acquisition unit acquires the hand gesture of touching the mobile phone through electromagnetic waves sent by the mobile phone when the user touches the mobile phone, the mobile phone transmits radio waves when the user touches the mobile phone, then receives echoes, and the target position received by the user is calculated according to the initial time difference, so that the hand gesture of the user is judged.
Furthermore, the data arrangement module comprises an encryption unit and a storage unit, the data arrangement module is arranged in the blockchain, the encryption unit encrypts the collected data and the analysis result by adopting an ECC encryption algorithm, and the ECC is also called an elliptic encryption algorithm, is a public key encryption technology and is based on an elliptic curve theory. The discrete logarithm difficulty of Abel group formed by the points of elliptic curve on finite field is utilized to realize encryption, decryption and digital signature, and the addition operation in elliptic curve is corresponding to the modular multiplication operation in discrete logarithm, thus the corresponding cryptosystem based on elliptic curve can be established. The storage unit is used for storing the collected data information and the analyzed data result, for example, storing the data information such as address information, payment password and the like into a private blockchain, and encrypting the data by using a private key to prevent personal information leakage. The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, and the blockchain technology is a brand new distributed infrastructure and a computing mode which utilize a blockchain data structure to verify and store data, a distributed node consensus algorithm to generate and update data, a cryptography mode to ensure the safety of data transmission and access and an intelligent contract consisting of automatic script codes to program and operate the data. The private blockchain is only opened to individual individuals or entities, and the data is not publicly available to anyone possessing a network connection, so that the data information and economic security of the user can be effectively protected.
Further, the data analysis module comprises a use state analysis unit and a hand gesture recognition unit, wherein the use state analysis unit is used for analyzing the address use condition of the user for secret payment through the mobile phone according to the acquired user basic information and comparing the address use condition with the historical data stored in the storage unit, and the hand gesture recognition unit is used for comparing and analyzing the acquired hand gesture of the user with the historical data stored in the data arrangement module and storing the analysis result in the storage unit.
Further, the system control module comprises a system locking unit and a system cleaning unit, wherein the system locking unit is used for automatically taking measures according to analysis results, when a user uses online secret payment-free software in the mobile phone, for example, small secret payment-free modes such as Taobao and Mei are used, when address information is modified, a password is required to be input for verification, if verification is successful, secret payment-free can be used, and if verification fails, secret payment-free cannot be used; when a user uses non-contact face-to-face payment, such as using consumption modes of NFC, cloud flash payment and the like, and the hand gesture of the user using the mobile phone is consistent with the historical data stored in the storage unit, the system opens the secret payment-free function of the mobile phone; when the hand gesture of the user using the mobile phone is inconsistent with the hand gesture in the storage unit, the system automatically controls the mobile phone to lock the payment function; the system cleaning unit is used for automatically cleaning and updating stored historical data information according to the analysis result, such as cleaning address information which is not used for a long time, cleaning hand gesture historical data in the storage unit at regular time, and the like, so that the waste of storage resources is avoided, the storage space is saved, the use efficiency of the storage space is improved, and the network data security of a user is protected.
A network data security monitoring method based on block chain includes the following steps:
s1, acquiring basic data information of a user, acquiring touch condition information of the user on a mobile phone through a sensor, and acquiring hand gesture information of the user through electromagnetic waves of the mobile phone;
s2, analyzing the address service condition of the user for carrying out the secret payment through the mobile phone, and automatically setting a default address;
s3, analyzing the hand gesture of the user touching the mobile phone when the user uses the mobile phone, comparing the historical data in the storage unit, identifying the identity condition of the user, and storing the analysis result in the storage unit;
and S4, controlling the payment function of the mobile phone according to the analysis result, and automatically cleaning and updating the historical data information in the storage unit.
Further, in step S2, the address usage probability F of the user using the mobile phone software for the payment-free is analyzed by the following formula:
wherein S is the number of times that the user uses the address to make the secret payment, S is the total number of times that the user makes the secret payment on the mobile phone software, F (S) is the probability of the number of times that the user uses the address to make the secret payment, T is the total amount of consumption of the user using the address by the secret payment software, T is the total amount of consumption of the user using the secret payment software, and F (T) is the probability of the amount of consumption of the user using the address on the mobile phone to make the secret payment;
setting a threshold F for address use probability when a user uses mobile phone software to make a secret payment Threshold value When F is greater than or equal to F Threshold value When F, the system does not clean the address<F Threshold value When the user using probability of the address is low, sending a popup query to the user whether automatic cleaning is needed, if so, selectingAutomatically cleaning, and if the user selects no, manually cleaning the address information by the user; the address with the highest probability of use is selected, automatically set as a default address, and when the user needs to modify the address, the user needs to input a password for verification. The mobile phone can effectively ensure that a user is account safe when using software such as beauty, panning and the like to pay in a secret-free manner, even if the mobile phone is cracked by other people, the address cannot be modified when the user wants to purchase articles by using other addresses, and meanwhile, the user is inquired whether to clear or not for address information with low utilization rate, so that the storage space can be effectively saved, the use feeling of the user is improved, and the data safety of the user is ensured.
Further, in step S3, whether the user touches the mobile phone is sensed by the touch sensor, when the target user touches the mobile phone, the hand gesture of the user is collected by the electromagnetic wave sent by the mobile phone, so as to obtain a vector set M, the hand gesture data stored in the storage unit is processed, so as to obtain a vector set N, and the similarity λ between the vector set M and the vector set N is analyzed by the following formula:
setting a threshold lambda for similarity Threshold value When lambda is greater than or equal to lambda Threshold value When the hand gesture of the target user is similar to the hand gesture history data stored in the storage unit, the system starts a non-contact face-to-face payment system of the mobile phone; when lambda is<λ Threshold value When the acquired hand gesture is dissimilar to the hand gesture history data stored in the storage unit, the system locks a non-contact face-to-face payment system of the mobile phone; the method can effectively ensure the personal property safety of the user in the process of carrying out non-contact face-to-face payment, avoid the situation that other people break the mobile phone password to transfer the property in the mobile phone by using equipment such as a small POS machine and the like when the mobile phone is lost, ensure that only the user with data can carry out non-secret payment by using the mobile phone, and ensure the data safety of the user.
Further, in step S4, according to the analysis result, when the user uses the online secret payment-free software in the mobile phone, a default address is automatically set, and the user is queried whether to automatically delete the address sending popup window with low usage rate, and when the address is modified, the password is required to be input for verification; when a user uses non-contact face-to-face payment, whether the target user is a mobile phone user is judged according to the hand gesture of the target user, if the target user is the user, a payment system is started, if the target user is not the user, the payment system is locked, the economic safety of the user can be effectively ensured, even if the mobile phone is lost, the mobile phone password is broken by other people, and because the hand gesture is inconsistent, other people cannot carry out non-contact payment by using small POS (point of sale) equipment and the like, because password verification is needed for modifying the address, and if the other people need to modify the address when using mobile phone software to carry out small secret payment, the other people cannot use the payment system, and the network data safety of the user is ensured.
Compared with the prior art, the invention has the following beneficial effects:
according to the invention, the basic data information of the user is collected and stored through the blockchain, the data is stored in the private blockchain, other people cannot acquire the data information in the private blockchain, the data cannot be publicly acquired by anyone with network connection, and the data information and economic safety of the user can be effectively protected. Analyzing the address use condition when the user uses the mobile phone software to pay without secret, automatically setting a default address, sending a popup window inquiry to the user to automatically clear the address with low use probability, and when the target user modifies the address, inputting a password for verification; and acquiring the hand gesture of the user when the user uses the contactless payment, comparing the historical data in the blockchain, judging the identity of the user, and locking the mobile phone payment system when the hand gesture of the target user is dissimilar to the data stored in the database, wherein the target user cannot use the mobile phone to perform the contactless payment. The invention can effectively protect the safety of the mobile phone payment account of the user, even if the mobile phone is lost, the mobile phone password is cracked by other people, and the other people cannot use the mobile phone to carry out payment operation, so that the experience of the user for carrying out payment by using the mobile phone is improved, the personal property safety of the user is ensured, and the network data safety of the user is ensured.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a schematic diagram of the modular components of a blockchain-based network data security monitoring system of the present invention;
FIG. 2 is a schematic diagram illustrating steps of a blockchain-based network data security monitoring method according to the present invention;
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1-2, the present invention provides the following technical solutions: the system comprises a data acquisition module, a data arrangement module, a data analysis module and a system control module;
the data acquisition module is connected with the data arrangement module, the data arrangement module is connected with the data analysis module, and the data analysis module is connected with the system control module;
the data acquisition module is used for acquiring basic data information, touch condition information and hand gesture information of a user. The data acquisition module comprises a basic data acquisition unit, a touch sensing unit and a hand gesture acquisition unit, wherein the basic data acquisition unit is used for acquiring basic information of a user, such as user address information, payment passwords, the number of times of using the password-free payment and the like, the touch sensing unit is used for acquiring the touch mobile phone state of the user through a touch sensor, and the touch sensor is equipment for capturing and recording physical touch or hugging on an object, and enables the equipment or the object to be usually touched by a human user or an operator, and the touch sensor can be also called a touch detector. The hand gesture acquisition unit acquires the hand gesture of touching the mobile phone through electromagnetic waves sent by the mobile phone when the user touches the mobile phone, the mobile phone transmits radio waves when the user touches the mobile phone, then receives echoes, and the target position received by the user is calculated according to the initial time difference, so that the hand gesture of the user is judged.
The data arrangement module is used for storing collected information and analysis results. The data arrangement module comprises an encryption unit and a storage unit, the data arrangement module is arranged in a blockchain, the encryption unit encrypts collected data and analysis results by adopting an ECC encryption algorithm, and the ECC is also called an elliptic encryption algorithm, is a public key encryption technology and is based on elliptic curve theory. The discrete logarithm difficulty of Abel group formed by the points of elliptic curve on finite field is utilized to realize encryption, decryption and digital signature, and the addition operation in elliptic curve is corresponding to the modular multiplication operation in discrete logarithm, thus the corresponding cryptosystem based on elliptic curve can be established. The storage unit is used for storing the collected data information and the analyzed data result, for example, storing the data information such as address information, payment password and the like into a private blockchain, and encrypting the data by using a private key to prevent personal information leakage. The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, and the blockchain technology is a brand new distributed infrastructure and a computing mode which utilize a blockchain data structure to verify and store data, a distributed node consensus algorithm to generate and update data, a cryptography mode to ensure the safety of data transmission and access and an intelligent contract consisting of automatic script codes to program and operate the data. The private blockchain is only opened to individual individuals or entities, and the data is not publicly available to anyone possessing a network connection, so that the data information and economic security of the user can be effectively protected.
The data analysis module is used for analyzing and processing the hand gestures of the user and the situation of using the mobile phone. The data analysis module comprises a use state analysis unit and a hand gesture recognition unit, wherein the use state analysis unit is used for analyzing the address use condition of a user for secret payment through a mobile phone according to collected user basic information and comparing the address use condition with the historical data stored in the storage unit, and the hand gesture recognition unit is used for comparing and analyzing the collected hand gesture of the user with the historical data stored in the data arrangement module and storing analysis results in the storage unit.
The system control module is used for controlling the use mode of the mobile phone according to the analysis result. The system control module comprises a system locking unit and a system cleaning unit, wherein the system locking unit is used for automatically taking measures according to analysis results, when a user uses online secret-free payment software in the mobile phone, for example, small secret-free payment modes such as Taobao and Mei are used, when address information is modified, a password is required to be input for verification, if verification is successful, secret-free payment can be used, and if verification fails, secret-free payment cannot be used; when a user uses non-contact face-to-face payment, such as using consumption modes of NFC, cloud flash payment and the like, and the hand gesture of the user using the mobile phone is consistent with the historical data stored in the storage unit, the system opens the secret payment-free function of the mobile phone; when the hand gesture of the user using the mobile phone is inconsistent with the hand gesture in the storage unit, the system automatically controls the mobile phone to lock the payment function; the system cleaning unit is used for automatically cleaning and updating stored historical data information according to the analysis result, such as cleaning address information which is not used for a long time, cleaning hand gesture historical data in the storage unit at regular time, and the like, so that waste of storage resources is avoided, storage space is saved, and the use efficiency of the storage space is improved.
A network data security monitoring method based on block chain includes the following steps:
s1, acquiring basic data information of a user, acquiring touch condition information of the user on a mobile phone through a sensor, and acquiring hand gesture information of the user through electromagnetic waves of the mobile phone;
s2, analyzing the address service condition of the user for carrying out the secret payment through the mobile phone, and automatically setting a default address;
in step S2, the address usage probability F of the user using the mobile phone software for the privacy payment is analyzed by the following formula:
wherein S is the number of times that the user uses the address to make the secret payment, S is the total number of times that the user makes the secret payment on the mobile phone software, F (S) is the probability of the number of times that the user uses the address to make the secret payment, T is the total amount of consumption of the user using the address by the secret payment software, T is the total amount of consumption of the user using the secret payment software, and F (T) is the probability of the amount of consumption of the user using the address on the mobile phone to make the secret payment;
setting a threshold F for address use probability when a user uses mobile phone software to make a secret payment Threshold value When F is greater than or equal to F Threshold value When F, the system does not clean the address<F Threshold value When the user using probability of the address is low, sending a popup window query to the user whether automatic cleaning is needed, if the user selects the popup window query, automatically cleaning, and if the user selects the popup window query, manually cleaning the address information by the user; the address with the highest probability of use is selected, automatically set as a default address, and when the user needs to modify the address, the user needs to input a password for verification.
S3, analyzing the hand gesture of the user touching the mobile phone when the user uses the mobile phone, comparing the historical data in the storage unit, identifying the identity condition of the user, and storing the analysis result in the storage unit;
in step S3, whether the user touches the mobile phone is sensed by the touch sensor, when the target user touches the mobile phone, the hand gesture of the user is collected by the electromagnetic wave sent by the mobile phone, so as to obtain a vector set M, the hand gesture data stored in the storage unit is processed, so as to obtain a vector set N, and the similarity λ between the vector set M and the vector set N is analyzed by the following formula:
setting a threshold lambda for similarity Threshold value When lambda is greater than or equal to lambda Threshold value When the hand gesture of the target user is similar to the hand gesture history data stored in the storage unit, the system starts a non-contact face-to-face payment system of the mobile phone; when lambda is<λ Threshold value When the acquired hand gesture is dissimilar to the hand gesture history data stored in the storage unit, the system locks a non-contact face-to-face payment system of the mobile phone;
and S4, controlling the payment function of the mobile phone according to the analysis result, and automatically cleaning and updating the historical data information in the storage unit.
In step S4, according to the analysis result, when the user uses the online secret payment-free software in the mobile phone, a default address is automatically set, and the user is queried whether to automatically delete the address transmitting popup window with low use rate, and when the address is modified, the password is required to be input for verification; when a user uses non-contact face-to-face payment, whether the target user is a mobile phone user is judged according to the hand gesture of the target user, if the target user is the user, a payment system is started, if the target user is not the user, the payment system is locked, the economic safety of the user can be effectively ensured, even if the mobile phone is lost, the mobile phone password is broken by other people, and because the hand gesture is inconsistent, other people cannot conduct non-contact payment through using small POS (point of sale) equipment and other equipment, because password verification is needed for address modification, and if the other people need to modify the address when using mobile phone software to conduct small-amount secret-free payment, the other people cannot use the payment system.
Embodiment one:
in a certain period of time, a user uses mobile phone software to shop, the total consumption amount of the user using the mobile phone software is 600 yuan, 15 times of the user using the mobile phone software are used for the user using the mobile phone software, 1 time of the user using a certain address is used, the consumption amount is 10 yuan, and the address use probability F of the user using the mobile phone software for the user using the mobile phone software is analyzed through the following formula:
setting a threshold F for address use probability when a user uses mobile phone software to make a secret payment Threshold value =20% at this time F<F Threshold value The method is characterized in that the address user has low use probability, a popup window is sent to the user to inquire whether automatic cleaning is needed, if yes, automatic cleaning is needed, and if no, manual cleaning is needed for address information by the user;
if the stored addresses are 5, the using probabilities of the addresses are respectively 0.11%, 8%, 15.89%, 16% and 60%, and the address with the highest using probability is selected and automatically set as a default address; when a user needs to modify an address, such as adding a new address, etc., a password needs to be entered for verification.
Embodiment two:
sensing whether a user touches the mobile phone or not through the touch sensor, when a target user touches the mobile phone, acquiring the hand gesture of the user through electromagnetic waves sent by the mobile phone to obtain a vector set M, processing hand gesture data stored in a storage unit to obtain a vector set N, and analyzing the similarity lambda of the vector set M and the vector set N through the following formula:
setting a threshold lambda for similarity Threshold value =98%, at this time λ is greater than or equal to λ Threshold value The acquired hand gesture of the target user is similar to the hand gesture history data stored in the storage unit, and the system starts a non-contact face-to-face payment system of the mobile phone;
if it isAt this time lambda<λ Threshold value The acquired hand gesture is dissimilar to the hand gesture history data stored in the storage unit, and the system locks a non-contact face-to-face payment system of the mobile phone;
it is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. The utility model provides a network data safety monitoring system based on block chain which characterized in that: the safety monitoring system includes: the system comprises a data acquisition module, a data arrangement module, a data analysis module and a system control module;
the data acquisition module is connected with the data arrangement module, the data arrangement module is connected with the data analysis module, and the data analysis module is connected with the system control module; the system comprises a data acquisition module, a data sorting module, a data analysis module and a system control module, wherein the data acquisition module is used for acquiring basic data information, touch condition information and hand gesture information of a user, the data sorting module is used for storing acquired information and analysis results, the data analysis module is used for analyzing and processing the hand gesture of the user and the condition of using a mobile phone, and the system control module is used for controlling the use mode of the mobile phone according to the analysis results.
2. The blockchain-based network data security monitoring system of claim 1, wherein: the data acquisition module comprises a basic data acquisition unit, a touch sensing unit and a hand gesture acquisition unit, wherein the basic data acquisition unit is used for acquiring basic information of a user, the touch sensing unit acquires the state of the user touching a mobile phone through a touch sensor, and the hand gesture acquisition unit acquires the hand gesture of the user touching the mobile phone through electromagnetic waves sent by the mobile phone when the user touches the mobile phone.
3. A blockchain-based network data security monitoring system as in claim 2, wherein: the data arrangement module comprises an encryption unit and a storage unit, wherein the encryption unit is used for encrypting the collected data and the analysis result by adopting an ECC encryption algorithm, and the storage unit is used for storing the collected data information and the analysis data result.
4. A blockchain-based network data security monitoring system as in claim 3, wherein: the data analysis module comprises a use state analysis unit and a hand gesture recognition unit, wherein the use state analysis unit is used for analyzing the address use condition of a user for secret payment through a mobile phone according to collected user basic information and comparing the address use condition with the historical data stored in the storage unit, and the hand gesture recognition unit is used for comparing and analyzing the collected hand gesture of the user with the historical data stored in the data arrangement module and storing analysis results in the storage unit.
5. The blockchain-based network data security monitoring system of claim 4, wherein: the system control module comprises a system locking unit and a system cleaning unit, wherein the system locking unit is used for automatically taking measures according to analysis results, and when a user uses online secret payment-free software in the mobile phone, when address information is modified, a password is required to be input for verification; when a user uses non-contact face-to-face payment, judging the identity of the user and controlling the authority of a payment system; and the system cleaning unit is used for automatically cleaning and updating the stored historical data information according to the analysis result.
6. A network data security monitoring method based on a block chain is characterized by comprising the following steps of: the method comprises the following steps:
s1, acquiring basic data information of a user, acquiring touch condition information of the user on a mobile phone through a sensor, and acquiring hand gesture information of the user through electromagnetic waves of the mobile phone;
s2, analyzing the address service condition of the user for carrying out the secret payment through the mobile phone, and automatically setting a default address;
s3, analyzing the hand gesture of the user touching the mobile phone when the user uses the mobile phone, comparing the historical data in the storage unit, identifying the identity condition of the user, and storing the analysis result in the storage unit;
and S4, controlling the payment function of the mobile phone according to the analysis result, and automatically cleaning and updating the historical data information in the storage unit.
7. The blockchain-based network data security monitoring method of claim 6, wherein: in step S2, the address usage probability F of the user using the mobile phone software for the privacy payment is analyzed by the following formula:
wherein S is the number of times that the user uses the address to make the secret payment, S is the total number of times that the user makes the secret payment on the mobile phone software, F (S) is the probability of the number of times that the user uses the address to make the secret payment, T is the total amount of consumption of the user using the address by the secret payment software, T is the total amount of consumption of the user using the secret payment software, and F (T) is the probability of the amount of consumption of the user using the address on the mobile phone to make the secret payment;
setting a threshold F for address use probability when a user uses mobile phone software to make a secret payment Threshold value When F is greater than or equal to F Threshold value When F, the system does not clean the address<F Threshold value When the user is in the address, the user using probability is low, and a popup window inquiry is sent to the user to judge whether automatic cleaning is needed or not; the address with the highest probability of use is selected, automatically set as a default address, and when the user needs to modify the address, the user needs to input a password for verification.
8. The blockchain-based network data security monitoring method of claim 7, wherein: in step S3, whether the user touches the mobile phone is sensed by the touch sensor, when the target user touches the mobile phone, the hand gesture of the user is collected by the electromagnetic wave sent by the mobile phone, so as to obtain a vector set M, the hand gesture data stored in the storage unit is processed, so as to obtain a vector set N, and the similarity λ between the vector set M and the vector set N is analyzed by the following formula:
setting a threshold lambda for similarity Threshold value When lambda is greater than or equal to lambda Threshold value When the hand gesture of the target user is similar to the hand gesture history data stored in the storage unit, the system starts a non-contact face-to-face payment system of the mobile phone; when lambda is<And when the lambda threshold is met, the acquired hand gesture is dissimilar to the hand gesture history data stored in the storage unit, and the system locks the non-contact face-to-face payment system of the mobile phone.
9. The blockchain-based network data security monitoring method of claim 8, wherein: in step S4, according to the analysis result, when the user uses the online secret payment-free software in the mobile phone, a default address is automatically set, and the user is queried whether to automatically delete the address transmitting popup window with low use rate, and when the address is modified, the password is required to be input for verification; when the user uses the non-contact face-to-face payment, judging whether the target user is the mobile phone user according to the hand gesture of the target user, if the target user is the mobile phone user, starting the payment system, and if the target user is not the mobile phone user, locking the payment system.
CN202310001541.5A 2023-01-03 2023-01-03 Block chain-based network data security monitoring system and method Pending CN116681435A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310001541.5A CN116681435A (en) 2023-01-03 2023-01-03 Block chain-based network data security monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310001541.5A CN116681435A (en) 2023-01-03 2023-01-03 Block chain-based network data security monitoring system and method

Publications (1)

Publication Number Publication Date
CN116681435A true CN116681435A (en) 2023-09-01

Family

ID=87777615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310001541.5A Pending CN116681435A (en) 2023-01-03 2023-01-03 Block chain-based network data security monitoring system and method

Country Status (1)

Country Link
CN (1) CN116681435A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155245A (en) * 2006-09-29 2008-04-02 京瓷美达株式会社 Communication device, image processing device, and method of setting recipient
CN103927658A (en) * 2014-04-08 2014-07-16 深圳市中兴移动通信有限公司 Mobile payment method and terminal
CN105184561A (en) * 2015-08-24 2015-12-23 小米科技有限责任公司 Safety payment method and device
CN105430461A (en) * 2015-11-26 2016-03-23 Tcl海外电子(惠州)有限公司 Method and device for preventing code crosstalk of remote controller
WO2016107035A1 (en) * 2014-12-29 2016-07-07 宇龙计算机通信科技(深圳)有限公司 Payment method and device, and terminal
CN106846000A (en) * 2017-02-24 2017-06-13 广东小天才科技有限公司 A kind of method of payment and device
CN107274174A (en) * 2017-05-18 2017-10-20 青岛海信移动通信技术股份有限公司 The auth method and mobile terminal of a kind of mobile payment
CN107464120A (en) * 2017-09-22 2017-12-12 中国联合网络通信集团有限公司 Exempt from the safe verification method, trade company's background system and payment system of close payment
CN110930237A (en) * 2019-10-21 2020-03-27 江苏大学 Small and medium-sized enterprise credit prediction classification method based on SAGDO algorithm
CN111562843A (en) * 2020-04-29 2020-08-21 广州美术学院 Positioning method, device, equipment and storage medium for gesture capture
CN111582853A (en) * 2020-05-14 2020-08-25 河南久鑫长电子科技有限公司 Mobile payment comprehensive service system
CN112101930A (en) * 2020-08-27 2020-12-18 东南大学 NFC payment system based on elliptic curve password
CN112306237A (en) * 2020-10-21 2021-02-02 广州朗国电子科技有限公司 Three-dimensional touch method based on electromagnetic wave reflection, touch equipment and storage medium
CN112731817A (en) * 2020-12-22 2021-04-30 北京清雷科技有限公司 Control device and method of household appliance and mobile communication device
CN114333075A (en) * 2021-12-31 2022-04-12 清华大学 Dynamic handwritten signature recognition method and device and electronic equipment
CN114358761A (en) * 2022-03-16 2022-04-15 深圳市微克科技有限公司 Intelligent wearing-based safe off-line payment system and method

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155245A (en) * 2006-09-29 2008-04-02 京瓷美达株式会社 Communication device, image processing device, and method of setting recipient
CN103927658A (en) * 2014-04-08 2014-07-16 深圳市中兴移动通信有限公司 Mobile payment method and terminal
WO2016107035A1 (en) * 2014-12-29 2016-07-07 宇龙计算机通信科技(深圳)有限公司 Payment method and device, and terminal
CN105184561A (en) * 2015-08-24 2015-12-23 小米科技有限责任公司 Safety payment method and device
CN105430461A (en) * 2015-11-26 2016-03-23 Tcl海外电子(惠州)有限公司 Method and device for preventing code crosstalk of remote controller
CN106846000A (en) * 2017-02-24 2017-06-13 广东小天才科技有限公司 A kind of method of payment and device
CN107274174A (en) * 2017-05-18 2017-10-20 青岛海信移动通信技术股份有限公司 The auth method and mobile terminal of a kind of mobile payment
CN107464120A (en) * 2017-09-22 2017-12-12 中国联合网络通信集团有限公司 Exempt from the safe verification method, trade company's background system and payment system of close payment
CN110930237A (en) * 2019-10-21 2020-03-27 江苏大学 Small and medium-sized enterprise credit prediction classification method based on SAGDO algorithm
CN111562843A (en) * 2020-04-29 2020-08-21 广州美术学院 Positioning method, device, equipment and storage medium for gesture capture
CN111582853A (en) * 2020-05-14 2020-08-25 河南久鑫长电子科技有限公司 Mobile payment comprehensive service system
CN112101930A (en) * 2020-08-27 2020-12-18 东南大学 NFC payment system based on elliptic curve password
CN112306237A (en) * 2020-10-21 2021-02-02 广州朗国电子科技有限公司 Three-dimensional touch method based on electromagnetic wave reflection, touch equipment and storage medium
CN112731817A (en) * 2020-12-22 2021-04-30 北京清雷科技有限公司 Control device and method of household appliance and mobile communication device
CN114333075A (en) * 2021-12-31 2022-04-12 清华大学 Dynamic handwritten signature recognition method and device and electronic equipment
CN114358761A (en) * 2022-03-16 2022-04-15 深圳市微克科技有限公司 Intelligent wearing-based safe off-line payment system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱继玉;王西颖;王威信;戴国忠;: "基于结构分析的手势识别", 计算机学报, no. 12, 12 December 2006 (2006-12-12) *

Similar Documents

Publication Publication Date Title
US10922684B2 (en) Mobile device security using wearable security tokens
Murillo-Escobar et al. A robust embedded biometric authentication system based on fingerprint and chaotic encryption
US20190325119A1 (en) Methods and system for passive authentication through user attributes
Al-Rubaie et al. Reconstruction attacks against mobile-based continuous authentication systems in the cloud
US20130173925A1 (en) Systems and Methods for Fingerprint-Based Operations
CN105429761A (en) Key generation method and device
CN105678147B (en) Touch operation method and device
CN104573456A (en) Terminal interface control method
Wang et al. Towards continuous and passive authentication across mobile devices: an empirical study
CN104598792A (en) Terminal
JP2021513259A (en) Biometric template protection key update
US20180091298A1 (en) Extended anti-replay token
CN106487758B (en) data security signature method, service terminal and private key backup server
CN111445231A (en) Method and device for realizing MOTOpay and electronic equipment
Alpar Biometric touchstroke authentication by fuzzy proximity of touch locations
CN106020689A (en) Unlocking method, device for touch screen and wearable equipment
Ganesh et al. A secure gesture based authentication scheme to unlock the smartphones
CN116681435A (en) Block chain-based network data security monitoring system and method
US20220058280A1 (en) Device and method to control access to protected functionality of applications
CN105069332A (en) Fingerprint-based password authentication method and password authentication apparatus
CN104809385A (en) Operation method of safety protection equipment, mobile terminal and safety protection equipment
CN114625756A (en) Data query method and device and server
KR102133902B1 (en) Secure input device
CN112270544A (en) Payment method and device and electronic equipment
CN105354462A (en) Protection method for mobile memory and mobile memory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination