Data flow detection method and device based on block chain and server

A detection method and blockchain technology, applied in the field of network security, can solve problems such as not taking into account differences in data services, user loss, low authentication success rate, etc.

Active Publication Date: 2020-04-24
重庆浙大网新科技有限公司
View PDF15 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the traditional solution, each data provider website can continuously provide high-quality data content to increase its own website traffic during operation. However, the access addresses of these high-quality data content are often easily stolen by some third-party data providers and used in The third-party data provider's own website causes a large number of users to access their own data services through other third-party websites, which will not only lead to the loss of m

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data flow detection method and device based on block chain and server
  • Data flow detection method and device based on block chain and server
  • Data flow detection method and device based on block chain and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The application will be specifically described below in conjunction with the accompanying drawings in the specification, and the specific operation methods in the method embodiments may also be applied to the device embodiments or the system embodiments. In the description of this application, unless otherwise specified, "at least one" includes one or more. "Multiple" means two or more. For example, at least one of A, B, and C includes: A alone, B alone, A and B at the same time, A and C at the same time, B and C at the same time, and A, B, and C at the same time. In this application, " / " means "or", for example, A / B can mean A or B; "and / or" in this document is only an association relationship describing the associated target nuclear magnetic resonance equipment, indicating that there may be three A relationship, for example, A and / or B, can mean that: A alone exists, A and B exist at the same time, and B exists alone.

[0073] figure 1 It is a schematic diagram of inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data flow detection method and device based on blockchain and a server. The method comprises the following steps: when the server receives a data stream acquisition request for a target data service sent by a user terminal, generating a to-be-verified blockchain for a verification strategy of a specific target data service, so the difference of differentdata services is considered, and the security and the pertinence of the authentication process are improved; enabling the user terminal to calculate the to-be-verified field according to the blockchain generation field in the to-be-verified block chain to generate a corresponding verification field, wherein because the fields to be verified are randomly added, and the difficulty of cracking by a hacker can be improved; performing lawful state detection after the verification blockchain is formed, allowing the user terminal to access the data stream address of the target data service after thedetection is passed, and repeatedly performing verification by monitoring the access information of the user terminal in real time during the period, so the authentication success rate and the security are further improved.

Description

Technical field [0001] This application relates to the field of network security technology, and specifically to a method, device and server for detecting data flow based on blockchain. Background technique [0002] In the traditional scheme, each data provider website can continuously provide high-quality data content to increase its own website traffic during its operation. However, the access address of these high-quality data content is often easily stolen by some third-party data providers and used in The third-party data provider’s own website, which leads to a large number of users accessing their own data services through other third-party websites, not only leads to the loss of many users, but also has great privacy and security risks for users. In the existing solution, although the authentication steps of the terminal user terminal are provided to identify the stream address requested by the user terminal, the difference between different data services is not considere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10H04L63/12
Inventor 朱培培
Owner 重庆浙大网新科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products