Block chain-based data flow detection method, device and server

A detection method and blockchain technology, applied in the field of network security, can solve problems such as unconsidered differences in data services, user loss, hidden dangers of user privacy and security, etc.

Active Publication Date: 2020-11-10
重庆爱责慧科技有限公司
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the traditional solution, each data provider website can continuously provide high-quality data content to increase its own website traffic during operation. However, the access addresses of these high-quality data content are often easily stolen by some third-party data providers and used in The third-party data provider's own website causes a large number of users to access their own data services through other third-party websites, which will not only lead to the loss of many users, but also pose a great privacy security risk to users
In the existing scheme, although the authentication step of the terminal user terminal is provided to identify the flow address requested by the user terminal, the difference between different data services is not considered, and a set of authentication schemes usually adopted for all data services , and it is very easy to be cracked by hackers during the authentication process, resulting in a low authentication success rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based data flow detection method, device and server
  • Block chain-based data flow detection method, device and server
  • Block chain-based data flow detection method, device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The present application will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments. In the description of the present application, unless otherwise specified, "at least one" includes one or more. "Multiple" means two or more. For example, at least one of A, B and C includes: A alone, B alone, A and B at the same time, A and C at the same time, B and C at the same time, and A, B and C at the same time. In this application, " / " means or, for example, A / B can mean A or B; "and / or" in this article is just a description of the association relationship of the associated target nuclear magnetic resonance equipment, indicating that there may be three A relationship, for example, A and / or B, can mean: A exists alone, A and B exist simultaneously, and B exists alone.

[0073] figure 1 It is an interactive schematic diagram of a bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present application provides a block chain-based data flow detection method, device, and server. When the server receives a data flow acquisition request for a target data service sent by a user terminal, it generates a waiting list for a verification strategy for a specific target data service. Verify the blockchain, so as to take into account the differences in different data services, improve the security and pertinence of the authentication process, and then enable the user terminal to generate fields in the blockchain to be verified according to the fields to be verified The corresponding verification fields generated by calculation, because the fields to be verified are randomly added, can increase the difficulty of being cracked by hackers, thereby improving the success rate of authentication. Afterwards, the user terminal is allowed to access the data flow address of the target data service. During this period, the access information of the user terminal is monitored in real time to repeat the verification, so as to further improve the authentication success rate and security.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a data flow detection method, device and server based on blockchain. Background technique [0002] In the traditional solution, each data provider website can continuously provide high-quality data content to increase its own website traffic during operation. However, the access addresses of these high-quality data content are often easily stolen by some third-party data providers and used in The third-party data provider's own website causes a large number of users to access their own data services through other third-party websites, which not only leads to the loss of many users, but also poses a great privacy security risk to users. In the existing scheme, although the authentication step of the terminal user terminal is provided to identify the stream address requested by the user terminal, the difference between different data services is not considered, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10H04L63/12
Inventor 朱培培
Owner 重庆爱责慧科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products