Transaction promotion method of threat intelligence transaction alliance chain based on benefit distribution

A benefit distribution and transaction technology, applied in the direction of database distribution/replication, structured data retrieval, transmission system, etc., can solve the problem of low participation enthusiasm of nodes, and achieve the effect of promoting healthy development

Active Publication Date: 2020-08-11
HARBIN ENG UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a transaction promotion method for a threat intelligence transaction alliance chain bas...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction promotion method of threat intelligence transaction alliance chain based on benefit distribution
  • Transaction promotion method of threat intelligence transaction alliance chain based on benefit distribution
  • Transaction promotion method of threat intelligence transaction alliance chain based on benefit distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the accompanying drawings.

[0030] The present invention proposes a transaction promotion method of a threat intelligence transaction alliance chain based on benefit distribution, and the specific steps are as follows:

[0031] (1) Fragment formation and master node election phase processing method: each node determines the shard to which it belongs, and then uses the voting mechanism to elect the master node in this shard.

[0032] (2) Processing method for initiating a transaction and determining the number of transactions: At the beginning of the transaction cycle, the transaction initiation node creates and initiates the transaction, and the transaction application is sent to all shard master nodes.

[0033] (3) Determine the list of cooperative nodes and the processing method of the threshold stage: each node in the shard is verified, and initially decides whether to participate in the trans...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of benefit allocation-based transaction promotion in a network threat intelligence transaction alliance chain, and particularly relates to a transaction promotion method for a threat intelligence transaction alliance chain based on benefit distribution. Aiming to solve the problem of identity privacy protection of a transaction endorsement user in a threat intelligence transaction alliance chain transaction process, on the basis of a fragmentation mechanism of an alliance chain, a game strategy of nodes under a unified benefit distribution and fairbenefit distribution mechanism is analyzed by combining a game theory method, cooperation equilibrium conditions of the nodes are studied, and a benefit distribution mechanism based on fragmentation fair distribution is provided under the cooperation equilibrium conditions of the fair benefit distribution mechanism. According to the invention, the effect of attracting more users to participate intransaction cooperation can be achieved, and the goal of threatening benign development of intelligence transactions is achieved.

Description

technical field [0001] The invention belongs to the technical field of transaction promotion based on profit distribution in network threat intelligence transaction alliance chain, and specifically relates to a transaction promotion method of threat intelligence transaction alliance chain based on profit distribution. Background technique [0002] In recent years, with the continuous development and improvement of the Internet space, the network environment, especially the network security environment, has become increasingly complex. Cyber ​​threat intelligence information is a standardized data information with a high degree of information relevance and accuracy, which is helpful for various security organizations to analyze threat intelligence information and provide strong data support for the detection and defense of network threats. Network threat intelligence information transactions are an important source of information for cyberspace security organizations to obtai...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/27G06Q20/06G06Q40/04H04L29/08
CPCG06F16/27G06Q20/065G06Q40/04H04L67/1097H04L67/1001
Inventor 杨武玄世昌王巍苘大鹏吕继光赵阳
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products