Data flow monitoring method based on block chain and big data and cloud computing service platform

A service platform and blockchain technology, applied in the field of data flow monitoring method and cloud computing service platform based on blockchain and big data, can solve the problem of low accuracy of threat attack identification

Inactive Publication Date: 2020-11-13
周浩
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In traditional schemes, it is often difficult to accurately determine the threat attack behavior on the blockchain encryption node in the transaction consensus data area within a verification consensus rule interval, resulting in low accuracy of threat attack identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data flow monitoring method based on block chain and big data and cloud computing service platform
  • Data flow monitoring method based on block chain and big data and cloud computing service platform
  • Data flow monitoring method based on block chain and big data and cloud computing service platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the following briefly introduces the drawings that need to be used in the description of the embodiments. Apparently, the accompanying drawings in the following description are only some examples or embodiments of this specification, and those skilled in the art can also apply this specification to other similar scenarios. Unless otherwise apparent from context or otherwise indicated, like reference numerals in the figures represent like structures or operations.

[0070] It should be understood that "system", "device", "unit" and / or "module" used in this specification is a method for distinguishing different components, elements, parts, parts or assemblies of different levels. However, the words may be replaced by other expressions if other words can achieve the same purpose.

[0071] As indicated in the specification and claims, the terms "a", "an", "an" and / ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data flow monitoring method based on a block chain and big data and a cloud computing service platform. Each disturbance tracking object of each verificationrule and a target disturbance tracking object in linkage verification with the current disturbance tracking object are determined; therefore, private key ciphertext vector analysis can be carried outbased on the association relationship between the disturbance tracking object and the target disturbance tracking object; threat attack analysis is carried out through the support vector machine classifier, so that the judgment accuracy of the threat attack behavior of the transaction consensus data area on the blockchain encryption node in the verification rule interval can be improved, and theaccuracy of threat attack identification is improved.

Description

technical field [0001] The invention relates to the technical field of block chain and big data, in particular, to a data flow monitoring method based on block chain and big data and a cloud computing service platform. Background technique [0002] In the process of verifying digital currency transaction requests, it is usually necessary to verify whether there are external threat attacks that may occur during verification disturbances, so as to avoid causing security problems in the payment process of digital currency. In traditional schemes, it is often difficult to accurately identify threat attack behaviors on blockchain encryption nodes in the transaction consensus data area within a range of verification consensus rules, resulting in low accuracy of threat attack identification. Contents of the invention [0003] In order to at least overcome the above-mentioned deficiencies in the prior art, the object of the present invention is to provide a data flow monitoring me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/06G06Q20/38G06Q20/40G06K9/62G06Q40/04
CPCG06Q20/065G06Q20/3829G06Q20/4016G06Q40/04G06F18/23G06F18/2411
Inventor 周浩
Owner 周浩
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products