Supercharge Your Innovation With Domain-Expert AI Agents!

Data security detection method based on block chain and digital currency and cloud computing center

A digital currency and data security technology, applied in digital data authentication, digital data protection, computing, etc., can solve problems such as digital payment transaction tampering, affecting the safe operation of mobile devices, and important data tampering

Active Publication Date: 2020-11-27
南京论之语网络技术有限公司
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the increasing number and types of business equipment, different business equipment may not tamper with digital payment transactions when implementing digital payment transactions, but may implant Trojan horse programs into the counterparty's equipment during the transaction process, making the counterparty The important data of the device is maliciously tampered with, which may affect the safe operation of the counterparty's device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security detection method based on block chain and digital currency and cloud computing center
  • Data security detection method based on block chain and digital currency and cloud computing center
  • Data security detection method based on block chain and digital currency and cloud computing center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0053] The inventor found during the research that when the prior art detects these Trojan horse programs, most of the verification algorithms based on the consensus mechanism realize the detection and verification, which makes it difficult to ensure the accuracy of the verification, and deploying the verification thread on the business device side will increase the security of the business device. Operating load, reducing the opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security detection method based on a block chain and digital currency and a cloud computing center. When a real-time service request is detected, second service equipment completes sending of service response data and it is monitored that a data calling interface in an identity information verification node of the second service equipment in a service interaction process is in an open state, different equipment state data of first service equipment can be collected; and the first service equipment and the second service equipment are frozen when it is judged thatthe first service equipment is abnormal in the service interaction process. Thus, the data security detection during the digital payment transaction of the service equipment can be realized through the cloud computing center deployed at the cloud end; therefore, the Trojan horse detection accuracy is improved on the premise of not influencing the normal operation of the service equipment, the malicious tampering of important data of the service equipment by the Trojan horse program is avoided, and the safe operation of the service equipment is ensured.

Description

technical field [0001] This application relates to blockchain finance, in particular to a data security detection method based on blockchain and digital currency and a cloud computing center. Background technique [0002] Digital currency is a virtual currency based on node network and digital encryption algorithm, which has been gradually applied nowadays. With the development of the digital economy, the proportion of digital currency in social and economic activities is increasing. The payment system combined with blockchain can ensure that every online digital payment transaction will not be tampered with. At the same time, blockchain payment can also improve the real-time performance of digital payment transactions, reduce transaction delays, and achieve fast arrival. [0003] However, with the increasing number and types of business equipment, different business equipment may not tamper with digital payment transactions when implementing digital payment transactions, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38G06F21/31G06F21/56G06F21/64G06Q20/06
CPCG06F21/31G06F21/56G06F21/64G06Q20/065G06Q20/3829
Inventor 徐鹏飞
Owner 南京论之语网络技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More