Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data flow detection method and system based on block chain

A detection method and blockchain technology, applied in the field of network security, can solve the problems of user loss, failure to take into account differences in data services, theft and use, etc.

Inactive Publication Date: 2020-12-29
朱培培
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the traditional solution, each data provider website can continuously provide high-quality data content to increase its own website traffic during operation. However, the access addresses of these high-quality data content are often easily stolen by some third-party data providers and used in The third-party data provider's own website causes a large number of users to access their own data services through other third-party websites, which will not only lead to the loss of many users, but also pose a great privacy security risk to users
In the existing scheme, although the authentication step of the terminal user terminal is provided to identify the flow address requested by the user terminal, the difference between different data services is not considered, and a set of authentication schemes usually adopted for all data services , and it is very easy to be cracked by hackers during the authentication process, resulting in a low authentication success rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data flow detection method and system based on block chain
  • Data flow detection method and system based on block chain
  • Data flow detection method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The present application will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the device embodiments or system embodiments. In the description of the present application, unless otherwise specified, "at least one" includes one or more. "Multiple" means two or more. For example, at least one of A, B and C includes: A alone, B alone, A and B at the same time, A and C at the same time, B and C at the same time, and A, B and C at the same time. In this application, " / " means or, for example, A / B can mean A or B; "and / or" in this article is just an association relationship describing the associated target object, indicating that there can be three relationships , for example, A and / or B, may mean: A exists alone, A and B exist simultaneously, and B exists alone.

[0073] figure 1 It is an interactive schematic diagram of a blockchain-based data flow detection syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data flow detection method and system based on a block chain, and the method comprises the steps: generating a to-be-verified block chain for a verificationstrategy of a specific target data business when a server receives a data flow obtaining request, sent by a user terminal, for the target data business, thereby considering the difference of differentdata businesses, and improving the verification efficiency. Therefore, the security and pertinence of the authentication process are improved, the user terminal can calculate the to-be-verified fieldaccording to the block chain generation field in the to-be-verified block chain to generate the corresponding verification field, and the to-be-verified field is randomly added, so that the difficulty of cracking by a hacker can be improved, the authentication success rate is further improved. And lastly, legal state detection is carried out after the verification block chain is formed, the userterminal is allowed to access the data stream address of the target data service after the detection is passed, and verification is repeatedly carried out by monitoring the access information of the user terminal in real time during the period, so that the authentication success rate and security are further improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a blockchain-based data flow detection method and system. Background technique [0002] In the traditional solution, each data provider website can continuously provide high-quality data content to increase its own website traffic during operation. However, the access addresses of these high-quality data content are often easily stolen by some third-party data providers and used in The third-party data provider's own website causes a large number of users to access their own data services through other third-party websites, which not only leads to the loss of many users, but also poses a great privacy security risk to users. In the existing scheme, although the authentication step of the terminal user terminal is provided to identify the stream address requested by the user terminal, the difference between different data services is not considered, and a set o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10H04L63/12
Inventor 朱培培
Owner 朱培培
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products