Supercharge Your Innovation With Domain-Expert AI Agents!

Block chain and digital currency combined data security detection method and cloud computing center

A digital currency and data security technology, applied in the field of data security detection and cloud computing center, can solve the problems of tampering of important data, affecting the safe operation of hand-held equipment, tampering of digital payment transactions, etc., to avoid malicious tampering, ensure safe operation, The effect of improving accuracy

Inactive Publication Date: 2021-05-07
徐鹏飞
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, with the increasing number and types of business equipment, different business equipment may not tamper with digital payment transactions when implementing digital payment transactions, but may implant Trojan horse programs into the counterparty's equipment during the transaction process, making the counterparty The important data of the device is maliciously tampered with, which may affect the safe operation of the counterparty's device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain and digital currency combined data security detection method and cloud computing center
  • Block chain and digital currency combined data security detection method and cloud computing center
  • Block chain and digital currency combined data security detection method and cloud computing center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0053] The inventor found during the research that when the prior art detects these Trojan horse programs, most of the verification algorithms based on the consensus mechanism realize the detection and verification, which makes it difficult to ensure the accuracy of the verification, and deploying the verification thread on the business device side will increase the security of the business device. Operating load, reducing the opera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain and digital currency combined data security detection method and a cloud computing center. When a real-time service request is detected, when a second service device completes sending of service response data, and when it is monitored that a data calling interface in an identity information verification node of the second service device in a service interaction process is in an open state, different device state data of a first service device can be collected; therefore, the first service equipment and the second service equipment are frozen when it is judged that the first service equipment is abnormal in the service interaction process. Thus, the data security detection can be achieved when the business equipment carries out the digital payment transaction through the cloud computing center deployed at the cloud, so as to accurately judge whether the business equipment in the transaction process carries the Trojan horse program or not, thereby improving the accuracy of Trojan horse detection on the premise of not influencing the normal operation of the business equipment, important data of the service equipment is prevented from being maliciously tampered by Trojan programs, and safe operation of the service equipment is ensured.

Description

technical field [0001] This application relates to blockchain finance, in particular to a data security detection method and a cloud computing center combining blockchain and digital currency. Background technique [0002] Digital currency is a virtual currency based on node network and digital encryption algorithm, which has been gradually applied nowadays. With the development of the digital economy, the proportion of digital currency in social and economic activities is increasing. The payment system combined with blockchain can ensure that every online digital payment transaction will not be tampered with. At the same time, blockchain payment can also improve the real-time performance of digital payment transactions, reduce transaction delays, and achieve fast arrival. [0003] However, with the increasing number and types of business equipment, different business equipment may not tamper with digital payment transactions when implementing digital payment transactions, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06F21/31G06F21/56G06F21/64G06Q20/06
CPCG06F21/31G06F21/56G06F21/64G06Q20/065G06Q20/3829
Inventor 徐鹏飞
Owner 徐鹏飞
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More