CN115277179B - Multi-step protection-based comprehensive safety protection method for open platform - Google Patents
Multi-step protection-based comprehensive safety protection method for open platform Download PDFInfo
- Publication number
- CN115277179B CN115277179B CN202210882398.0A CN202210882398A CN115277179B CN 115277179 B CN115277179 B CN 115277179B CN 202210882398 A CN202210882398 A CN 202210882398A CN 115277179 B CN115277179 B CN 115277179B
- Authority
- CN
- China
- Prior art keywords
- external network
- data packet
- network data
- packet
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000012360 testing method Methods 0.000 claims abstract description 63
- 238000001514 detection method Methods 0.000 claims abstract description 19
- 238000005538 encapsulation Methods 0.000 claims abstract description 15
- 230000002159 abnormal effect Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 2
- 230000000694 effects Effects 0.000 abstract description 6
- 230000000903 blocking effect Effects 0.000 abstract description 3
- 230000005856 abnormality Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses an open platform comprehensive safety protection method based on multi-step protection, which comprises the steps of obtaining an external network data packet, storing the external network data packet into a blockchain, distributing the external network data packet characteristic mark to a micro-service architecture server through a preset data detection distribution rule, generating an external network data packet distribution result, taking data corresponding to the external network data packet into the micro-service architecture server for testing according to the external network data packet distribution result, generating a test result, carrying out privacy calculation on the internal network data, carrying out data encapsulation to obtain a safe external network data packet, sending the safe external network data packet to an external network, realizing network attack blocking of a gateway, a webpage display end and an interface by a plurality of steps, and guaranteeing the safety effect of a bank internal network.
Description
Technical Field
The invention relates to the technical field of science and technology finance, in particular to an open platform comprehensive safety protection method based on multi-step protection.
Background
With the development of the age, the types of banking businesses are increasing, such as third party payment businesses, banking businesses, bank credit registration systems, financial statistics data reporting, international balance data reporting, third party payment businesses and the like, and the banking businesses involve network extranets including financial institutions, banks, internet platforms and the like. The complexity and the unsafe of the network outside the bank bring great network security threat to the network security of the bank, and the link between the bank and the external network brings great potential safety hazard to the network system of the bank.
The existing banking network comprises an intranet and an extranet, the extranet of the banking network bears an external release website system, an online banking system and the like, and because the extranet of the banking network is connected with the Internet and a business system is externally opened, the security of the banking network is important once network attack loss is encountered, the online banking relates to personal data privacy of clients and banking financial data, and the security of the online banking is important. The existing bank open platform network system is important to meet diversified business demands, can effectively ensure the safety of a gateway, a webpage and an interface, and develops an open platform comprehensive safety protection method based on multi-step protection for solving the problem.
Disclosure of Invention
The invention aims to provide an open platform comprehensive safety protection method based on multi-step protection, which aims to solve the problems of diversified business demands of the existing bank facing the open platform network system and safety of gateways, webpages and interfaces.
In a first aspect, the present invention provides a method for protecting comprehensive security of an open platform based on multi-step protection, including:
acquiring an external network data packet, storing the external network data packet into a block chain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark;
The external network data packet feature marks are distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated;
According to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, a test result is generated, and if the test result operates normally, the external network data packet is sent to an application server to obtain an internal network data packet;
performing privacy calculation and data encapsulation on the intranet data to obtain a safe extranet data packet;
and sending the safe external network data packet to an external network.
Further, obtaining an external network data packet, storing the external network data packet in a blockchain to generate an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark, including;
The external network data packet comprises external network data address information and sender identity, and if the external network data packet address information is within the data range of pre-stored safety characteristic information, data to be verified of the external network data packet is generated;
the identity characteristic data corresponding to the address information of the external network data packet in the pre-stored security characteristic information data are called, the identity characteristic data are matched with the data to be verified of the external network data packet, and if the matching is successful, the external network data packet is stored in a blockchain;
And generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark.
Further, the external network data packet feature tag is distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated, which comprises the following steps:
the preset data detection and distribution rules comprise a time period distribution rule, a sequence distribution rule and a bearing capacity distribution rule;
Substituting the characteristic marks of the external network data packets into the sequence allocation rule to generate the external network data packet detection cis-position instruction;
And generating an external network data packet distribution result according to the external network data packet detection cis-position instruction.
Further, according to the distribution result of the external network data packet, retrieving data corresponding to the external network data packet to carry the data into the micro service architecture server for testing, generating a test result, and if the test result operates normally, sending the external network data packet to an application server to obtain an internal network data packet, including:
the test results comprise a first test result and a second test result, when the first test result runs normally, the second test is not needed, and if the first test result is abnormal, the second test is started to generate a second test result;
And according to the second test result, if the second test result is still abnormal, starting the gateway to isolate data processing, and cutting off the data circulation of the external network and the internal network.
Further, performing privacy calculation and data encapsulation on the intranet data to obtain a secure extranet data packet, including:
Constructing a secure data interface and an address data secure list;
matching the intranet data with a corresponding data interface;
And matching the data interface with the safety list, and if the data interface is in the safety list matching, carrying out privacy calculation on the intranet data and carrying out data encapsulation.
The beneficial effects of the invention are as follows: the invention provides an open platform comprehensive safety protection method based on multi-step protection, which comprises the steps of obtaining an external network data packet, storing the external network data packet into a blockchain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, generating an external network data packet characteristic mark, distributing the external network data packet characteristic mark to a micro service architecture server through a preset data detection distribution rule, generating an external network data packet distribution result, calling data corresponding to the external network data packet into the micro service architecture server according to the external network data packet distribution result, generating a test result, if the test result runs normally, sending the external network data packet to an application server, obtaining an internal network data packet, carrying out privacy computation and data encapsulation on the internal network data, obtaining a safety external network data packet, sending the safety external network data packet to an external network, realizing a plurality of steps to a gateway, a webpage display end and an interface, realizing a network blocking attack, ensuring the safety of a bank network, and solving the problems of a multi-element network system and a multi-network interface of a bank.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings that are needed in the embodiments will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flowchart of an open platform comprehensive security protection method based on multi-step protection provided by an embodiment of the present invention;
Fig. 2 is a flowchart of step S101 of the multi-step protection-based open platform comprehensive security protection method according to the embodiment of the present invention;
Fig. 3 is a flowchart of an open platform comprehensive security protection method S102 based on multi-step protection according to an embodiment of the present invention;
Fig. 4 is a flowchart of an open platform comprehensive security protection method S103 based on multi-step protection according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to specific embodiments of the present invention and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention. The following describes in detail the technical solutions provided by the embodiments of the present invention with reference to the accompanying drawings.
Referring to fig. 1, the present invention provides an open platform comprehensive security protection method based on multi-step protection, including:
S101, acquiring an external network data packet, storing the external network data packet into a blockchain to generate an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark;
The bank external network data packet is subjected to blockchain storage and verification through acquiring the bank external network data packet, wherein the bank external network data packet contains the IP address information of the transmitted data packet and the identity of a sender, so that the follow-up external network data packet basic information is prevented from being tampered, and the tracing can be rapidly performed once the data abnormality is found.
S102, the external network data packet feature marks are distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated;
After the feature marks of the external network data packets are marked, the feature marks can be distributed, after the destination to which the feature marks need to go is determined, the external network data packets corresponding to the feature marks are called and sent to the feature mark destination, and the effect of quick distribution is achieved.
S103, according to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, a test result is generated, and if the test result operates normally, the external network data packet is sent to an application server, so that an internal network data packet is obtained;
And according to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, so that the condition that the internal network of the bank is attacked by the network due to the fact that the external network data packet is directly taken into the internal network is avoided, and the external network data is sent to the micro-service architecture for testing.
S104, carrying out privacy calculation and data encapsulation on the intranet data to obtain a safe extranet data packet;
and encrypting the qualified external network data through privacy calculation, and carrying out data encapsulation to obtain a safe external network data packet, thereby realizing the effect of avoiding the leakage of bank data.
S105, the secure extranet data packet is sent to an external network.
The method comprises the steps of obtaining an external network data packet, storing the external network data packet into a blockchain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, generating an external network data packet characteristic mark, distributing the external network data packet characteristic mark to a micro service architecture server through a preset data detection distribution rule, generating an external network data packet distribution result, retrieving data corresponding to the external network data packet into the micro service architecture server according to the external network data packet distribution result, testing, generating a test result, if the test result runs normally, sending the external network data packet to an application server, obtaining an internal network data packet, carrying out privacy calculation on the internal network data, and carrying out data encapsulation, obtaining a safe external network data packet, sending the safe external network data packet to an external network, realizing the effect of blocking network attack of a gateway, a webpage display end and an interface by a plurality of steps, and solving the problems of the prior banking facing the diversified service demands of an open platform network system, and the safety of the gateway and the banking interface.
Further, referring to fig. 2, an external network data packet is acquired, the external network data packet is stored in a blockchain to generate an external network data packet hash value, the external network data packet hash value is marked on the external network data packet, and an external network data packet feature mark is generated, including;
s201, the external network data packet comprises external network data address information and a sender identity, and if the external network data packet address information is within a data range of pre-stored security feature information, data to be verified of the external network data packet is generated;
firstly, verifying an IP address of an external network data packet, if the IP address of the external network data packet is within the range, generating data to be verified of the external network data packet, and only receiving data sent by the known safe IP address to avoid encountering network attack.
S202, identity characteristic data corresponding to the address information of the external network data packet in the pre-stored security characteristic information data is called, the identity characteristic data is matched with the data to be verified of the external network data packet, and if the matching is successful, the external network data packet is stored in a block chain;
after the IP address information is correct, the identity characteristic data is verified, and the network attack of an unknown identity person on the internal network of the bank is avoided.
S203, an external network data packet hash value is generated, the external network data packet hash value is marked on the external network data packet, and an external network data packet feature mark is generated.
The bank external network data packet is subjected to blockchain storage and verification through acquiring the bank external network data packet, wherein the bank external network data packet contains the IP address information of the transmitted data packet and the identity of a sender, so that the follow-up external network data packet basic information is prevented from being tampered, and the tracing can be rapidly performed once the data abnormality is found.
Further, referring to fig. 3, the step of distributing the external network packet feature tag to the micro service architecture server through a preset data detection distribution rule to generate an external network packet distribution result includes:
s301, the preset data detection and distribution rule comprises a time period distribution rule, a sequence distribution rule and a bearing capacity distribution rule;
When a large amount of external network data is acquired in the same time period, a time period distribution rule is started, when the acquired external network data amount is normal, the external network data is distributed through the sequence distribution rule, and when the micro-service architecture bearing capacity is abnormal, the external network data is distributed through the bearing capacity distribution rule.
S302, substituting the characteristic marks of the external network data packets into the sequence allocation rule to generate the external network data packet detection order instruction;
In order to avoid carrying data distribution and reducing the running speed of the system, the external network data is subjected to characteristic marking, the characteristic marking is classified, and then the corresponding external network data is called and sent to a designated destination.
S303, generating an external network data packet distribution result according to the external network data packet detection cis-position instruction.
After the feature marks of the external network data packets are marked, the feature marks can be distributed, after the destination to which the feature marks need to go is determined, the external network data packets corresponding to the feature marks are called and sent to the feature mark destination, and the effect of quick distribution is achieved.
Further, referring to fig. 4, according to the distribution result of the external network data packet, retrieving data corresponding to the external network data packet to be brought into the micro service architecture server for testing, generating a test result, and if the test result operates normally, sending the external network data packet to an application server to obtain an internal network data packet, including:
S401, the test results comprise a first test result and a second test result, when the first test result runs normally, the second test is not needed, and if the first test result is abnormal, the second test is started to generate a second test result;
s402, according to the second test result, if the second test result is still abnormal, the gateway is started to process the isolated data, and the data circulation of the external network and the internal network is cut off.
And according to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, so that the condition that the internal network of the bank is attacked by the network due to the fact that the external network data packet is directly taken into the internal network is avoided, and the external network data is sent to the micro-service architecture for testing.
Further, performing privacy calculation and data encapsulation on the intranet data to obtain a secure extranet data packet, including:
s501, constructing a secure data interface and an address data secure list;
S502, matching the intranet data with a corresponding data interface;
The bank is faced with the development requirement of diversified business, and needs to interface with a data interface, so as to avoid encountering network attack, the data sent by the external network can enter the internal network of the bank by testing the data sent by the external network in a micro-service architecture.
And S503, matching the data interface with the safety list, and if the data interface is in the safety list matching, carrying out privacy calculation on the intranet data and carrying out data encapsulation.
And encrypting the qualified external network data through privacy calculation, and carrying out data encapsulation to obtain a safe external network data packet, thereby realizing the effect of avoiding the leakage of bank data.
According to the method for comprehensively protecting the open platform based on multi-step protection, the external network data packet is obtained and stored in the blockchain, the external network data packet hash value is generated, the external network data packet hash value is marked on the external network data packet, the external network data packet feature mark is generated, the external network data packet feature mark is distributed to the micro service architecture server through a preset data detection distribution rule, an external network data packet distribution result is generated, data corresponding to the external network data packet is fetched according to the external network data packet distribution result and is brought into the micro service architecture server for testing, a test result is generated, if the test result is normal, the external network data packet is sent to the application server to obtain an internal network data packet, the internal network data is subjected to privacy calculation and data encapsulation to obtain a safe external network data packet, the safe external network data packet is sent to an external network, a plurality of steps are realized to realize the gateway, a webpage display end and an interface to block the network, the safety requirements of the bank are met, and the safety requirements of the network system of the bank are met.
It will be apparent to those skilled in the art that the techniques of embodiments of the present invention may be implemented in software plus a necessary general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in essence or what contributes to the prior art in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments or some parts of the embodiments of the present invention.
The embodiments of the present invention described above do not limit the scope of the present invention.
Claims (5)
1. The comprehensive safety protection method for the open platform based on multi-step protection is characterized by comprising the following steps of;
acquiring an external network data packet, storing the external network data packet into a block chain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark;
The external network data packet feature marks are distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated;
According to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, a test result is generated, and if the test result operates normally, the external network data packet is sent to an application server to obtain an internal network data packet;
performing privacy calculation and data encapsulation on the intranet data to obtain a safe extranet data packet;
and sending the safe external network data packet to an external network.
2. The method of claim 1, wherein obtaining an outer network packet, storing the outer network packet in a blockchain, generating an outer network packet hash value, tagging the outer network packet hash value to the outer network packet, generating an outer network packet signature, comprising;
The external network data packet comprises external network data address information and sender identity, and if the external network data packet address information is within the data range of pre-stored safety characteristic information, data to be verified of the external network data packet is generated;
the identity characteristic data corresponding to the address information of the external network data packet in the pre-stored security characteristic information data are called, the identity characteristic data are matched with the data to be verified of the external network data packet, and if the matching is successful, the external network data packet is stored in a blockchain;
And generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark.
3. The method of claim 1, wherein the step of assigning the external network packet signature to the micro service architecture server by a preset data detection assignment rule to generate an external network packet assignment result comprises:
the preset data detection and distribution rules comprise a time period distribution rule, a sequence distribution rule and a bearing capacity distribution rule;
Substituting the characteristic marks of the external network data packets into the sequence allocation rule to generate the external network data packet detection cis-position instruction;
And generating an external network data packet distribution result according to the external network data packet detection cis-position instruction.
4. The method of claim 1, wherein retrieving data corresponding to the external network data packet to the micro server architecture server for testing according to the external network data packet allocation result, generating a test result, and if the test result operates normally, sending the external network data packet to an application server to obtain an internal network data packet, comprises:
the test results comprise a first test result and a second test result, when the first test result runs normally, the second test is not needed, and if the first test result is abnormal, the second test is started to generate a second test result;
And according to the second test result, if the second test result is still abnormal, starting the gateway to isolate data processing, and cutting off the data circulation of the external network and the internal network.
5. The method of claim 1, wherein performing privacy computation and data encapsulation on the intranet data to obtain a secure extranet data packet comprises:
Constructing a secure data interface and an address data secure list;
matching the intranet data with a corresponding data interface;
And matching the data interface with the safety list, and if the data interface is in the safety list matching, carrying out privacy calculation on the intranet data and carrying out data encapsulation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210882398.0A CN115277179B (en) | 2022-07-26 | 2022-07-26 | Multi-step protection-based comprehensive safety protection method for open platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210882398.0A CN115277179B (en) | 2022-07-26 | 2022-07-26 | Multi-step protection-based comprehensive safety protection method for open platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115277179A CN115277179A (en) | 2022-11-01 |
CN115277179B true CN115277179B (en) | 2024-08-13 |
Family
ID=83769425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210882398.0A Active CN115277179B (en) | 2022-07-26 | 2022-07-26 | Multi-step protection-based comprehensive safety protection method for open platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115277179B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107135661A (en) * | 2016-12-26 | 2017-09-05 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, system and information collecting device |
CN107819777A (en) * | 2017-11-17 | 2018-03-20 | 北京亿生生网络科技有限公司 | A kind of data based on block chain technology deposit card method and system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8332925B2 (en) * | 2006-08-08 | 2012-12-11 | A10 Networks, Inc. | System and method for distributed multi-processing security gateway |
CN101478546B (en) * | 2009-01-23 | 2011-11-16 | 成都市华为赛门铁克科技有限公司 | Method for protecting network safety and network safety protecting equipment |
US10432585B2 (en) * | 2017-02-25 | 2019-10-01 | Xage Security, Inc. | Autonomous decentralization of centralized stateful security services with systematic tamper resistance |
CN109167702A (en) * | 2018-08-28 | 2019-01-08 | 新华三大数据技术有限公司 | A kind of distributed test method and device based on load balancing |
CN110826111B (en) * | 2019-06-26 | 2021-08-13 | 腾讯科技(深圳)有限公司 | Test supervision method, device, equipment and storage medium |
CN110598411A (en) * | 2019-09-23 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Sensitive information detection method and device, storage medium and computer equipment |
CN110601902B (en) * | 2019-09-24 | 2021-07-27 | 腾讯科技(深圳)有限公司 | Interactive data processing method and device based on block chain network |
CN111683045B (en) * | 2020-04-28 | 2023-08-01 | 中国平安财产保险股份有限公司 | Session information processing method, device, equipment and storage medium |
GB2600769A (en) * | 2020-11-10 | 2022-05-11 | Nchain Holdings Ltd | Merkle proof entity |
CN113360501A (en) * | 2021-06-04 | 2021-09-07 | 永旗(北京)科技有限公司 | Block chain-based distributed data storage method and system |
CN113423120A (en) * | 2021-06-22 | 2021-09-21 | 中国联合网络通信集团有限公司 | Data distribution processing method and device based on private network terminal and electronic equipment |
CN114095272B (en) * | 2021-11-30 | 2023-10-31 | 昆明电力交易中心有限责任公司 | Intranet data linking method and device based on internal and external network security architecture |
-
2022
- 2022-07-26 CN CN202210882398.0A patent/CN115277179B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107135661A (en) * | 2016-12-26 | 2017-09-05 | 深圳前海达闼云端智能科技有限公司 | Data processing method, device, system and information collecting device |
CN107819777A (en) * | 2017-11-17 | 2018-03-20 | 北京亿生生网络科技有限公司 | A kind of data based on block chain technology deposit card method and system |
Also Published As
Publication number | Publication date |
---|---|
CN115277179A (en) | 2022-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11477245B2 (en) | Advanced detection of identity-based attacks to assure identity fidelity in information technology environments | |
US11637870B2 (en) | User responses to cyber security threats | |
US20120215575A1 (en) | Risk Assessment And Prioritization Framework | |
EP3432542A1 (en) | Method and device for linking to account and providing service process | |
US20170155683A1 (en) | Remedial action for release of threat data | |
US11924250B2 (en) | Automated contextual understanding of unstructured security documents | |
EP3836058A1 (en) | Dynamic message analysis platform for enhanced enterprise security | |
CN113191892A (en) | Account risk prevention and control method, device, system and medium based on equipment fingerprint | |
Richardson | Is there a silver bullet to stop cybercrime? | |
Alkhdour et al. | Assessment of cybersecurity risks and threats on banking and financial services | |
CN115277179B (en) | Multi-step protection-based comprehensive safety protection method for open platform | |
Hendaoui et al. | SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection | |
CN113946869A (en) | Internal security attack detection method and device for federal learning and privacy calculation | |
Yermalovich et al. | Formalization of attack prediction problem | |
Florackis et al. | Cybersecurity Risk: The Data | |
Narayana et al. | Security analysis of storage, virtualization, infrastructure and standardization in cloud computing | |
Adharsh et al. | Prevention of Data Breach by Machine Learning Techniques | |
WO2022046365A1 (en) | Advanced detection of identity-based attacks | |
Bharath et al. | Introduction to Social Engineering: The Human Element of Hacking | |
Gupta et al. | Cyber Threats in Cloud Computing Environment | |
Jensen et al. | Flooding attack issues of web services and service-oriented architectures | |
Gottipati | A proposed cybersecurity model for cryptocurrency exchanges | |
Barrigar | Examining the current threat of cybercrime in mobile banking and what can be done to combat it | |
Gautam et al. | Phishing prevention techniques: past, present and future | |
Kanyongo et al. | IMPACT OF CYBERSECURITY ON RISK MITIGATION STRATEGY BY COMMERCIAL BANKS IN EMERGING MARKETS: A LEGAL PERSPECTIVE CASE STUDY. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |