+

CN115277179B - Multi-step protection-based comprehensive safety protection method for open platform - Google Patents

Multi-step protection-based comprehensive safety protection method for open platform Download PDF

Info

Publication number
CN115277179B
CN115277179B CN202210882398.0A CN202210882398A CN115277179B CN 115277179 B CN115277179 B CN 115277179B CN 202210882398 A CN202210882398 A CN 202210882398A CN 115277179 B CN115277179 B CN 115277179B
Authority
CN
China
Prior art keywords
external network
data packet
network data
packet
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210882398.0A
Other languages
Chinese (zh)
Other versions
CN115277179A (en
Inventor
唐迎旭
宋志明
张春阳
陈佳霖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Sanxiang Bank Co Ltd
Original Assignee
Hunan Sanxiang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Sanxiang Bank Co Ltd filed Critical Hunan Sanxiang Bank Co Ltd
Priority to CN202210882398.0A priority Critical patent/CN115277179B/en
Publication of CN115277179A publication Critical patent/CN115277179A/en
Application granted granted Critical
Publication of CN115277179B publication Critical patent/CN115277179B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an open platform comprehensive safety protection method based on multi-step protection, which comprises the steps of obtaining an external network data packet, storing the external network data packet into a blockchain, distributing the external network data packet characteristic mark to a micro-service architecture server through a preset data detection distribution rule, generating an external network data packet distribution result, taking data corresponding to the external network data packet into the micro-service architecture server for testing according to the external network data packet distribution result, generating a test result, carrying out privacy calculation on the internal network data, carrying out data encapsulation to obtain a safe external network data packet, sending the safe external network data packet to an external network, realizing network attack blocking of a gateway, a webpage display end and an interface by a plurality of steps, and guaranteeing the safety effect of a bank internal network.

Description

Multi-step protection-based comprehensive safety protection method for open platform
Technical Field
The invention relates to the technical field of science and technology finance, in particular to an open platform comprehensive safety protection method based on multi-step protection.
Background
With the development of the age, the types of banking businesses are increasing, such as third party payment businesses, banking businesses, bank credit registration systems, financial statistics data reporting, international balance data reporting, third party payment businesses and the like, and the banking businesses involve network extranets including financial institutions, banks, internet platforms and the like. The complexity and the unsafe of the network outside the bank bring great network security threat to the network security of the bank, and the link between the bank and the external network brings great potential safety hazard to the network system of the bank.
The existing banking network comprises an intranet and an extranet, the extranet of the banking network bears an external release website system, an online banking system and the like, and because the extranet of the banking network is connected with the Internet and a business system is externally opened, the security of the banking network is important once network attack loss is encountered, the online banking relates to personal data privacy of clients and banking financial data, and the security of the online banking is important. The existing bank open platform network system is important to meet diversified business demands, can effectively ensure the safety of a gateway, a webpage and an interface, and develops an open platform comprehensive safety protection method based on multi-step protection for solving the problem.
Disclosure of Invention
The invention aims to provide an open platform comprehensive safety protection method based on multi-step protection, which aims to solve the problems of diversified business demands of the existing bank facing the open platform network system and safety of gateways, webpages and interfaces.
In a first aspect, the present invention provides a method for protecting comprehensive security of an open platform based on multi-step protection, including:
acquiring an external network data packet, storing the external network data packet into a block chain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark;
The external network data packet feature marks are distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated;
According to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, a test result is generated, and if the test result operates normally, the external network data packet is sent to an application server to obtain an internal network data packet;
performing privacy calculation and data encapsulation on the intranet data to obtain a safe extranet data packet;
and sending the safe external network data packet to an external network.
Further, obtaining an external network data packet, storing the external network data packet in a blockchain to generate an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark, including;
The external network data packet comprises external network data address information and sender identity, and if the external network data packet address information is within the data range of pre-stored safety characteristic information, data to be verified of the external network data packet is generated;
the identity characteristic data corresponding to the address information of the external network data packet in the pre-stored security characteristic information data are called, the identity characteristic data are matched with the data to be verified of the external network data packet, and if the matching is successful, the external network data packet is stored in a blockchain;
And generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark.
Further, the external network data packet feature tag is distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated, which comprises the following steps:
the preset data detection and distribution rules comprise a time period distribution rule, a sequence distribution rule and a bearing capacity distribution rule;
Substituting the characteristic marks of the external network data packets into the sequence allocation rule to generate the external network data packet detection cis-position instruction;
And generating an external network data packet distribution result according to the external network data packet detection cis-position instruction.
Further, according to the distribution result of the external network data packet, retrieving data corresponding to the external network data packet to carry the data into the micro service architecture server for testing, generating a test result, and if the test result operates normally, sending the external network data packet to an application server to obtain an internal network data packet, including:
the test results comprise a first test result and a second test result, when the first test result runs normally, the second test is not needed, and if the first test result is abnormal, the second test is started to generate a second test result;
And according to the second test result, if the second test result is still abnormal, starting the gateway to isolate data processing, and cutting off the data circulation of the external network and the internal network.
Further, performing privacy calculation and data encapsulation on the intranet data to obtain a secure extranet data packet, including:
Constructing a secure data interface and an address data secure list;
matching the intranet data with a corresponding data interface;
And matching the data interface with the safety list, and if the data interface is in the safety list matching, carrying out privacy calculation on the intranet data and carrying out data encapsulation.
The beneficial effects of the invention are as follows: the invention provides an open platform comprehensive safety protection method based on multi-step protection, which comprises the steps of obtaining an external network data packet, storing the external network data packet into a blockchain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, generating an external network data packet characteristic mark, distributing the external network data packet characteristic mark to a micro service architecture server through a preset data detection distribution rule, generating an external network data packet distribution result, calling data corresponding to the external network data packet into the micro service architecture server according to the external network data packet distribution result, generating a test result, if the test result runs normally, sending the external network data packet to an application server, obtaining an internal network data packet, carrying out privacy computation and data encapsulation on the internal network data, obtaining a safety external network data packet, sending the safety external network data packet to an external network, realizing a plurality of steps to a gateway, a webpage display end and an interface, realizing a network blocking attack, ensuring the safety of a bank network, and solving the problems of a multi-element network system and a multi-network interface of a bank.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings that are needed in the embodiments will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flowchart of an open platform comprehensive security protection method based on multi-step protection provided by an embodiment of the present invention;
Fig. 2 is a flowchart of step S101 of the multi-step protection-based open platform comprehensive security protection method according to the embodiment of the present invention;
Fig. 3 is a flowchart of an open platform comprehensive security protection method S102 based on multi-step protection according to an embodiment of the present invention;
Fig. 4 is a flowchart of an open platform comprehensive security protection method S103 based on multi-step protection according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to specific embodiments of the present invention and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention. The following describes in detail the technical solutions provided by the embodiments of the present invention with reference to the accompanying drawings.
Referring to fig. 1, the present invention provides an open platform comprehensive security protection method based on multi-step protection, including:
S101, acquiring an external network data packet, storing the external network data packet into a blockchain to generate an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark;
The bank external network data packet is subjected to blockchain storage and verification through acquiring the bank external network data packet, wherein the bank external network data packet contains the IP address information of the transmitted data packet and the identity of a sender, so that the follow-up external network data packet basic information is prevented from being tampered, and the tracing can be rapidly performed once the data abnormality is found.
S102, the external network data packet feature marks are distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated;
After the feature marks of the external network data packets are marked, the feature marks can be distributed, after the destination to which the feature marks need to go is determined, the external network data packets corresponding to the feature marks are called and sent to the feature mark destination, and the effect of quick distribution is achieved.
S103, according to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, a test result is generated, and if the test result operates normally, the external network data packet is sent to an application server, so that an internal network data packet is obtained;
And according to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, so that the condition that the internal network of the bank is attacked by the network due to the fact that the external network data packet is directly taken into the internal network is avoided, and the external network data is sent to the micro-service architecture for testing.
S104, carrying out privacy calculation and data encapsulation on the intranet data to obtain a safe extranet data packet;
and encrypting the qualified external network data through privacy calculation, and carrying out data encapsulation to obtain a safe external network data packet, thereby realizing the effect of avoiding the leakage of bank data.
S105, the secure extranet data packet is sent to an external network.
The method comprises the steps of obtaining an external network data packet, storing the external network data packet into a blockchain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, generating an external network data packet characteristic mark, distributing the external network data packet characteristic mark to a micro service architecture server through a preset data detection distribution rule, generating an external network data packet distribution result, retrieving data corresponding to the external network data packet into the micro service architecture server according to the external network data packet distribution result, testing, generating a test result, if the test result runs normally, sending the external network data packet to an application server, obtaining an internal network data packet, carrying out privacy calculation on the internal network data, and carrying out data encapsulation, obtaining a safe external network data packet, sending the safe external network data packet to an external network, realizing the effect of blocking network attack of a gateway, a webpage display end and an interface by a plurality of steps, and solving the problems of the prior banking facing the diversified service demands of an open platform network system, and the safety of the gateway and the banking interface.
Further, referring to fig. 2, an external network data packet is acquired, the external network data packet is stored in a blockchain to generate an external network data packet hash value, the external network data packet hash value is marked on the external network data packet, and an external network data packet feature mark is generated, including;
s201, the external network data packet comprises external network data address information and a sender identity, and if the external network data packet address information is within a data range of pre-stored security feature information, data to be verified of the external network data packet is generated;
firstly, verifying an IP address of an external network data packet, if the IP address of the external network data packet is within the range, generating data to be verified of the external network data packet, and only receiving data sent by the known safe IP address to avoid encountering network attack.
S202, identity characteristic data corresponding to the address information of the external network data packet in the pre-stored security characteristic information data is called, the identity characteristic data is matched with the data to be verified of the external network data packet, and if the matching is successful, the external network data packet is stored in a block chain;
after the IP address information is correct, the identity characteristic data is verified, and the network attack of an unknown identity person on the internal network of the bank is avoided.
S203, an external network data packet hash value is generated, the external network data packet hash value is marked on the external network data packet, and an external network data packet feature mark is generated.
The bank external network data packet is subjected to blockchain storage and verification through acquiring the bank external network data packet, wherein the bank external network data packet contains the IP address information of the transmitted data packet and the identity of a sender, so that the follow-up external network data packet basic information is prevented from being tampered, and the tracing can be rapidly performed once the data abnormality is found.
Further, referring to fig. 3, the step of distributing the external network packet feature tag to the micro service architecture server through a preset data detection distribution rule to generate an external network packet distribution result includes:
s301, the preset data detection and distribution rule comprises a time period distribution rule, a sequence distribution rule and a bearing capacity distribution rule;
When a large amount of external network data is acquired in the same time period, a time period distribution rule is started, when the acquired external network data amount is normal, the external network data is distributed through the sequence distribution rule, and when the micro-service architecture bearing capacity is abnormal, the external network data is distributed through the bearing capacity distribution rule.
S302, substituting the characteristic marks of the external network data packets into the sequence allocation rule to generate the external network data packet detection order instruction;
In order to avoid carrying data distribution and reducing the running speed of the system, the external network data is subjected to characteristic marking, the characteristic marking is classified, and then the corresponding external network data is called and sent to a designated destination.
S303, generating an external network data packet distribution result according to the external network data packet detection cis-position instruction.
After the feature marks of the external network data packets are marked, the feature marks can be distributed, after the destination to which the feature marks need to go is determined, the external network data packets corresponding to the feature marks are called and sent to the feature mark destination, and the effect of quick distribution is achieved.
Further, referring to fig. 4, according to the distribution result of the external network data packet, retrieving data corresponding to the external network data packet to be brought into the micro service architecture server for testing, generating a test result, and if the test result operates normally, sending the external network data packet to an application server to obtain an internal network data packet, including:
S401, the test results comprise a first test result and a second test result, when the first test result runs normally, the second test is not needed, and if the first test result is abnormal, the second test is started to generate a second test result;
s402, according to the second test result, if the second test result is still abnormal, the gateway is started to process the isolated data, and the data circulation of the external network and the internal network is cut off.
And according to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, so that the condition that the internal network of the bank is attacked by the network due to the fact that the external network data packet is directly taken into the internal network is avoided, and the external network data is sent to the micro-service architecture for testing.
Further, performing privacy calculation and data encapsulation on the intranet data to obtain a secure extranet data packet, including:
s501, constructing a secure data interface and an address data secure list;
S502, matching the intranet data with a corresponding data interface;
The bank is faced with the development requirement of diversified business, and needs to interface with a data interface, so as to avoid encountering network attack, the data sent by the external network can enter the internal network of the bank by testing the data sent by the external network in a micro-service architecture.
And S503, matching the data interface with the safety list, and if the data interface is in the safety list matching, carrying out privacy calculation on the intranet data and carrying out data encapsulation.
And encrypting the qualified external network data through privacy calculation, and carrying out data encapsulation to obtain a safe external network data packet, thereby realizing the effect of avoiding the leakage of bank data.
According to the method for comprehensively protecting the open platform based on multi-step protection, the external network data packet is obtained and stored in the blockchain, the external network data packet hash value is generated, the external network data packet hash value is marked on the external network data packet, the external network data packet feature mark is generated, the external network data packet feature mark is distributed to the micro service architecture server through a preset data detection distribution rule, an external network data packet distribution result is generated, data corresponding to the external network data packet is fetched according to the external network data packet distribution result and is brought into the micro service architecture server for testing, a test result is generated, if the test result is normal, the external network data packet is sent to the application server to obtain an internal network data packet, the internal network data is subjected to privacy calculation and data encapsulation to obtain a safe external network data packet, the safe external network data packet is sent to an external network, a plurality of steps are realized to realize the gateway, a webpage display end and an interface to block the network, the safety requirements of the bank are met, and the safety requirements of the network system of the bank are met.
It will be apparent to those skilled in the art that the techniques of embodiments of the present invention may be implemented in software plus a necessary general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in essence or what contributes to the prior art in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments or some parts of the embodiments of the present invention.
The embodiments of the present invention described above do not limit the scope of the present invention.

Claims (5)

1. The comprehensive safety protection method for the open platform based on multi-step protection is characterized by comprising the following steps of;
acquiring an external network data packet, storing the external network data packet into a block chain, generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark;
The external network data packet feature marks are distributed to a micro-service architecture server through a preset data detection distribution rule, and an external network data packet distribution result is generated;
According to the distribution result of the external network data packet, the data corresponding to the external network data packet is called to be brought into the micro-service architecture server for testing, a test result is generated, and if the test result operates normally, the external network data packet is sent to an application server to obtain an internal network data packet;
performing privacy calculation and data encapsulation on the intranet data to obtain a safe extranet data packet;
and sending the safe external network data packet to an external network.
2. The method of claim 1, wherein obtaining an outer network packet, storing the outer network packet in a blockchain, generating an outer network packet hash value, tagging the outer network packet hash value to the outer network packet, generating an outer network packet signature, comprising;
The external network data packet comprises external network data address information and sender identity, and if the external network data packet address information is within the data range of pre-stored safety characteristic information, data to be verified of the external network data packet is generated;
the identity characteristic data corresponding to the address information of the external network data packet in the pre-stored security characteristic information data are called, the identity characteristic data are matched with the data to be verified of the external network data packet, and if the matching is successful, the external network data packet is stored in a blockchain;
And generating an external network data packet hash value, marking the external network data packet hash value on the external network data packet, and generating an external network data packet feature mark.
3. The method of claim 1, wherein the step of assigning the external network packet signature to the micro service architecture server by a preset data detection assignment rule to generate an external network packet assignment result comprises:
the preset data detection and distribution rules comprise a time period distribution rule, a sequence distribution rule and a bearing capacity distribution rule;
Substituting the characteristic marks of the external network data packets into the sequence allocation rule to generate the external network data packet detection cis-position instruction;
And generating an external network data packet distribution result according to the external network data packet detection cis-position instruction.
4. The method of claim 1, wherein retrieving data corresponding to the external network data packet to the micro server architecture server for testing according to the external network data packet allocation result, generating a test result, and if the test result operates normally, sending the external network data packet to an application server to obtain an internal network data packet, comprises:
the test results comprise a first test result and a second test result, when the first test result runs normally, the second test is not needed, and if the first test result is abnormal, the second test is started to generate a second test result;
And according to the second test result, if the second test result is still abnormal, starting the gateway to isolate data processing, and cutting off the data circulation of the external network and the internal network.
5. The method of claim 1, wherein performing privacy computation and data encapsulation on the intranet data to obtain a secure extranet data packet comprises:
Constructing a secure data interface and an address data secure list;
matching the intranet data with a corresponding data interface;
And matching the data interface with the safety list, and if the data interface is in the safety list matching, carrying out privacy calculation on the intranet data and carrying out data encapsulation.
CN202210882398.0A 2022-07-26 2022-07-26 Multi-step protection-based comprehensive safety protection method for open platform Active CN115277179B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210882398.0A CN115277179B (en) 2022-07-26 2022-07-26 Multi-step protection-based comprehensive safety protection method for open platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210882398.0A CN115277179B (en) 2022-07-26 2022-07-26 Multi-step protection-based comprehensive safety protection method for open platform

Publications (2)

Publication Number Publication Date
CN115277179A CN115277179A (en) 2022-11-01
CN115277179B true CN115277179B (en) 2024-08-13

Family

ID=83769425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210882398.0A Active CN115277179B (en) 2022-07-26 2022-07-26 Multi-step protection-based comprehensive safety protection method for open platform

Country Status (1)

Country Link
CN (1) CN115277179B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135661A (en) * 2016-12-26 2017-09-05 深圳前海达闼云端智能科技有限公司 Data processing method, device, system and information collecting device
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8332925B2 (en) * 2006-08-08 2012-12-11 A10 Networks, Inc. System and method for distributed multi-processing security gateway
CN101478546B (en) * 2009-01-23 2011-11-16 成都市华为赛门铁克科技有限公司 Method for protecting network safety and network safety protecting equipment
US10432585B2 (en) * 2017-02-25 2019-10-01 Xage Security, Inc. Autonomous decentralization of centralized stateful security services with systematic tamper resistance
CN109167702A (en) * 2018-08-28 2019-01-08 新华三大数据技术有限公司 A kind of distributed test method and device based on load balancing
CN110826111B (en) * 2019-06-26 2021-08-13 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110598411A (en) * 2019-09-23 2019-12-20 腾讯科技(深圳)有限公司 Sensitive information detection method and device, storage medium and computer equipment
CN110601902B (en) * 2019-09-24 2021-07-27 腾讯科技(深圳)有限公司 Interactive data processing method and device based on block chain network
CN111683045B (en) * 2020-04-28 2023-08-01 中国平安财产保险股份有限公司 Session information processing method, device, equipment and storage medium
GB2600769A (en) * 2020-11-10 2022-05-11 Nchain Holdings Ltd Merkle proof entity
CN113360501A (en) * 2021-06-04 2021-09-07 永旗(北京)科技有限公司 Block chain-based distributed data storage method and system
CN113423120A (en) * 2021-06-22 2021-09-21 中国联合网络通信集团有限公司 Data distribution processing method and device based on private network terminal and electronic equipment
CN114095272B (en) * 2021-11-30 2023-10-31 昆明电力交易中心有限责任公司 Intranet data linking method and device based on internal and external network security architecture

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135661A (en) * 2016-12-26 2017-09-05 深圳前海达闼云端智能科技有限公司 Data processing method, device, system and information collecting device
CN107819777A (en) * 2017-11-17 2018-03-20 北京亿生生网络科技有限公司 A kind of data based on block chain technology deposit card method and system

Also Published As

Publication number Publication date
CN115277179A (en) 2022-11-01

Similar Documents

Publication Publication Date Title
US11477245B2 (en) Advanced detection of identity-based attacks to assure identity fidelity in information technology environments
US11637870B2 (en) User responses to cyber security threats
US20120215575A1 (en) Risk Assessment And Prioritization Framework
EP3432542A1 (en) Method and device for linking to account and providing service process
US20170155683A1 (en) Remedial action for release of threat data
US11924250B2 (en) Automated contextual understanding of unstructured security documents
EP3836058A1 (en) Dynamic message analysis platform for enhanced enterprise security
CN113191892A (en) Account risk prevention and control method, device, system and medium based on equipment fingerprint
Richardson Is there a silver bullet to stop cybercrime?
Alkhdour et al. Assessment of cybersecurity risks and threats on banking and financial services
CN115277179B (en) Multi-step protection-based comprehensive safety protection method for open platform
Hendaoui et al. SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection
CN113946869A (en) Internal security attack detection method and device for federal learning and privacy calculation
Yermalovich et al. Formalization of attack prediction problem
Florackis et al. Cybersecurity Risk: The Data
Narayana et al. Security analysis of storage, virtualization, infrastructure and standardization in cloud computing
Adharsh et al. Prevention of Data Breach by Machine Learning Techniques
WO2022046365A1 (en) Advanced detection of identity-based attacks
Bharath et al. Introduction to Social Engineering: The Human Element of Hacking
Gupta et al. Cyber Threats in Cloud Computing Environment
Jensen et al. Flooding attack issues of web services and service-oriented architectures
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
Barrigar Examining the current threat of cybercrime in mobile banking and what can be done to combat it
Gautam et al. Phishing prevention techniques: past, present and future
Kanyongo et al. IMPACT OF CYBERSECURITY ON RISK MITIGATION STRATEGY BY COMMERCIAL BANKS IN EMERGING MARKETS: A LEGAL PERSPECTIVE CASE STUDY.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载