CN117034262B - Abnormality supervision system and abnormality supervision method - Google Patents
Abnormality supervision system and abnormality supervision method Download PDFInfo
- Publication number
- CN117034262B CN117034262B CN202311293172.8A CN202311293172A CN117034262B CN 117034262 B CN117034262 B CN 117034262B CN 202311293172 A CN202311293172 A CN 202311293172A CN 117034262 B CN117034262 B CN 117034262B
- Authority
- CN
- China
- Prior art keywords
- user
- chain
- verification
- supervision
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本说明书公开了一种异常监管系统及异常监管方法。所述异常监管系统包括:用户监督链、证明验证链、管理者监管链。其中,用户监督链中包含各用户节点,证明验证链包含各验证节点,管理者监管链包含各管理者节点,用户监督链可以接收任意一个用户节点提交的异常事件,并将异常事件传输给证明验证链,以通过验证节点对异常事件进行验证,得到验证结果,根据验证结果,对每个用户节点对应的违规记录以及用户积分进行管理,以及,可以接收管理者监管链发送的积分管理请求,并根据接收的积分管理请求对每个用户节点对应的用户积分进行管理。
This specification discloses an abnormality supervision system and an abnormality supervision method. The abnormality supervision system includes: user supervision chain, certification verification chain, and manager supervision chain. Among them, the user supervision chain includes each user node, the certification verification chain includes each verification node, and the manager supervision chain includes each manager node. The user supervision chain can receive abnormal events submitted by any user node and transmit the abnormal events to the certification The verification chain is used to verify abnormal events through verification nodes and obtain verification results. Based on the verification results, it manages the violation records and user points corresponding to each user node, and can receive points management requests sent by the manager's chain of custody. And manage the user points corresponding to each user node according to the received points management request.
Description
技术领域Technical field
本说明书涉及区块链技术领域,尤其涉及一种异常监管系统及异常监管方法。This manual relates to the field of blockchain technology, and in particular to an abnormality supervision system and abnormality supervision method.
背景技术Background technique
随着各个互联网服务提供方所提供的业务平台的发展,使得越来越多的用户开始使用各业务平台所提供的服务进行生产和生活,而各个业务平台的用户增多的同时,用户的各种类型的违规行为也在增多,进而给业务平台的用户环境管理带来极大的困难。With the development of business platforms provided by various Internet service providers, more and more users have begun to use the services provided by each business platform for production and life. As the number of users of each business platform increases, users' various Types of violations are also increasing, which brings great difficulties to the user environment management of the business platform.
因此,如何有效地对用户在业务平台中的异常行为进行监管,则是一个亟待解决的问题。Therefore, how to effectively supervise users' abnormal behavior in the business platform is an urgent problem that needs to be solved.
发明内容Contents of the invention
本说明书提供一种异常监管系统及异常监管方法,以部分的解决现有技术存在的上述问题。This specification provides an abnormality supervision system and an abnormality supervision method to partially solve the above problems existing in the existing technology.
本说明书采用下述技术方案:This manual adopts the following technical solutions:
本说明书提供了一种异常监管系统,所述异常监管系统包括:用户监督链、证明验证链、管理者监管链,其中,所述用户监督链中包含各用户节点,所述证明验证链包含各验证节点,所述管理者监管链包含各管理者节点;This specification provides an abnormal supervision system. The abnormal supervision system includes: a user supervision chain, a certification verification chain, and a manager supervision chain. The user supervision chain includes each user node, and the certification verification chain includes each user node. Verification node, the manager chain of custody includes each manager node;
所述用户监督链用于接收任意一个用户节点提交的异常事件,并将所述异常事件传输给证明验证链,以通过所述验证节点对所述异常事件进行验证,得到验证结果,根据所述验证结果,对每个用户节点对应的违规记录以及用户积分进行管理;以及The user supervision chain is used to receive abnormal events submitted by any user node, and transmit the abnormal events to the certification verification chain, so as to verify the abnormal events through the verification nodes and obtain verification results. According to the Verify the results and manage the violation records and user points corresponding to each user node; and
用于接收异常用户发送的第一积分恢复请求,并根据所述第一积分恢复请求中包含的积分恢复证明信息对每个用户节点对应的用户积分进行管理;Used to receive the first point recovery request sent by the abnormal user, and manage the user points corresponding to each user node according to the point recovery certification information contained in the first point recovery request;
所述证明验证链用于接收所述用户监督链传输的异常事件,通过所述验证节点对所述异常事件进行验证,得到验证结果并返回给所述用户监督链;The proof verification chain is used to receive abnormal events transmitted by the user supervision chain, verify the abnormal events through the verification node, obtain verification results and return them to the user supervision chain;
所述管理者监管链用于通过所述管理者节点响应所述异常用户发送的第二积分恢复请求,确定目标违规记录,根据所述第二积分恢复请求中包含的证明信息,确定是否恢复所述异常用户对应的用户节点的用户积分,若是,则生成积分恢复证明信息返回给所述异常用户所使用的设备。The manager chain of custody is used to respond to the second point recovery request sent by the abnormal user through the manager node, determine the target violation record, and determine whether to restore all points based on the certification information contained in the second point recovery request. The user points of the user node corresponding to the abnormal user, if so, generate points recovery certificate information and return it to the device used by the abnormal user.
可选地,所述用户监督链用于通过所述用户节点将所述异常事件的相关材料数据传输到数据库中保存;Optionally, the user supervision chain is used to transmit the relevant material data of the abnormal event to the database through the user node for storage;
所述证明验证链用于通过所述验证节点从所述数据库中获取所述相关材料数据,以根据所述相关材料数据对所述异常事件进行验证。The proof verification chain is used to obtain the relevant material data from the database through the verification node to verify the abnormal event based on the relevant material data.
可选地,所述用户监督链用于对所述用户监督链中包含的各用户节点的数字身份数据进行指定管理操作,所述指定管理操作包括:认证操作、创建操作、更新操作、销毁操作、查询操作。Optionally, the user supervision chain is used to perform designated management operations on the digital identity data of each user node included in the user supervision chain. The designated management operations include: authentication operations, creation operations, update operations, and destruction operations. , query operation.
可选地,所述证明验证链用于根据预设的智能合约,对所述异常事件进行验证,得到验证结果,所述智能合约为预先制定的针对不同类型的异常事件对应的用户积分变更标准以及预先制定的针对不同类型的异常事件对应的验证标准;Optionally, the proof verification chain is used to verify the abnormal event according to a preset smart contract to obtain the verification result. The smart contract is a pre-established user points change standard corresponding to different types of abnormal events. and pre-established verification standards corresponding to different types of abnormal events;
所述用户监督链用于根据所述验证结果以及预设的智能合约,对每个用户节点对应的违规记录以及用户积分进行管理。The user supervision chain is used to manage the violation records and user points corresponding to each user node based on the verification results and the preset smart contract.
可选地,所述管理者链用于获取所述用户监督链中保存的违规记录,确定所述违规记录对应的违规类别,并判断所述违规类别是否为指定类别,若是,则从预设的处罚方案中确定出与所述违规记录对应的违规类别相匹配处罚方案,根据所述处罚方案对所述违规记录对应的用户节点进行处罚。Optionally, the manager chain is used to obtain the violation records saved in the user supervision chain, determine the violation category corresponding to the violation record, and determine whether the violation category is a specified category. If so, start from the default Determine a penalty plan that matches the violation category corresponding to the violation record, and punish the user node corresponding to the violation record according to the penalty plan.
本说明书提供了一种异常监管方法,所述异常监管方法应用于异常监管系统,所述异常监管系统包括:用户监督链、证明验证链、管理者监管链,其中,所述用户监督链中包含各用户节点,所述证明验证链包含各验证节点,所述管理者监管链包含各管理者节点,所述方法包括:This specification provides an abnormal supervision method, which is applied to an abnormal supervision system. The abnormal supervision system includes: a user supervision chain, a certification verification chain, and a manager supervision chain, wherein the user supervision chain includes Each user node, the certification verification chain includes each verification node, the manager custody chain includes each manager node, and the method includes:
通过所述用户监督链接收任意一个用户节点提交的异常事件;Receive abnormal events submitted by any user node through the user supervision link;
将所述异常事件传输给证明验证链,以通过所述验证节点对所述异常事件进行验证,得到验证结果,并根据所述验证结果,对每个用户节点对应的违规记录以及用户积分进行管理;以及Transmit the abnormal event to the proof verification chain to verify the abnormal event through the verification node to obtain the verification result, and manage the violation records and user points corresponding to each user node according to the verification result. ;as well as
接收异常用户发送的第一积分恢复请求,并根据所述第一积分恢复请求中包含的积分恢复证明信息对每个用户节点对应的用户积分进行管理,所述积分恢复证明信息是所述管理者监管链通过所述管理者节点响应所述异常用户发送的第二积分恢复请求,确定目标违规记录,根据所述第二积分恢复请求中包含的证明信息,确定恢复所述异常用户对应的用户节点的用户积分时,返回给所述异常用户所使用的设备的。Receive the first points recovery request sent by the abnormal user, and manage the user points corresponding to each user node according to the points recovery certification information contained in the first points recovery request, and the points recovery certification information is the manager's The chain of custody responds to the second point recovery request sent by the abnormal user through the manager node, determines the target violation record, and determines the user node corresponding to the abnormal user to be restored based on the certification information contained in the second point recovery request. User points are returned to the device used by the abnormal user.
可选地,将所述异常事件传输给证明验证链,以通过所述验证节点对所述异常事件进行验证,得到验证结果之前,所述方法还包括:Optionally, transmit the abnormal event to the proof verification chain to verify the abnormal event through the verification node. Before obtaining the verification result, the method further includes:
通过所述用户监督链的所述用户节点将所述异常事件的相关材料数据传输到数据库中保存;Transmit the relevant material data of the abnormal event to the database for storage through the user node of the user supervision chain;
将所述异常事件传输给证明验证链,以通过所述验证节点对所述异常事件进行验证,具体包括:Transmit the abnormal event to the proof verification chain to verify the abnormal event through the verification node, specifically including:
将所述异常事件传输给证明验证链,以使所述验证节点从所述数据库中获取所述相关材料数据,并根据所述相关材料数据对所述异常事件进行验证。The abnormal event is transmitted to the proof verification chain, so that the verification node obtains the relevant material data from the database and verifies the abnormal event according to the relevant material data.
可选地,所述方法还包括:Optionally, the method also includes:
通过所述用户监督链对所述用户监督链中包含的各用户节点的数字身份数据进行指定管理操作,所述指定管理操作包括:认证操作、创建操作、更新操作、销毁操作、查询操作。Perform specified management operations on the digital identity data of each user node included in the user supervision chain through the user supervision chain. The specified management operations include: authentication operations, creation operations, update operations, destruction operations, and query operations.
可选地,通过所述验证节点对所述异常事件进行验证,得到验证结果,具体包括:Optionally, the abnormal event is verified through the verification node to obtain verification results, which specifically include:
通过所述证明验证链根据预设的智能合约,对所述异常事件进行验证,得到验证结果,所述智能合约为预先制定的针对不同类型的异常事件对应的用户积分变更标准以及预先制定的针对不同类型的异常事件对应的验证标准;Through the proof verification chain, the abnormal event is verified according to the preset smart contract to obtain the verification result. The smart contract is the pre-made user points change standards corresponding to different types of abnormal events and the pre-made rules for Verification standards corresponding to different types of abnormal events;
根据所述验证结果,对每个用户节点对应的违规记录以及用户积分进行管理,具体包括:According to the verification results, the violation records and user points corresponding to each user node are managed, specifically including:
根据所述验证结果以及预设的智能合约,对每个用户节点对应的违规记录以及用户积分进行管理。According to the verification results and the preset smart contract, the violation records and user points corresponding to each user node are managed.
可选地,所述方法还包括:Optionally, the method also includes:
通过所述管理者链获取所述用户监督链中保存的违规记录,确定所述违规记录对应的违规类别,并判断所述违规类别是否为指定类别;Obtain the violation records saved in the user supervision chain through the manager chain, determine the violation category corresponding to the violation record, and determine whether the violation category is a designated category;
若是,则从预设的处罚方案中确定出与所述违规记录对应的违规类别相匹配处罚方案,根据所述处罚方案对所述违规记录对应的用户节点进行处罚。If so, a penalty plan matching the violation category corresponding to the violation record is determined from the preset penalty plan, and the user node corresponding to the violation record is punished according to the penalty plan.
本说明书提供了一种计算机可读存储介质,所述存储介质存储有计算机程序,所述计算机程序被处理器执行时实现上述异常监管方法。This specification provides a computer-readable storage medium. The storage medium stores a computer program. When the computer program is executed by a processor, the above-mentioned abnormality monitoring method is implemented.
本说明书提供了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现上述异常监管方法。This specification provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor. When the processor executes the program, the above-mentioned abnormality monitoring method is implemented.
本说明书采用的上述至少一个技术方案能够达到以下有益效果:At least one of the above technical solutions adopted in this manual can achieve the following beneficial effects:
在本说明书提供的异常监管方法中,首先通过用户监督链接收任意一个用户节点提交的异常事件,将异常事件传输给证明验证链,以通过验证节点对异常事件进行验证,得到验证结果,并根据验证结果,对每个用户节点对应的违规记录以及用户积分进行管理,接收异常用户发送的第一积分恢复请求,并根据第一积分恢复请求中包含的积分恢复证明信息对每个用户节点对应的用户积分进行管理,这里的积分恢复证明信息是管理者监管链通过管理者节点响应异常用户发送的第二积分恢复请求,确定目标违规记录,根据第二积分恢复请求中包含的证明信息,确定恢复异常用户对应的用户节点的用户积分时,返回给异常用户所使用的设备的。In the abnormality supervision method provided in this manual, the abnormal events submitted by any user node are first received through the user supervision chain, and the abnormal events are transmitted to the proof verification chain to verify the abnormal events through the verification nodes to obtain the verification results, and based on Verify the results, manage the violation records and user points corresponding to each user node, receive the first point recovery request sent by the abnormal user, and verify the points corresponding to each user node based on the points recovery certification information contained in the first point recovery request. User points are managed. The point recovery certification information here is the manager's chain of custody responding to the second point recovery request sent by the abnormal user through the manager node, determining the target violation record, and determining recovery based on the certification information contained in the second point recovery request. The user points of the user node corresponding to the abnormal user are returned to the device used by the abnormal user.
从上述方法可以看出,可以通过由三条平行链组成的异常监管系统对用户环境进行监管,其中,用户可以通过在用户监管链中的用户节点,提交针对其它用户的异常行为的异常事件,并可以在通过证明验证链验证后,从而可以对异常用户对应的用户节点的用户积分进行扣除,以及可以进行相应地处罚,进而可以有效地对用户在业务平台中的异常行为进行监管。It can be seen from the above method that the user environment can be supervised through an abnormality supervision system composed of three parallel chains. Among them, users can submit abnormal events for other users’ abnormal behaviors through user nodes in the user supervision chain, and After passing the proof verification chain verification, the user points of the user nodes corresponding to the abnormal users can be deducted and corresponding penalties can be imposed, thereby effectively supervising the abnormal behavior of users in the business platform.
附图说明Description of the drawings
此处所说明的附图用来提供对本说明书的进一步理解,构成本说明书的一部分,本说明书的示意性实施例及其说明用于解释本说明书,并不构成对本说明书的不当限定。在附图中:The drawings described here are used to provide a further understanding of this specification and constitute a part of this specification. The illustrative embodiments and descriptions of this specification are used to explain this specification and do not constitute an improper limitation of this specification. In the attached picture:
图1为本说明书中提供的异常监管系统的示意图;Figure 1 is a schematic diagram of the abnormality monitoring system provided in this manual;
图2为本说明书中提供的异常监管系统的使用过程示意图;Figure 2 is a schematic diagram of the use process of the abnormality monitoring system provided in this manual;
图3为本说明书中提供的一种异常监管方法的流程示意图;Figure 3 is a schematic flow chart of an abnormality monitoring method provided in this specification;
图4为本说明书提供的一种异常监管装置的示意图;Figure 4 is a schematic diagram of an abnormality monitoring device provided in this specification;
图5为本说明书提供的一种对应于图4的电子设备示意图。FIG. 5 is a schematic diagram of an electronic device corresponding to FIG. 4 provided in this specification.
具体实施方式Detailed ways
为使本说明书的目的、技术方案和优点更加清楚,下面将结合本说明书具体实施例及相应的附图对本说明书技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本说明书保护的范围。In order to make the purpose, technical solutions and advantages of this specification more clear, the technical solutions of this specification will be clearly and completely described below in conjunction with specific embodiments of this specification and the corresponding drawings. Obviously, the described embodiments are only some of the embodiments of this specification, but not all of the embodiments. Based on the embodiments in this specification, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of this specification.
以下结合附图,详细说明本说明书各实施例提供的技术方案。The technical solutions provided by each embodiment of this specification will be described in detail below with reference to the accompanying drawings.
随着互联网技术的发展,各种类型的网络乱象层出不穷给各个业务平台的用户环境带来极大的损害,从而降低了用户的体验,因此,如何各个业务平台如何对用户环境进行监管就显得尤为重要。With the development of Internet technology, various types of network chaos have emerged one after another, causing great damage to the user environment of each business platform, thereby reducing the user experience. Therefore, how each business platform can supervise the user environment becomes apparent. Particularly important.
基于此,本说明书提供了一种异常监管系统,具体如图1所示。Based on this, this specification provides an abnormality monitoring system, as shown in Figure 1.
图1为本说明书中提供的异常监管系统的示意图。Figure 1 is a schematic diagram of the abnormality monitoring system provided in this specification.
结合图1可以看出,上述的异常监管系统包括:用户监督链、证明验证链、管理者监管链,其中,用户监督链、证明验证链、管理者监管链为三条平行链,这里的用户监督链可以作为三条区块链中的中继链(即用于在进行跨链信息传输以及进行跨链任务执行的链)。It can be seen from Figure 1 that the above-mentioned abnormal supervision system includes: user supervision chain, certification verification chain, and manager supervision chain. Among them, the user supervision chain, the certification verification chain, and the manager supervision chain are three parallel chains. The user supervision here The chain can be used as a relay chain among the three blockchains (that is, the chain used for cross-chain information transmission and cross-chain task execution).
需要说明的是,上述的用户监督链可以采用公链共识机制NPoS(Nominated Proofof Stake)进行管理,包含各用户节点,这里的用户节点可以由业务平台的不同用户经过数字身份认证后创建并使用。上述的证明验证链可以采用共识产生区块Aura(Authority-based round-robin scheduling)机制进行管理,包含各验证节点,这里的验证节点可以由相关的验证机构经过数字身份认证后创建并使用。上述的管理者监管链可以采用Aura或者联盟链机制进行管理,包含各管理者节点,这里的管理者节点可以由诸如:政府相关部门、业务平台相关部门等,在经过数字身份认证后创建并使用。It should be noted that the above-mentioned user supervision chain can be managed using the public chain consensus mechanism NPoS (Nominated Proof of Stake), including each user node. The user nodes here can be created and used by different users of the business platform after digital identity authentication. The above-mentioned proof verification chain can be managed using the consensus-generated block Aura (Authority-based round-robin scheduling) mechanism, including each verification node. The verification nodes here can be created and used by relevant verification agencies after digital identity authentication. The above-mentioned manager chain of custody can be managed using Aura or alliance chain mechanisms, including each manager node. The manager nodes here can be created and used by relevant government departments, business platform-related departments, etc. after digital identity authentication. .
具体地,用户在使用业务平台进行业务执行的过程中,若发现存在其它用户的违规行为,则可以采集相关材料数据,并通过在用户监督链中的用户节点,提交相应的异常事件,并将相关材料数据传输到数据库中保存,其中,上述的相关材料数据可以为诸如:照片、视频、录音等数据,具体如图2所示。Specifically, if a user discovers violations of other users while using the business platform to perform business, they can collect relevant material data and submit corresponding abnormal events through the user node in the user supervision chain, and report The relevant material data is transferred to the database and saved, where the above-mentioned relevant material data can be data such as photos, videos, recordings, etc., as shown in Figure 2.
图2为本说明书中提供的异常监管系统的使用过程示意图。Figure 2 is a schematic diagram of the use process of the abnormality monitoring system provided in this manual.
结合图2可以看出,用户监督链可以用于接收任意一个用户节点提交的异常事件,并将异常事件传输给证明验证链,以通过验证节点对异常事件进行验证,得到验证结果,并可以根据验证结果以及预设的智能合约,对每个用户节点对应的违规记录以及用户积分进行管理,这里的智能合约可以为预先制定的针对不同类型的异常事件对应的用户积分变更标准以及预先制定的针对不同类型的异常事件对应的验证标准。As can be seen from Figure 2, the user supervision chain can be used to receive abnormal events submitted by any user node, and transmit the abnormal events to the proof verification chain, so that the abnormal events can be verified through the verification nodes, and the verification results can be obtained based on The verification results and the preset smart contract manage the violation records and user points corresponding to each user node. The smart contract here can provide pre-made user point change standards for different types of abnormal events and pre-made rules for Verification standards corresponding to different types of abnormal events.
证明验证链在接收用户监督链传输的异常事件后,可以通过验证节点从数据库中获取接收到的异常事件的相关材料数据,以根据相关材料数据对异常事件进行验证对异常事件进行验证,得到验证结果并返回给用户监督链。It is proved that after receiving the abnormal event transmitted by the user supervision chain, the verification chain can obtain the relevant material data of the received abnormal event from the database through the verification node to verify the abnormal event based on the relevant material data. The abnormal event can be verified and verified. The results are returned to the user chain of supervision.
其中,证据验证链对异常事件进行验证的方法可以为将接收到的异常事件的相关材料数据传输到异常事件所对应的异常用户所使用的设备中,以向作为违规主体的异常用户进行真实性验证、根据预设的智能合约对接收到的异常事件的相关材料数据进行格式验证、通过预设的神经网络模型对接收到的异常事件的相关材料数据进行真实性验证、将接收到的异常事件的相关材料数据传输到工作人员所使用的指定设备,以通过人工对接收到的异常事件的相关材料数据进行真实性验证等。Among them, the evidence verification chain can verify the abnormal event by transmitting the relevant material data of the received abnormal event to the device used by the abnormal user corresponding to the abnormal event, so as to verify the authenticity of the abnormal user who is the subject of the violation. Verification: Verify the format of the material data related to the received abnormal event according to the preset smart contract, verify the authenticity of the material data related to the received abnormal event through the preset neural network model, and store the received abnormal event The relevant material data is transmitted to the designated equipment used by the staff to manually verify the authenticity of the received abnormal event-related material data.
上述的异常事件所对应的异常用户是指被举报的违规主体的用户,即作出违规行为被其它用户提交对应的异常事件的用户。The abnormal user corresponding to the above abnormal event refers to the user who is the subject of the reported violation, that is, the user who committed the violation and was submitted to the corresponding abnormal event by other users.
当然,用户也可以通过所使用的设备先将相关材料数据上传至数据库,并获取到数据库返回的相关材料数据存储位置的哈希值,向证明验证链发送验证请求,以使证明验证链通过验证节点响应验证请求,并根据验证请求中携带的相关材料数据存储位置的哈希值,从数据库中获取相关材料数据,并对相关材料数据进行验证后,返回签名数据。Of course, users can also upload relevant material data to the database through the device they are using, obtain the hash value of the storage location of the relevant material data returned by the database, and send a verification request to the certification verification chain, so that the certification verification chain can pass the verification. The node responds to the verification request and obtains the relevant material data from the database based on the hash value of the storage location of the relevant material data carried in the verification request. After verifying the relevant material data, the node returns the signature data.
进一步地,用户可以通过用户节点向用户监督链提交异常事件,以使用户监督链在确定异常事件中存在证明验证链的签名数据后,可以根据签名数据对异常事件对应的异常用户的用户积分进行管理。Further, users can submit abnormal events to the user supervision chain through user nodes, so that after the user supervision chain determines that there is signature data proving the verification chain in the abnormal event, it can calculate the user points of the abnormal user corresponding to the abnormal event based on the signature data. manage.
在实际应用场景中,存在部分异常用户的异常行为较为严重,例如:对其它用户的财产造成严重损害等,基于此,管理者链可以获取用户监督链中保存的违规记录,确定违规记录对应的违规类别,并判断违规类别是否为指定类别,若是,则从预设的处罚方案中确定出与违规记录对应的违规类别相匹配处罚方案,根据处罚方案对违规记录对应的用户节点进行除扣除用户积分之外的额外处罚,这里的处罚方案可以为罚款、整改、对异常用户在业务平台中的至少部分权限进行限制等。In actual application scenarios, there are some abnormal users whose abnormal behavior is more serious, such as causing serious damage to the property of other users. Based on this, the manager chain can obtain the violation records saved in the user supervision chain and determine the corresponding records of the violation. Violation category, and determine whether the violation category is the specified category. If so, determine the penalty plan that matches the violation category corresponding to the violation record from the preset penalty plan, and remove and deduct the user node corresponding to the violation record according to the penalty plan. As for additional penalties in addition to points, the penalty options here can include fines, rectification, and restrictions on at least some of the permissions of abnormal users in the business platform, etc.
异常用户可以在完成相应处罚后需要恢复积分时,或者在需要进行违规申诉以恢复积分时,可以通过所使用的设备向管理者监管链发送第二积分恢复请求,以使管理者监管链通过管理者节点响应异常用户发送的第二积分恢复请求,确定目标违规记录,根据第二积分恢复请求中包含的证明信息,确定是否恢复异常用户对应的用户节点的用户积分,若是,则生成积分恢复证明信息返回给异常用户所使用的设备。When an abnormal user needs to restore points after completing the corresponding punishment, or when a violation appeal is needed to restore points, the user can send a second point restoration request to the manager's chain of custody through the device used, so that the manager's chain of custody passes the management The user node responds to the second point recovery request sent by the abnormal user, determines the target violation record, and determines whether to restore the user points of the user node corresponding to the abnormal user based on the certification information contained in the second point recovery request. If so, generates a points recovery certificate. Information is returned to the device used by the abnormal user.
异常用户在获取到管理者监管链中的管理者节点返回的积分恢复证明信息后,可以通过异常用户所使用的用户节点向用户监管链发送第一积分恢复请求。用户监督链可以接收异常用户发送的第一积分管理请求,并在对第一积分管理请求中包含的证明信息进行验证后,可以对每个用户节点对应的用户积分进行管理。After the abnormal user obtains the points recovery certificate information returned by the manager node in the manager's chain of custody, the abnormal user can send a first points recovery request to the user's chain of custody through the user node used by the abnormal user. The user supervision chain can receive the first point management request sent by the abnormal user, and after verifying the certification information contained in the first point management request, can manage the user points corresponding to each user node.
其中,若异常用户是完成相应的处罚则所提交的证明信息可以为完成处罚的证明材料,例如:罚款缴费记录、整改完成证明等。需要说明的是,上述的异常用户完成相应的处罚可以为线下去往指定地点完成相应处罚,也可以为线上完成相应处罚。Among them, if the abnormal user has completed the corresponding punishment, the submitted certification information can be the certification materials for completing the punishment, such as: fine payment records, proof of rectification completion, etc. It should be noted that the above-mentioned abnormal users can complete the corresponding punishment by going to the designated location to complete the corresponding punishment offline, or they can complete the corresponding punishment online.
若异常用户需要进行违规申诉,则用户所提交的证明信息可以为证明并未违规的证明材料。If an abnormal user needs to appeal against a violation, the certification information submitted by the user can be used as proof to prove that there is no violation.
除此之外,用户监督链还可以用于对用户监督链中包含的各用户节点的数字身份数据进行指定管理操作,指定管理操作包括:认证操作、创建操作、更新操作、销毁操作、查询操作。In addition, the user supervision chain can also be used to perform designated management operations on the digital identity data of each user node included in the user supervision chain. The designated management operations include: authentication operations, creation operations, update operations, destruction operations, and query operations. .
从上述内容中可以看出,异常监管系统可以通过三条平行链对用户环境进行监管,其中,用户可以通过在用户监管链中的用户节点,提交针对其它用户的异常行为的异常事件,并可以在通过证明验证链验证后,从而可以对异常用户对应的用户节点的用户积分进行扣除,以及可以进行相应地处罚,进而可以有效地对用户在业务平台中的异常行为进行监管。As can be seen from the above content, the abnormality supervision system can supervise the user environment through three parallel chains. Among them, users can submit abnormal events targeting other users’ abnormal behaviors through user nodes in the user supervision chain, and can After verification through the proof verification chain, the user points of the user node corresponding to the abnormal user can be deducted and punished accordingly, thereby effectively supervising the abnormal behavior of users in the business platform.
图3为本说明书中提供的一种异常监管方法的流程示意图,包括以下步骤:Figure 3 is a schematic flow chart of an abnormality monitoring method provided in this manual, including the following steps:
S301:通过所述用户监督链接收任意一个用户节点提交的异常事件。S301: Receive abnormal events submitted by any user node through the user supervision link.
S302:将所述异常事件传输给证明验证链,以通过所述验证节点对所述异常事件进行验证,得到验证结果,并根据所述验证结果,对每个用户节点对应的违规记录以及用户积分进行管理。S302: Transmit the abnormal event to the proof verification chain to verify the abnormal event through the verification node to obtain the verification result, and according to the verification result, the violation record and user points corresponding to each user node are To manage.
S303:接收异常用户发送的第一积分恢复请求,并根据所述第一积分恢复请求中包含的积分恢复证明信息对每个用户节点对应的用户积分进行管理,所述积分恢复证明信息是所述管理者监管链通过所述管理者节点响应所述异常用户发送的第二积分恢复请求,确定目标违规记录,根据所述第二积分恢复请求中包含的证明信息,确定恢复所述异常用户对应的用户节点的用户积分时,返回给所述异常用户所使用的设备的。S303: Receive the first points recovery request sent by the abnormal user, and manage the user points corresponding to each user node according to the points recovery certification information contained in the first points recovery request, where the points recovery certification information is the The manager's chain of custody responds to the second point recovery request sent by the abnormal user through the manager node, determines the target violation record, and determines to restore the corresponding points of the abnormal user based on the certification information contained in the second point recovery request. The user points of the user node are returned to the device used by the abnormal user.
在本说明书中,业务平台可以通过用户监督链接收任意一个用户节点提交的异常事件,将异常事件传输给证明验证链,以通过验证节点对异常事件进行验证,得到验证结果,并根据所述验证结果,对每个用户节点对应的违规记录以及用户积分进行管理,以及接收异常用户发送的第一积分恢复请求,并根据所述第一积分恢复请求中包含的积分恢复证明信息对每个用户节点对应的用户积分进行管理,这里的积分恢复证明信息是管理者监管链通过管理者节点响应异常用户发送的第二积分恢复请求,确定目标违规记录,根据第二积分恢复请求中包含的证明信息,确定恢复异常用户对应的用户节点的用户积分时,返回给异常用户所使用的设备的。In this specification, the business platform can receive abnormal events submitted by any user node through the user supervision chain, and transmit the abnormal events to the certification verification chain to verify the abnormal events through the verification nodes, obtain the verification results, and verify according to the verification As a result, the violation records and user points corresponding to each user node are managed, and the first point recovery request sent by the abnormal user is received, and each user node is processed according to the point recovery certification information contained in the first point recovery request. The corresponding user points are managed. The point recovery certification information here is the manager's chain of custody responding to the second point recovery request sent by the abnormal user through the manager node to determine the target violation record. According to the certification information contained in the second point recovery request, When it is determined to restore the user points of the user node corresponding to the abnormal user, they will be returned to the device used by the abnormal user.
具体地,业务平台可以通过用户监督链的用户节点将异常事件的相关材料数据传输到数据库中保存,并将异常事件传输给证明验证链,以使验证节点从数据库中获取相关材料数据,并根据相关材料数据对异常事件进行验证。Specifically, the business platform can transmit the relevant material data of abnormal events to the database for storage through the user node of the user supervision chain, and transmit the abnormal events to the proof verification chain, so that the verification node obtains relevant material data from the database and based on Relevant material data is used to verify abnormal events.
除此之外,业务平台还可以通过用户监督链对用户监督链中包含的各用户节点的数字身份数据进行指定管理操作,这里的指定管理操作包括:认证操作、创建操作、更新操作、销毁操作、查询操作。In addition, the business platform can also perform designated management operations on the digital identity data of each user node included in the user supervision chain through the user supervision chain. The designated management operations here include: authentication operations, creation operations, update operations, and destruction operations. , query operation.
进一步地,业务平台可以通过证明验证链根据预设的智能合约,对异常事件进行验证,得到验证结果,根据验证结果以及预设的智能合约,对每个用户节点对应的违规记录以及用户积分进行管理。这里的智能合约为预先制定的针对不同类型的异常事件对应的用户积分变更标准以及预先制定的针对不同类型的异常事件对应的验证标准。Furthermore, the business platform can verify abnormal events through the proof verification chain according to the preset smart contract, and obtain the verification results. Based on the verification results and the preset smart contract, the violation records and user points corresponding to each user node can be verified. manage. The smart contracts here are pre-established user points change standards for different types of abnormal events and pre-established verification standards for different types of abnormal events.
除此之外,业务平台还可以通过管理者链获取用户监督链中保存的违规记录,确定违规记录对应的违规类别,并判断违规类别是否为指定类别,若是,则从预设的处罚方案中确定出与违规记录对应的违规类别相匹配处罚方案,根据处罚方案对违规记录对应的用户节点进行处罚。In addition, the business platform can also obtain the violation records saved in the user supervision chain through the manager chain, determine the violation category corresponding to the violation record, and determine whether the violation category is the specified category. If so, it will be determined from the preset penalty plan. Determine a penalty plan that matches the violation category corresponding to the violation record, and punish the user node corresponding to the violation record according to the penalty plan.
从上述方法可以看出,可以通过由三条平行链组成的异常监管系统对用户环境进行监管,其中,用户可以通过在用户监管链中的用户节点,提交针对其它用户的异常行为的异常事件,并可以在通过证明验证链验证后,从而可以对异常用户对应的用户节点的用户积分进行扣除,以及可以进行相应地处罚,进而可以有效地对用户在业务平台中的异常行为进行监管。It can be seen from the above method that the user environment can be supervised through an abnormality supervision system composed of three parallel chains. Among them, users can submit abnormal events for other users’ abnormal behaviors through user nodes in the user supervision chain, and After passing the proof verification chain verification, the user points of the user nodes corresponding to the abnormal users can be deducted and corresponding penalties can be imposed, thereby effectively supervising the abnormal behavior of users in the business platform.
以上为本说明书的一个或多个实施模型部署的方法,基于同样的思路,本说明书还提供了相应的异常监管装置,如图4所示。The above is one or more implementation model deployment methods in this specification. Based on the same idea, this specification also provides a corresponding abnormality monitoring device, as shown in Figure 4.
图4为本说明书提供的一种异常监管装置的示意图,包括:Figure 4 is a schematic diagram of an abnormality monitoring device provided in this manual, including:
获取模块401,用于通过所述用户监督链接收任意一个用户节点提交的异常事件;The acquisition module 401 is used to receive abnormal events submitted by any user node through the user supervision link;
验证模块402,用于将所述异常事件传输给证明验证链,以通过所述验证节点对所述异常事件进行验证,得到验证结果,并根据所述验证结果,对每个用户节点对应的违规记录以及用户积分进行管理;以及The verification module 402 is used to transmit the abnormal event to the certification verification chain, so as to verify the abnormal event through the verification node, obtain the verification result, and according to the verification result, determine the violation corresponding to each user node. Records and user points management; and
恢复模块403,用于接收异常用户发送的第一积分恢复请求,并根据所述第一积分恢复请求中包含的积分恢复证明信息对每个用户节点对应的用户积分进行管理,所述积分恢复证明信息是所述管理者监管链通过所述管理者节点响应所述异常用户发送的第二积分恢复请求,确定目标违规记录,根据所述第二积分恢复请求中包含的证明信息,确定恢复所述异常用户对应的用户节点的用户积分时,返回给所述异常用户所使用的设备的。The recovery module 403 is configured to receive the first points recovery request sent by the abnormal user, and manage the user points corresponding to each user node according to the points recovery certificate information contained in the first points recovery request, and the points recovery certificate The information is that the manager chain of custody responds to the second point recovery request sent by the abnormal user through the manager node, determines the target violation record, and determines to restore the said point violation record based on the certification information contained in the second point recovery request. When the user points of the user node corresponding to the abnormal user are returned to the device used by the abnormal user.
可选地,所述验证模块402具体用于,通过所述用户监督链的所述用户节点将所述异常事件的相关材料数据传输到数据库中保存;将所述异常事件传输给证明验证链,以使所述验证节点从所述数据库中获取所述相关材料数据,并根据所述相关材料数据对所述异常事件进行验证。Optionally, the verification module 402 is specifically configured to transmit the relevant material data of the abnormal event to the database for storage through the user node of the user supervision chain; transmit the abnormal event to the certification verification chain, So that the verification node obtains the relevant material data from the database, and verifies the abnormal event according to the relevant material data.
可选地,所述验证模块402具体用于,通过所述用户监督链对所述用户监督链中包含的各用户节点的数字身份数据进行指定管理操作,所述指定管理操作包括:认证操作、创建操作、更新操作、销毁操作、查询操作。Optionally, the verification module 402 is specifically configured to perform specified management operations on the digital identity data of each user node included in the user supervision chain through the user supervision chain. The specified management operations include: authentication operations, Create operations, update operations, destroy operations, and query operations.
可选地,所述验证模块402具体用于,通过所述证明验证链根据预设的智能合约,对所述异常事件进行验证,得到验证结果,所述智能合约为预先制定的针对不同类型的异常事件对应的用户积分变更标准以及预先制定的针对不同类型的异常事件对应的验证标准;根据所述验证结果以及预设的智能合约,对每个用户节点对应的违规记录以及用户积分进行管理。Optionally, the verification module 402 is specifically configured to verify the abnormal event through the proof verification chain according to a preset smart contract to obtain verification results. The smart contract is pre-made for different types of User points change standards corresponding to abnormal events and pre-established verification standards corresponding to different types of abnormal events; based on the verification results and preset smart contracts, the violation records and user points corresponding to each user node are managed.
可选地,所述恢复模块403具体用于,通过所述管理者链获取所述用户监督链中保存的违规记录,确定所述违规记录对应的违规类别,并判断所述违规类别是否为指定类别;若是,则从预设的处罚方案中确定出与所述违规记录对应的违规类别相匹配处罚方案,根据所述处罚方案对所述违规记录对应的用户节点进行处罚。Optionally, the recovery module 403 is specifically configured to obtain the violation records saved in the user supervision chain through the manager chain, determine the violation category corresponding to the violation record, and determine whether the violation category is specified. Category; if yes, determine a penalty plan that matches the violation category corresponding to the violation record from the preset penalty plan, and punish the user node corresponding to the violation record according to the penalty plan.
本说明书还提供了一种计算机可读存储介质,该存储介质存储有计算机程序,计算机程序可用于执行上述图4提供的一种异常监管方法。This specification also provides a computer-readable storage medium that stores a computer program. The computer program can be used to execute an abnormality monitoring method provided in Figure 4 above.
本说明书还提供了图5所示的一种对应于图4的电子设备的示意结构图。如图5所述,在硬件层面,该电子设备包括处理器、内部总线、网络接口、内存以及非易失性存储器,当然还可能包括其他业务所需要的硬件。处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,以实现上述图1所述的异常监管方法。当然,除了软件实现方式之外,本说明书并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。This specification also provides a schematic structural diagram of the electronic device shown in FIG. 5 corresponding to FIG. 4 . As shown in Figure 5, at the hardware level, the electronic device includes a processor, internal bus, network interface, memory and non-volatile memory, and of course may also include other hardware required for business. The processor reads the corresponding computer program from the non-volatile memory into the memory and then runs it to implement the exception monitoring method described in Figure 1 above. Of course, in addition to software implementation, this specification does not exclude other implementation methods, such as logic devices or a combination of software and hardware, etc. That is to say, the execution subject of the following processing flow is not limited to each logical unit, and may also be hardware or logic device.
对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(ProgrammableLogic Device, PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(HardwareDescription Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(AdvancedBoolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(JavaHardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby HardwareDescription Language)等,目前最普遍使用的是VHDL(Very-High-Speed IntegratedCircuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。Improvements in a technology can be clearly distinguished as hardware improvements (for example, improvements in circuit structures such as diodes, transistors, switches, etc.) or software improvements (improvements in method processes). However, with the development of technology, many improvements in today's method processes can be regarded as direct improvements in hardware circuit structures. Designers almost always obtain the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that an improvement of a method flow cannot be implemented using hardware entity modules. For example, a Programmable Logic Device (PLD) (such as a Field Programmable Gate Array (FPGA)) is such an integrated circuit whose logic functions are determined by the user programming the device. Designers can program themselves to "integrate" a digital system on a PLD, instead of asking chip manufacturers to design and produce dedicated integrated circuit chips. Moreover, nowadays, instead of manually making integrated circuit chips, this kind of programming is mostly implemented using "logic compiler" software, which is similar to the software compiler used in program development and writing. Before compiling, The original code must also be written in a specific programming language, which is called Hardware Description Language (HDL). There is not only one type of HDL, but many types, such as ABEL (AdvancedBoolean Expression Language), AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (JavaHardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby HardwareDescription Language), etc. The most commonly used one at present is VHDL ( Very-High-Speed IntegratedCircuit Hardware Description Language) and Verilog. Those skilled in the art should also know that by simply logically programming the method flow using the above-mentioned hardware description languages and programming it into the integrated circuit, the hardware circuit that implements the logical method flow can be easily obtained.
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20 以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor. , logic gates, switches, Application Specific Integrated Circuit (ASIC), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory control logic. Those skilled in the art also know that in addition to implementing the controller in the form of pure computer-readable program code, the controller can be completely programmed with logic gates, switches, application-specific integrated circuits, programmable logic controllers and embedded logic by logically programming the method steps. Microcontroller, etc. to achieve the same function. Therefore, this controller can be considered as a hardware component, and the devices included therein for implementing various functions can also be considered as structures within the hardware component. Or even, the means for implementing various functions can be considered as structures within hardware components as well as software modules implementing the methods.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The systems, devices, modules or units described in the above embodiments may be implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer may be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above device, the functions are divided into various units and described separately. Of course, when implementing this specification, the functions of each unit can be implemented in the same or multiple software and/or hardware.
本领域内的技术人员应明白,本说明书的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will understand that embodiments of the present specification may be provided as methods, systems, or computer program products. Thus, the present description may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment that combines software and hardware aspects. Furthermore, the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本说明书是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。This specification is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the specification. It will be understood that each process and/or block in the flowchart illustrations and/or block diagrams, and combinations of processes and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine, such that the instructions executed by the processor of the computer or other programmable data processing device produce a use A device for realizing the functions specified in a process or processes in a flowchart and/or a block or blocks in a block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory that causes a computer or other programmable data processing apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction means, the instructions The device implements the functions specified in a process or processes in the flowchart and/or in a block or blocks in the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable data processing device, causing a series of operating steps to be performed on the computer or other programmable device to produce computer-implemented processing, thereby executing on the computer or other programmable device. Instructions provide steps for implementing the functions specified in a process or processes of a flowchart diagram and/or a block or blocks of a block diagram.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-permanent storage in computer-readable media, random access memory (RAM), and/or non-volatile memory in the form of read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media includes both persistent and non-volatile, removable and non-removable media that can be implemented by any method or technology for storage of information. Information may be computer-readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory. (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cassettes, tape magnetic disk storage or other magnetic storage devices or any other non-transmission medium can be used to store information that can be accessed by a computing device. As defined in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It should also be noted that the terms "comprises," "comprises," or any other variation thereof are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements not only includes those elements, but also includes Other elements are not expressly listed or are inherent to the process, method, article or equipment. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article, or device that includes the stated element.
本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present specification may be provided as methods, systems, or computer program products. Thus, the present description may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment that combines software and hardware aspects. Furthermore, the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本说明书可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。This specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. The present description may also be practiced in distributed computing environments where tasks are performed by remote processing devices connected through communications networks. In a distributed computing environment, program modules may be located in both local and remote computer storage media including storage devices.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner. The same and similar parts between the various embodiments can be referred to each other. Each embodiment focuses on its differences from other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple. For relevant details, please refer to the partial description of the method embodiment.
以上所述仅为本说明书的实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。The above descriptions are only examples of this specification and are not intended to limit this specification. Various modifications and changes may occur to this description to those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and principles of this specification shall be included in the scope of the claims of this specification.
Claims (7)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311293172.8A CN117034262B (en) | 2023-10-08 | 2023-10-08 | Abnormality supervision system and abnormality supervision method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311293172.8A CN117034262B (en) | 2023-10-08 | 2023-10-08 | Abnormality supervision system and abnormality supervision method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117034262A CN117034262A (en) | 2023-11-10 |
CN117034262B true CN117034262B (en) | 2024-02-20 |
Family
ID=88635860
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311293172.8A Active CN117034262B (en) | 2023-10-08 | 2023-10-08 | Abnormality supervision system and abnormality supervision method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117034262B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108667618A (en) * | 2018-05-10 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Data processing method, device, server and the system of block chain member management |
CN109472698A (en) * | 2018-10-30 | 2019-03-15 | 四川大学 | Blockchain-based public welfare supervision method and system |
CN110910138A (en) * | 2019-12-04 | 2020-03-24 | 中科扶云(杭州)科技有限公司 | Block chain data supervision method and device |
CN111598574A (en) * | 2020-05-12 | 2020-08-28 | 江苏大学 | Supervision method and supervision interface for intelligent service transaction |
CN112055002A (en) * | 2020-08-24 | 2020-12-08 | 杭州云象网络技术有限公司 | Cross-link network supervision method based on public governance link |
WO2021068636A1 (en) * | 2019-10-11 | 2021-04-15 | 支付宝(杭州)信息技术有限公司 | Block chain-based creation method, apparatus, device and system for verifiable claim |
CN112801831A (en) * | 2021-01-28 | 2021-05-14 | 广州市世平计算机科技有限公司 | Construction method and system for practitioner safe production integrity system based on block chain |
CN114139217A (en) * | 2021-12-08 | 2022-03-04 | 海南云端信息技术有限公司 | Credit assessment method for travel service platform |
KR20220055959A (en) * | 2020-10-27 | 2022-05-04 | 주식회사 케이티 | Abnormal transaction detecting method in the circulation of online cash assets |
CN114513703A (en) * | 2022-01-18 | 2022-05-17 | 支付宝(杭州)信息技术有限公司 | A blockchain-based trusted tipping business processing method, device and device |
CN114531305A (en) * | 2022-04-23 | 2022-05-24 | 东南大学 | Block chain cross-chain supervision method for chain management |
CN115622909A (en) * | 2022-10-11 | 2023-01-17 | 广东恒电信息科技股份有限公司 | Block chain performance abnormity detection system based on unsupervised learning |
WO2023045654A1 (en) * | 2021-09-22 | 2023-03-30 | 国网区块链科技(北京)有限公司 | Blockchain-based green power authentication method, apparatus and system |
-
2023
- 2023-10-08 CN CN202311293172.8A patent/CN117034262B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108667618A (en) * | 2018-05-10 | 2018-10-16 | 阿里巴巴集团控股有限公司 | Data processing method, device, server and the system of block chain member management |
CN109472698A (en) * | 2018-10-30 | 2019-03-15 | 四川大学 | Blockchain-based public welfare supervision method and system |
WO2021068636A1 (en) * | 2019-10-11 | 2021-04-15 | 支付宝(杭州)信息技术有限公司 | Block chain-based creation method, apparatus, device and system for verifiable claim |
CN110910138A (en) * | 2019-12-04 | 2020-03-24 | 中科扶云(杭州)科技有限公司 | Block chain data supervision method and device |
CN111598574A (en) * | 2020-05-12 | 2020-08-28 | 江苏大学 | Supervision method and supervision interface for intelligent service transaction |
CN112055002A (en) * | 2020-08-24 | 2020-12-08 | 杭州云象网络技术有限公司 | Cross-link network supervision method based on public governance link |
KR20220055959A (en) * | 2020-10-27 | 2022-05-04 | 주식회사 케이티 | Abnormal transaction detecting method in the circulation of online cash assets |
CN112801831A (en) * | 2021-01-28 | 2021-05-14 | 广州市世平计算机科技有限公司 | Construction method and system for practitioner safe production integrity system based on block chain |
WO2023045654A1 (en) * | 2021-09-22 | 2023-03-30 | 国网区块链科技(北京)有限公司 | Blockchain-based green power authentication method, apparatus and system |
CN114139217A (en) * | 2021-12-08 | 2022-03-04 | 海南云端信息技术有限公司 | Credit assessment method for travel service platform |
CN114513703A (en) * | 2022-01-18 | 2022-05-17 | 支付宝(杭州)信息技术有限公司 | A blockchain-based trusted tipping business processing method, device and device |
CN114531305A (en) * | 2022-04-23 | 2022-05-24 | 东南大学 | Block chain cross-chain supervision method for chain management |
CN115622909A (en) * | 2022-10-11 | 2023-01-17 | 广东恒电信息科技股份有限公司 | Block chain performance abnormity detection system based on unsupervised learning |
Non-Patent Citations (3)
Title |
---|
Towards trusted node selection using blockchain for crowdsourced abnormal data detection;Xin He等;《Future Generation Computer Systems》;20220831;第133卷;全文 * |
创新兽药饲料监管方式确保动物产品安全;尹丽蓉;姜鹏;卯晋恒;;中国牧业通讯(02);13-14 * |
汤兵勇.《云图.云途:云计算技术演进及应用》.机械工业出版社,2021,218-219. * |
Also Published As
Publication number | Publication date |
---|---|
CN117034262A (en) | 2023-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112241506B (en) | User behavior backtracking method, device, equipment and system | |
JP7028532B2 (en) | Methods, equipment and computer programs for managing the blockchain life cycle | |
CN108833398B (en) | A method, device and equipment for updating a blockchain smart contract | |
TWI722256B (en) | Business processing method and device | |
WO2020119264A1 (en) | Block chain-based screen recording evidence collection method and system, and electronic device | |
US10101244B2 (en) | Self-learning simulation environments | |
US20250174359A1 (en) | Machine learning models for vehicle accident potential injury detection | |
CN111371559A (en) | Material inventory data providing method, device and system based on block chain | |
CN111767270A (en) | Data migration method, device, server and storage medium | |
CN108920563B (en) | A kind of database switching method and device | |
CN116308372A (en) | Detection method and device for blockchain transaction | |
CN117034262B (en) | Abnormality supervision system and abnormality supervision method | |
CN114741736A (en) | Data processing method and device, electronic equipment and storage medium | |
CN113221176B (en) | Business processing method and device based on block chain and electronic equipment | |
CN112181599B (en) | Model training method, device and storage medium | |
CN111124591A (en) | Mirror image transmission method and device, electronic equipment and storage medium | |
WO2024244342A1 (en) | Transaction processing method in blockchain, and blockchain node | |
CN117093862A (en) | Model training method and device, electronic equipment and storage medium | |
CN113673844A (en) | Information feedback method, device and equipment | |
CN115063156A (en) | Risk processing method, device and equipment | |
CN117555586B (en) | A method for publishing, managing and scoring algorithm applications | |
CN107135191A (en) | Check that distributed service handles the method and device of integrity degree | |
CN115865365B (en) | Block chain-based account dividing processing method, device and system | |
CN112149173A (en) | Information filtering method, computing node and related equipment | |
CN114880399B (en) | Data sharing system based on account database network and account database |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |