CN108521426A - A kind of array honey jar cooperative control method based on block chain - Google Patents

A kind of array honey jar cooperative control method based on block chain Download PDF

Info

Publication number
CN108521426A
CN108521426A CN201810329244.2A CN201810329244A CN108521426A CN 108521426 A CN108521426 A CN 108521426A CN 201810329244 A CN201810329244 A CN 201810329244A CN 108521426 A CN108521426 A CN 108521426A
Authority
CN
China
Prior art keywords
host
array
honey
honey jar
mine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810329244.2A
Other languages
Chinese (zh)
Other versions
CN108521426B (en
Inventor
石乐义
李阳
刘天旭
李晓雨
刘娜
崔雯迪
刘佳
朱红强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Petroleum East China
Original Assignee
China University of Petroleum East China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Petroleum East China filed Critical China University of Petroleum East China
Priority to CN201810329244.2A priority Critical patent/CN108521426B/en
Publication of CN108521426A publication Critical patent/CN108521426A/en
Application granted granted Critical
Publication of CN108521426B publication Critical patent/CN108521426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Abstract

The present invention relates to a kind of array honey jar cooperative control method based on block chain, the method utilize the privately owned chain of ether mill platform construction, and the decentralization Collaboration thought of honey jar mainframe cluster is realized by digging mine mode.From P2P network models, the structure topological structure consistent with ether mill platform, and the two communication is realized by web3J.Each host in array, which executes, digs mine, obtains the host of book keeping operation power and can serve as honey jar service transformation task within a certain cycle time, sends information converting by encryption mechanism, other hosts receive and execute correspondent transform instruction.In addition, using block chain information can not tamper, by outside port ask access data be stored in block chain, for attacker implement attack digital evidence obtaining.This method ensure that the Collaboration of array honey jar mainframe cluster, to inveigle attacker with the true and false service of dynamic mapping, network security Initiative Defense purpose is realized.

Description

A kind of array honey jar cooperative control method based on block chain
Technical field
The present invention relates to a kind of decentralization method of network active defense system, specially a kind of battle array based on block chain Row honey jar cooperative control method realizes that array inveigles the distributed collaboration of honey jar host from the P2P network models of block chain Running, belongs to technical field of network security.
Background technology
In network-combination yarn confrontation under the information age, defender takes various strategies and implements to protect to system, wherein With inveigling the Honeypot Techniques of property to have more initiative compared to traditional human countermeasures, by building false loophole, service, resource Equal decoy attacks person achievees the purpose that consumption attack, and then protects real system.However, static honey jar is easily discovered by opponent, To make opponent avoid the trap, attack by protection system.Therefore, enhancing honey jar dynamic contributes to carrying for anti-recognition capability It rises.
By building the honey pot system of array transformation, realizes and dynamically traps attack, while dynamic protection real service resource, The dynamic mapping strategy of the system improves the fascination degree to attacker, makes attacker can not be also very also in false array system Honey jar and real system are distinguished, even if at a time t0Opponent realizes the identification to a certain host in honey pot system, due to The presence of dynamic mapping mechanism (being really false, vacation comes true), which will be in subsequent time t1As the protection of honey pot system Property identification, i.e., attacker will be in t1Moment gets around in t0Moment is identified as the host of honey jar service, and host has been transformed at the moment Real service, to achieve the purpose that protect real service.
It for the distributed nature of array honey pot system, need to ensure the Collaboration of internal each host, realize automation fortune Row.It is controlled however, conventional center mechanism provides center by some particular host, determines the specific conversion scheme at a certain moment, Remaining host is received with subordinate role and implementation center's host transformation directive.Under this centralization controlling mechanism, if in specific Central server delay machine will cause entire array honey pot system to be paralysed, extreme loss caused to defender.
Invention content
The present invention is the destructive consequence caused by avoiding center control machine system, to ensure system normal operation, improves system System robustness realizes the automatic of each host in array honey pot system inside using the decentralization concurrency controlling mechanism based on block chain Change operation, under this mechanism, system overall operation state will not be influenced some server breaks down.It will be in block chain Intelligent contract be deployed in the privately owned chain being made of multiple array hosts, coincidence array honey pot system is reached by code on chain The automation instruction execution target of the no center control of service logic, i.e. the decentralization Collaborative Control machine of array mainframe cluster System.
In order to achieve the above objectives, a kind of array honey jar cooperative control method based on block chain of proposition, include mainly with Lower step:
(1) under the platform of ether mill, built using wound generation block file be made of honey jar n platform hosts inside array it is privately owned Chain, i.e. priChain={ host0,host2,…,hostn-1};
(2) in n platform hosts, the distributed dynamic array honey pot system with Initiative Defense function is built, i.e., HonArray={ sys0,sys2,…,sysn-1};
(3) the intelligent contract of coincidence array honey pot system decentralization service logic is disposed on priChain;
(4) ether mill account account={ ac are created0,ac2,…,acn-1, it executes and digs mine;
(5) it is directed to and digs mine success account aciCorresponding service host hosti, by other n-1 in the privately owned chain of array honey jar A host hostjAuthenticity verification, wherein j ≠ i are carried out to it;
(6) practical to dig the successful honey jar host host of mineiIt is realized and array honey pot system sys by ether mill platform interfacei Information transmission;
(7) it receives and digs the array honey pot system host host that mine successfully instructsiIt is responsible for transformation clothes in the following T time section Business specifying information distributes task;
(8) after the T periods, a new round is dug mine action and is executed, and selects different from host hostiHave book keeping operation power its Its host hosti, wherein j ≠ i, execution one cycle, each host services transformation distribution task of implementation array honey jar.
The present invention further technical solution be further include using wound generation file build privately owned chain before, need to this JSON type files carry out data point reuse, that is, change internal difficulty (difficulty value) parameter, by the adjustment to difficulty value, Digging mine time interval T is set to be within a kind of zone of reasonableness, to make the transformation period of array honey pot system internal services host In defence optimal state.
The further technical solution of the present invention is to further include when building distributive array honey pot system, establishes a kind of section The P2P network architectures of status equity between point, the framework ensure that the equal role of whole hosts inside array, i.e., each master Machine both serves as the communication server, also serves as communication customer end, and topological structure equity intercommunication is realized with ether mill platform.
The further technical solution of the present invention is to further include in digging the successful honey pot system host of mine to the other masters of array Machine is sent in transformation directive, ensures that information hiding, instruction sender are implemented rsa encryption, passed using RSA asymmetric encryption mechanism Encrypted ciphertext data, command reception side are sent to implement RSA decryption, obtain the readable cleartext information of specific transformation directive, prevent from leading to Data are stolen utilization during letter, and service access specific time, port etc. will also be recorded by digging the successful honey pot system host of mine Information, and being stored into privately owned chain using web3J interfaces, due in chain data can not tamper, these can be accessed The digital evidence obtaining that record data are launched a offensive as attacker, provides the systemic defence guarantee in legal sense.
Above technical scheme can be seen that in the present invention, compared with the synergistic mechanism under conventional center centralized control, utilize Block chain technology realizes that the decentralization operation of array honey pot system, each host realize that contract is held automatically by code on chain Row, controls without center, and the failure of arbitrary node can not influence system normal operating condition.Meanwhile passing through the tune to difficulty value It is whole, so that transformation duration is in a kind of optimum defense period, can effectively resist attack.In addition, ensure that communication using encryption technology PROCESS SENSITIVE data Anti-theft.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, below in conjunction with the accompanying drawings with specific embodiment pair The present invention is described further:
Fig. 1 is the array honey jar cooperative control method array honey jar Collaborative Control principle based on block chain of disclosure of the invention Figure;
Fig. 2 is the array honey jar cooperative control method single instruction map method flow based on block chain of disclosure of the invention Figure.
Specific implementation mode
To keep the purpose of the present invention, technology, advantage apparent, the present invention is made below in conjunction with the accompanying drawings further detailed, complete Whole description.
Step (1):Under the platform of ether mill, is built using wound generation block file and be made of honey jar n platform hosts inside array Privately owned chain, i.e. priChain={ host0,host2,…,hostn-1}。
In the step (1), privately owned chain is built using wound generation file, needs to carry out data tune to the JSON type files It is whole, that is, change internal difficulty (difficulty value) parameter.By the adjustment to difficulty value, digging mine time interval T is made to be in one Within kind zone of reasonableness, to make be in defence optimal state the transformation period of array honey pot system internal services host.
Step (2):In n platform hosts, the distributed dynamic array honey pot system with Initiative Defense function is built, i.e., HonArray={ sys0,sys2,…,sysn-1}。
In the step (2), to ensure the consistency of honey pot system and block chain distributed architecture, establish between a kind of node The P2P network architectures of status equity, the framework ensure that the equal role of whole hosts inside array, i.e., each host were both carried on a shoulder pole Appoint the communication server, also serve as communication customer end, topological structure equity intercommunication is realized with ether mill platform.
Step (3):The intelligent contract of coincidence array honey pot system decentralization service logic is disposed on priChain.
Intelligent contract in the step (3) need to meet the practical business demand of honey pot system, realize the chain executed automatically Upper code.
Step (4):Create ether mill account account={ ac0,ac2,…,acn-1, it executes and digs mine.
Ether mill account in the step (4) is created according to corresponding node, and under array honey pot system, a host is dug Mine node, which corresponds to an ether mill digging mine account, can meet using needs.
Step (5):For digging mine success account aciCorresponding service host hosti, by its in the privately owned chain of array honey jar Its n-1 host hostjAuthenticity verification, wherein j ≠ i are carried out to it.
Step (6):It is practical to dig the successful honey jar host host of mineiIt is realized and array honey jar system by ether mill platform interface Unite sysiInformation transmission.
In the step (6), sent in transformation directive to the other hosts of array in digging the successful honey pot system host of mine, Ensure that information hiding, instruction sender implement rsa encryption, transmit encrypted ciphertext number using RSA asymmetric encryption mechanism According to command reception side implements RSA decryption, obtains the readable cleartext information of specific transformation directive, prevents data in communication process stolen Take utilization.The information such as service access specific time, port will also be recorded by digging the successful honey pot system host of mine, and utilize web3J Interface is stored into privately owned chain, due in chain data can not tamper, can using these access record data as attack The digital evidence obtaining that person launches a offensive provides the systemic defence guarantee in legal sense.
Step (7):It receives and digs the array honey pot system host host that mine successfully instructsiIt is responsible in the following T time section Transformation service specifying information distributes task.
Step (8):After the T periods, a new round is dug mine action and is executed, and selects different from host hostiHave book keeping operation Other host host of poweri, wherein j ≠ i, execution one cycle, each host services transformation distribution task of implementation array honey jar.
In the step (8), after single digs mine end cycle, into the cycle of next round, continue book keeping operation power Host is chosen, and selects new host and serves as Collaborative Control task in the new period, carries out generation and the hair of transformation specifying information It send.
The array honey jar cooperative control method basic step based on block chain is described in detail above.In this scheme Under array honey jar cooperative control method, by build the P2P array honey pot system network architectures, execute digging using ether mill platform Mine operation, obtain in period distances book keeping operation power host, execute information converting instruction generation, remaining host receive the instruction into Row active service converts, to realize the Collaborative Control of each honey jar service host inside array.By flat to block chain ether mill The combination of platform and honey pot system, it is intended to ensure the normal operation of array honey pot system internal services mainframe cluster.

Claims (4)

1. a kind of array honey jar cooperative control method based on block chain, it is characterised in that comprise the steps of:
(1) under the platform of ether mill, the privately owned chain being made of honey jar n platform hosts inside array is built using wound generation block file, That is priChain={ host0,host2,…,hostn-1};
(2) in n platform hosts, the distributed dynamic array honey pot system with Initiative Defense function, i.e. honArray=are built {sys0,sys2,…,sysn-1};
(3) the intelligent contract of coincidence array honey pot system decentralization service logic is disposed on priChain;
(4) ether mill account account={ ac are created0,ac2,…,acn-1, it executes and digs mine;
(5) it is directed to and digs mine success account aciCorresponding service host hosti, by other n-1 masters in the privately owned chain of array honey jar Machine hostjAuthenticity verification, wherein j ≠ i are carried out to it;
(6) practical to dig the successful honey jar host host of mineiIt is realized and array honey pot system sys by ether mill platform interfaceiLetter Breath transmission;
(7) it receives and digs the array honey pot system host host that mine successfully instructsiIt is responsible for transformation service tool in the following T time section Body information distributes task;
(8) after the T periods, a new round is dug mine action and is executed, and selects different from host hostiHave book keeping operation power other masters Machine hosti, wherein j ≠ i, execution one cycle, each host services transformation distribution task of implementation array honey jar.
2. a kind of array honey jar cooperative control method based on block chain according to claim 1, which is characterized in that including It before building privately owned chain using wound generation file, needs to carry out data point reuse to the JSON type files, i.e. modification is internal Difficulty (difficulty value) parameter, by the adjustment to difficulty value, make digging mine time interval T be in a kind of zone of reasonableness it It is interior, to make be in defence optimal state the transformation period of array honey pot system internal services host.
3. according to claim 1 with a kind of array honey jar cooperative control method based on block chain described in claim 2, It is characterised in that it includes when building distributive array honey pot system, a kind of P2P network racks of status equity between node are established Structure, the framework ensure that the equal role of whole hosts inside array, i.e., each host are both served as the communication server, also served as Communication customer end realizes topological structure equity intercommunication with ether mill platform.
4. a kind of array honey jar cooperative control method based on block chain according to claim 3, which is characterized in that including The transformation directive sent to the other hosts of array in digging the successful honey pot system host of mine, utilizes RSA asymmetric encryption mechanism Ensure that information hiding, instruction sender implement rsa encryption, transmits encrypted ciphertext data, command reception side implements RSA solutions It is close, obtain the readable cleartext information of specific transformation directive, dig the successful honey pot system host of mine will also record service access it is specific when Between, the information such as port, and stored into privately owned chain using web3J interfaces, due in chain data can not tamper, can will These access the digital evidence obtaining that record data are launched a offensive as attacker.
CN201810329244.2A 2018-04-13 2018-04-13 Array honeypot cooperative control method based on block chain Active CN108521426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810329244.2A CN108521426B (en) 2018-04-13 2018-04-13 Array honeypot cooperative control method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810329244.2A CN108521426B (en) 2018-04-13 2018-04-13 Array honeypot cooperative control method based on block chain

Publications (2)

Publication Number Publication Date
CN108521426A true CN108521426A (en) 2018-09-11
CN108521426B CN108521426B (en) 2020-09-01

Family

ID=63432514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810329244.2A Active CN108521426B (en) 2018-04-13 2018-04-13 Array honeypot cooperative control method based on block chain

Country Status (1)

Country Link
CN (1) CN108521426B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472162A (en) * 2018-11-21 2019-03-15 齐乐无穷(北京)文化传媒有限公司 A kind of block chain encipher-decipher method based on Games Software
CN109493027A (en) * 2018-11-19 2019-03-19 众安信息技术服务有限公司 A kind of method and device realized across chain transactional operation
CN110324313A (en) * 2019-05-23 2019-10-11 平安科技(深圳)有限公司 The recognition methods of malicious user based on honey pot system and relevant device
CN110650128A (en) * 2019-09-17 2020-01-03 西安电子科技大学 System and method for detecting digital currency stealing attack of Etheng
CN111683084A (en) * 2020-06-05 2020-09-18 广州大学 Intelligent contract intrusion detection method and device, terminal equipment and storage medium
CN111800407A (en) * 2020-06-30 2020-10-20 北京海益同展信息科技有限公司 Network attack defense method and device, electronic equipment and storage medium
CN111835872A (en) * 2020-09-14 2020-10-27 江苏开博科技有限公司 Method for realizing decentralized distributed process daemon based on ad hoc network technology
CN111953671A (en) * 2020-07-31 2020-11-17 中国工商银行股份有限公司 Block chain-based dynamic honey net data processing method and system
CN114218809A (en) * 2021-12-29 2022-03-22 中国科学技术大学 Automatic and formal protocol modeling method and system for Ether house intelligent contract
CN116931844A (en) * 2023-09-18 2023-10-24 北京云尚汇信息技术有限责任公司 Data storage method and device based on multi-block subchain in block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160275461A1 (en) * 2015-03-20 2016-09-22 Rivetz Corp. Automated attestation of device integrity using the block chain
CN106951307A (en) * 2017-03-06 2017-07-14 钱德君 A kind of intelligent contract virtual machine realization method
CN107103098A (en) * 2017-05-12 2017-08-29 曾建伟 A kind of block chain net type database comprising intelligent contract and method of work
US20170250815A1 (en) * 2016-01-26 2017-08-31 Stampery Inc. Systems and methods for certification of data units and/or certification verification
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN107819749A (en) * 2017-10-26 2018-03-20 平安科技(深圳)有限公司 Block catenary system and transaction data processing method based on ether mill

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160275461A1 (en) * 2015-03-20 2016-09-22 Rivetz Corp. Automated attestation of device integrity using the block chain
US20170250815A1 (en) * 2016-01-26 2017-08-31 Stampery Inc. Systems and methods for certification of data units and/or certification verification
CN106951307A (en) * 2017-03-06 2017-07-14 钱德君 A kind of intelligent contract virtual machine realization method
CN107103098A (en) * 2017-05-12 2017-08-29 曾建伟 A kind of block chain net type database comprising intelligent contract and method of work
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN107819749A (en) * 2017-10-26 2018-03-20 平安科技(深圳)有限公司 Block catenary system and transaction data processing method based on ether mill

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
李婕: "基于动态阵列蜜罐的协同式网络防御研究", 《万方》 *
肖军粥,刘广祎: "分布式蜜罐系统的设计与实现", 《计算机工程与设计》 *
蔡维德,郁莲: "基于区块链的应用系统开发方法研究", 《软件学报》 *
谢静,谭良: "蜜罐先知型半分布式P2P Botnet的构建及检测方法", 《计算机工程与应用》 *
陈旭: "基于区块链技术的网络DDoS联合防御方法研究", 《网络安全技术与应用》 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493027A (en) * 2018-11-19 2019-03-19 众安信息技术服务有限公司 A kind of method and device realized across chain transactional operation
CN109472162B (en) * 2018-11-21 2022-03-08 北京齐乐无穷文化科技有限公司 Block chain encryption and decryption method based on game software
CN109472162A (en) * 2018-11-21 2019-03-15 齐乐无穷(北京)文化传媒有限公司 A kind of block chain encipher-decipher method based on Games Software
CN110324313A (en) * 2019-05-23 2019-10-11 平安科技(深圳)有限公司 The recognition methods of malicious user based on honey pot system and relevant device
CN110650128A (en) * 2019-09-17 2020-01-03 西安电子科技大学 System and method for detecting digital currency stealing attack of Etheng
CN110650128B (en) * 2019-09-17 2020-09-11 西安电子科技大学 System and method for detecting digital currency stealing attack of Etheng
CN111683084A (en) * 2020-06-05 2020-09-18 广州大学 Intelligent contract intrusion detection method and device, terminal equipment and storage medium
CN111800407A (en) * 2020-06-30 2020-10-20 北京海益同展信息科技有限公司 Network attack defense method and device, electronic equipment and storage medium
CN111953671A (en) * 2020-07-31 2020-11-17 中国工商银行股份有限公司 Block chain-based dynamic honey net data processing method and system
CN111953671B (en) * 2020-07-31 2022-08-26 中国工商银行股份有限公司 Dynamic honey net data processing method and system based on block chain
CN111835872B (en) * 2020-09-14 2020-12-01 江苏开博科技有限公司 Method for realizing decentralized distributed process daemon based on ad hoc network technology
CN111835872A (en) * 2020-09-14 2020-10-27 江苏开博科技有限公司 Method for realizing decentralized distributed process daemon based on ad hoc network technology
CN114218809A (en) * 2021-12-29 2022-03-22 中国科学技术大学 Automatic and formal protocol modeling method and system for Ether house intelligent contract
CN116931844A (en) * 2023-09-18 2023-10-24 北京云尚汇信息技术有限责任公司 Data storage method and device based on multi-block subchain in block chain
CN116931844B (en) * 2023-09-18 2024-02-23 北京云尚汇信息技术有限责任公司 Data storage method and device based on multi-block subchain in block chain

Also Published As

Publication number Publication date
CN108521426B (en) 2020-09-01

Similar Documents

Publication Publication Date Title
CN108521426A (en) A kind of array honey jar cooperative control method based on block chain
CN108052530B (en) Decentralized CA construction method and system based on alliance chain
Conti et al. A survey on security and privacy issues of bitcoin
CN109447603B (en) Ocean data resource sharing method based on block chain
Natoli et al. The balance attack or why forkable blockchains are ill-suited for consortium
Ersoy et al. Transaction propagation on permissionless blockchains: incentive and routing mechanisms
CN110868439A (en) Block chain system
CN105099984B (en) The method and apparatus of account intercommunication between a kind of APP
CN109462587A (en) Block chain is layered common recognition method, block chain network system and block chain node
CN109241087A (en) A kind of data processing method and terminal of alliance's chain
CN205334561U (en) Cloud attendance system based on multimode biological identification technique
KR102230471B1 (en) Method of generating group proof for efficient transaction on blockchain network
TW202101350A (en) Method and device for cross-chain transmission of authenticable message based on processing module
CN109104395A (en) The method and apparatus of internet assets scanning discovery and service identification
CN109510713A (en) A kind of shared motivational techniques of the flow based on block chain
CN113407977B (en) Cross-chain extension method and system based on aggregated signature
CN109831523A (en) The method at game server framework and game server customer in response end
CN101060534B (en) A p2p network application system and network side system
CN109005220A (en) The service implementation method and access gateway of internet of things of internet-of-things terminal
CN110891050A (en) Full-chain atomic-level active safe routing method
CN110175178A (en) A kind of method of data processing, node device and system
CN113098677A (en) Ore digging method and device based on block chain, computer equipment and storage medium
CN114465730A (en) Internet of things equipment mutual authentication method and device based on block chain technology
CN108881127A (en) A kind of method and system of control remote access permission
CN108337208A (en) Data guard method, alternative based on cloud storage and cloud storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant