CN108521426A - A kind of array honey jar cooperative control method based on block chain - Google Patents
A kind of array honey jar cooperative control method based on block chain Download PDFInfo
- Publication number
- CN108521426A CN108521426A CN201810329244.2A CN201810329244A CN108521426A CN 108521426 A CN108521426 A CN 108521426A CN 201810329244 A CN201810329244 A CN 201810329244A CN 108521426 A CN108521426 A CN 108521426A
- Authority
- CN
- China
- Prior art keywords
- host
- array
- honey
- honey jar
- mine
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Abstract
The present invention relates to a kind of array honey jar cooperative control method based on block chain, the method utilize the privately owned chain of ether mill platform construction, and the decentralization Collaboration thought of honey jar mainframe cluster is realized by digging mine mode.From P2P network models, the structure topological structure consistent with ether mill platform, and the two communication is realized by web3J.Each host in array, which executes, digs mine, obtains the host of book keeping operation power and can serve as honey jar service transformation task within a certain cycle time, sends information converting by encryption mechanism, other hosts receive and execute correspondent transform instruction.In addition, using block chain information can not tamper, by outside port ask access data be stored in block chain, for attacker implement attack digital evidence obtaining.This method ensure that the Collaboration of array honey jar mainframe cluster, to inveigle attacker with the true and false service of dynamic mapping, network security Initiative Defense purpose is realized.
Description
Technical field
The present invention relates to a kind of decentralization method of network active defense system, specially a kind of battle array based on block chain
Row honey jar cooperative control method realizes that array inveigles the distributed collaboration of honey jar host from the P2P network models of block chain
Running, belongs to technical field of network security.
Background technology
In network-combination yarn confrontation under the information age, defender takes various strategies and implements to protect to system, wherein
With inveigling the Honeypot Techniques of property to have more initiative compared to traditional human countermeasures, by building false loophole, service, resource
Equal decoy attacks person achievees the purpose that consumption attack, and then protects real system.However, static honey jar is easily discovered by opponent,
To make opponent avoid the trap, attack by protection system.Therefore, enhancing honey jar dynamic contributes to carrying for anti-recognition capability
It rises.
By building the honey pot system of array transformation, realizes and dynamically traps attack, while dynamic protection real service resource,
The dynamic mapping strategy of the system improves the fascination degree to attacker, makes attacker can not be also very also in false array system
Honey jar and real system are distinguished, even if at a time t0Opponent realizes the identification to a certain host in honey pot system, due to
The presence of dynamic mapping mechanism (being really false, vacation comes true), which will be in subsequent time t1As the protection of honey pot system
Property identification, i.e., attacker will be in t1Moment gets around in t0Moment is identified as the host of honey jar service, and host has been transformed at the moment
Real service, to achieve the purpose that protect real service.
It for the distributed nature of array honey pot system, need to ensure the Collaboration of internal each host, realize automation fortune
Row.It is controlled however, conventional center mechanism provides center by some particular host, determines the specific conversion scheme at a certain moment,
Remaining host is received with subordinate role and implementation center's host transformation directive.Under this centralization controlling mechanism, if in specific
Central server delay machine will cause entire array honey pot system to be paralysed, extreme loss caused to defender.
Invention content
The present invention is the destructive consequence caused by avoiding center control machine system, to ensure system normal operation, improves system
System robustness realizes the automatic of each host in array honey pot system inside using the decentralization concurrency controlling mechanism based on block chain
Change operation, under this mechanism, system overall operation state will not be influenced some server breaks down.It will be in block chain
Intelligent contract be deployed in the privately owned chain being made of multiple array hosts, coincidence array honey pot system is reached by code on chain
The automation instruction execution target of the no center control of service logic, i.e. the decentralization Collaborative Control machine of array mainframe cluster
System.
In order to achieve the above objectives, a kind of array honey jar cooperative control method based on block chain of proposition, include mainly with
Lower step:
(1) under the platform of ether mill, built using wound generation block file be made of honey jar n platform hosts inside array it is privately owned
Chain, i.e. priChain={ host0,host2,…,hostn-1};
(2) in n platform hosts, the distributed dynamic array honey pot system with Initiative Defense function is built, i.e.,
HonArray={ sys0,sys2,…,sysn-1};
(3) the intelligent contract of coincidence array honey pot system decentralization service logic is disposed on priChain;
(4) ether mill account account={ ac are created0,ac2,…,acn-1, it executes and digs mine;
(5) it is directed to and digs mine success account aciCorresponding service host hosti, by other n-1 in the privately owned chain of array honey jar
A host hostjAuthenticity verification, wherein j ≠ i are carried out to it;
(6) practical to dig the successful honey jar host host of mineiIt is realized and array honey pot system sys by ether mill platform interfacei
Information transmission;
(7) it receives and digs the array honey pot system host host that mine successfully instructsiIt is responsible for transformation clothes in the following T time section
Business specifying information distributes task;
(8) after the T periods, a new round is dug mine action and is executed, and selects different from host hostiHave book keeping operation power its
Its host hosti, wherein j ≠ i, execution one cycle, each host services transformation distribution task of implementation array honey jar.
The present invention further technical solution be further include using wound generation file build privately owned chain before, need to this
JSON type files carry out data point reuse, that is, change internal difficulty (difficulty value) parameter, by the adjustment to difficulty value,
Digging mine time interval T is set to be within a kind of zone of reasonableness, to make the transformation period of array honey pot system internal services host
In defence optimal state.
The further technical solution of the present invention is to further include when building distributive array honey pot system, establishes a kind of section
The P2P network architectures of status equity between point, the framework ensure that the equal role of whole hosts inside array, i.e., each master
Machine both serves as the communication server, also serves as communication customer end, and topological structure equity intercommunication is realized with ether mill platform.
The further technical solution of the present invention is to further include in digging the successful honey pot system host of mine to the other masters of array
Machine is sent in transformation directive, ensures that information hiding, instruction sender are implemented rsa encryption, passed using RSA asymmetric encryption mechanism
Encrypted ciphertext data, command reception side are sent to implement RSA decryption, obtain the readable cleartext information of specific transformation directive, prevent from leading to
Data are stolen utilization during letter, and service access specific time, port etc. will also be recorded by digging the successful honey pot system host of mine
Information, and being stored into privately owned chain using web3J interfaces, due in chain data can not tamper, these can be accessed
The digital evidence obtaining that record data are launched a offensive as attacker, provides the systemic defence guarantee in legal sense.
Above technical scheme can be seen that in the present invention, compared with the synergistic mechanism under conventional center centralized control, utilize
Block chain technology realizes that the decentralization operation of array honey pot system, each host realize that contract is held automatically by code on chain
Row, controls without center, and the failure of arbitrary node can not influence system normal operating condition.Meanwhile passing through the tune to difficulty value
It is whole, so that transformation duration is in a kind of optimum defense period, can effectively resist attack.In addition, ensure that communication using encryption technology
PROCESS SENSITIVE data Anti-theft.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, below in conjunction with the accompanying drawings with specific embodiment pair
The present invention is described further:
Fig. 1 is the array honey jar cooperative control method array honey jar Collaborative Control principle based on block chain of disclosure of the invention
Figure;
Fig. 2 is the array honey jar cooperative control method single instruction map method flow based on block chain of disclosure of the invention
Figure.
Specific implementation mode
To keep the purpose of the present invention, technology, advantage apparent, the present invention is made below in conjunction with the accompanying drawings further detailed, complete
Whole description.
Step (1):Under the platform of ether mill, is built using wound generation block file and be made of honey jar n platform hosts inside array
Privately owned chain, i.e. priChain={ host0,host2,…,hostn-1}。
In the step (1), privately owned chain is built using wound generation file, needs to carry out data tune to the JSON type files
It is whole, that is, change internal difficulty (difficulty value) parameter.By the adjustment to difficulty value, digging mine time interval T is made to be in one
Within kind zone of reasonableness, to make be in defence optimal state the transformation period of array honey pot system internal services host.
Step (2):In n platform hosts, the distributed dynamic array honey pot system with Initiative Defense function is built, i.e.,
HonArray={ sys0,sys2,…,sysn-1}。
In the step (2), to ensure the consistency of honey pot system and block chain distributed architecture, establish between a kind of node
The P2P network architectures of status equity, the framework ensure that the equal role of whole hosts inside array, i.e., each host were both carried on a shoulder pole
Appoint the communication server, also serve as communication customer end, topological structure equity intercommunication is realized with ether mill platform.
Step (3):The intelligent contract of coincidence array honey pot system decentralization service logic is disposed on priChain.
Intelligent contract in the step (3) need to meet the practical business demand of honey pot system, realize the chain executed automatically
Upper code.
Step (4):Create ether mill account account={ ac0,ac2,…,acn-1, it executes and digs mine.
Ether mill account in the step (4) is created according to corresponding node, and under array honey pot system, a host is dug
Mine node, which corresponds to an ether mill digging mine account, can meet using needs.
Step (5):For digging mine success account aciCorresponding service host hosti, by its in the privately owned chain of array honey jar
Its n-1 host hostjAuthenticity verification, wherein j ≠ i are carried out to it.
Step (6):It is practical to dig the successful honey jar host host of mineiIt is realized and array honey jar system by ether mill platform interface
Unite sysiInformation transmission.
In the step (6), sent in transformation directive to the other hosts of array in digging the successful honey pot system host of mine,
Ensure that information hiding, instruction sender implement rsa encryption, transmit encrypted ciphertext number using RSA asymmetric encryption mechanism
According to command reception side implements RSA decryption, obtains the readable cleartext information of specific transformation directive, prevents data in communication process stolen
Take utilization.The information such as service access specific time, port will also be recorded by digging the successful honey pot system host of mine, and utilize web3J
Interface is stored into privately owned chain, due in chain data can not tamper, can using these access record data as attack
The digital evidence obtaining that person launches a offensive provides the systemic defence guarantee in legal sense.
Step (7):It receives and digs the array honey pot system host host that mine successfully instructsiIt is responsible in the following T time section
Transformation service specifying information distributes task.
Step (8):After the T periods, a new round is dug mine action and is executed, and selects different from host hostiHave book keeping operation
Other host host of poweri, wherein j ≠ i, execution one cycle, each host services transformation distribution task of implementation array honey jar.
In the step (8), after single digs mine end cycle, into the cycle of next round, continue book keeping operation power
Host is chosen, and selects new host and serves as Collaborative Control task in the new period, carries out generation and the hair of transformation specifying information
It send.
The array honey jar cooperative control method basic step based on block chain is described in detail above.In this scheme
Under array honey jar cooperative control method, by build the P2P array honey pot system network architectures, execute digging using ether mill platform
Mine operation, obtain in period distances book keeping operation power host, execute information converting instruction generation, remaining host receive the instruction into
Row active service converts, to realize the Collaborative Control of each honey jar service host inside array.By flat to block chain ether mill
The combination of platform and honey pot system, it is intended to ensure the normal operation of array honey pot system internal services mainframe cluster.
Claims (4)
1. a kind of array honey jar cooperative control method based on block chain, it is characterised in that comprise the steps of:
(1) under the platform of ether mill, the privately owned chain being made of honey jar n platform hosts inside array is built using wound generation block file,
That is priChain={ host0,host2,…,hostn-1};
(2) in n platform hosts, the distributed dynamic array honey pot system with Initiative Defense function, i.e. honArray=are built
{sys0,sys2,…,sysn-1};
(3) the intelligent contract of coincidence array honey pot system decentralization service logic is disposed on priChain;
(4) ether mill account account={ ac are created0,ac2,…,acn-1, it executes and digs mine;
(5) it is directed to and digs mine success account aciCorresponding service host hosti, by other n-1 masters in the privately owned chain of array honey jar
Machine hostjAuthenticity verification, wherein j ≠ i are carried out to it;
(6) practical to dig the successful honey jar host host of mineiIt is realized and array honey pot system sys by ether mill platform interfaceiLetter
Breath transmission;
(7) it receives and digs the array honey pot system host host that mine successfully instructsiIt is responsible for transformation service tool in the following T time section
Body information distributes task;
(8) after the T periods, a new round is dug mine action and is executed, and selects different from host hostiHave book keeping operation power other masters
Machine hosti, wherein j ≠ i, execution one cycle, each host services transformation distribution task of implementation array honey jar.
2. a kind of array honey jar cooperative control method based on block chain according to claim 1, which is characterized in that including
It before building privately owned chain using wound generation file, needs to carry out data point reuse to the JSON type files, i.e. modification is internal
Difficulty (difficulty value) parameter, by the adjustment to difficulty value, make digging mine time interval T be in a kind of zone of reasonableness it
It is interior, to make be in defence optimal state the transformation period of array honey pot system internal services host.
3. according to claim 1 with a kind of array honey jar cooperative control method based on block chain described in claim 2,
It is characterised in that it includes when building distributive array honey pot system, a kind of P2P network racks of status equity between node are established
Structure, the framework ensure that the equal role of whole hosts inside array, i.e., each host are both served as the communication server, also served as
Communication customer end realizes topological structure equity intercommunication with ether mill platform.
4. a kind of array honey jar cooperative control method based on block chain according to claim 3, which is characterized in that including
The transformation directive sent to the other hosts of array in digging the successful honey pot system host of mine, utilizes RSA asymmetric encryption mechanism
Ensure that information hiding, instruction sender implement rsa encryption, transmits encrypted ciphertext data, command reception side implements RSA solutions
It is close, obtain the readable cleartext information of specific transformation directive, dig the successful honey pot system host of mine will also record service access it is specific when
Between, the information such as port, and stored into privately owned chain using web3J interfaces, due in chain data can not tamper, can will
These access the digital evidence obtaining that record data are launched a offensive as attacker.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810329244.2A CN108521426B (en) | 2018-04-13 | 2018-04-13 | Array honeypot cooperative control method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810329244.2A CN108521426B (en) | 2018-04-13 | 2018-04-13 | Array honeypot cooperative control method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108521426A true CN108521426A (en) | 2018-09-11 |
CN108521426B CN108521426B (en) | 2020-09-01 |
Family
ID=63432514
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810329244.2A Active CN108521426B (en) | 2018-04-13 | 2018-04-13 | Array honeypot cooperative control method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108521426B (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472162A (en) * | 2018-11-21 | 2019-03-15 | 齐乐无穷(北京)文化传媒有限公司 | A kind of block chain encipher-decipher method based on Games Software |
CN109493027A (en) * | 2018-11-19 | 2019-03-19 | 众安信息技术服务有限公司 | A kind of method and device realized across chain transactional operation |
CN110324313A (en) * | 2019-05-23 | 2019-10-11 | 平安科技(深圳)有限公司 | The recognition methods of malicious user based on honey pot system and relevant device |
CN110650128A (en) * | 2019-09-17 | 2020-01-03 | 西安电子科技大学 | System and method for detecting digital currency stealing attack of Etheng |
CN111683084A (en) * | 2020-06-05 | 2020-09-18 | 广州大学 | Intelligent contract intrusion detection method and device, terminal equipment and storage medium |
CN111800407A (en) * | 2020-06-30 | 2020-10-20 | 北京海益同展信息科技有限公司 | Network attack defense method and device, electronic equipment and storage medium |
CN111835872A (en) * | 2020-09-14 | 2020-10-27 | 江苏开博科技有限公司 | Method for realizing decentralized distributed process daemon based on ad hoc network technology |
CN111953671A (en) * | 2020-07-31 | 2020-11-17 | 中国工商银行股份有限公司 | Block chain-based dynamic honey net data processing method and system |
CN114218809A (en) * | 2021-12-29 | 2022-03-22 | 中国科学技术大学 | Automatic and formal protocol modeling method and system for Ether house intelligent contract |
CN116931844A (en) * | 2023-09-18 | 2023-10-24 | 北京云尚汇信息技术有限责任公司 | Data storage method and device based on multi-block subchain in block chain |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160275461A1 (en) * | 2015-03-20 | 2016-09-22 | Rivetz Corp. | Automated attestation of device integrity using the block chain |
CN106951307A (en) * | 2017-03-06 | 2017-07-14 | 钱德君 | A kind of intelligent contract virtual machine realization method |
CN107103098A (en) * | 2017-05-12 | 2017-08-29 | 曾建伟 | A kind of block chain net type database comprising intelligent contract and method of work |
US20170250815A1 (en) * | 2016-01-26 | 2017-08-31 | Stampery Inc. | Systems and methods for certification of data units and/or certification verification |
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN107819749A (en) * | 2017-10-26 | 2018-03-20 | 平安科技(深圳)有限公司 | Block catenary system and transaction data processing method based on ether mill |
-
2018
- 2018-04-13 CN CN201810329244.2A patent/CN108521426B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160275461A1 (en) * | 2015-03-20 | 2016-09-22 | Rivetz Corp. | Automated attestation of device integrity using the block chain |
US20170250815A1 (en) * | 2016-01-26 | 2017-08-31 | Stampery Inc. | Systems and methods for certification of data units and/or certification verification |
CN106951307A (en) * | 2017-03-06 | 2017-07-14 | 钱德君 | A kind of intelligent contract virtual machine realization method |
CN107103098A (en) * | 2017-05-12 | 2017-08-29 | 曾建伟 | A kind of block chain net type database comprising intelligent contract and method of work |
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
CN107819749A (en) * | 2017-10-26 | 2018-03-20 | 平安科技(深圳)有限公司 | Block catenary system and transaction data processing method based on ether mill |
Non-Patent Citations (5)
Title |
---|
李婕: "基于动态阵列蜜罐的协同式网络防御研究", 《万方》 * |
肖军粥,刘广祎: "分布式蜜罐系统的设计与实现", 《计算机工程与设计》 * |
蔡维德,郁莲: "基于区块链的应用系统开发方法研究", 《软件学报》 * |
谢静,谭良: "蜜罐先知型半分布式P2P Botnet的构建及检测方法", 《计算机工程与应用》 * |
陈旭: "基于区块链技术的网络DDoS联合防御方法研究", 《网络安全技术与应用》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109493027A (en) * | 2018-11-19 | 2019-03-19 | 众安信息技术服务有限公司 | A kind of method and device realized across chain transactional operation |
CN109472162B (en) * | 2018-11-21 | 2022-03-08 | 北京齐乐无穷文化科技有限公司 | Block chain encryption and decryption method based on game software |
CN109472162A (en) * | 2018-11-21 | 2019-03-15 | 齐乐无穷(北京)文化传媒有限公司 | A kind of block chain encipher-decipher method based on Games Software |
CN110324313A (en) * | 2019-05-23 | 2019-10-11 | 平安科技(深圳)有限公司 | The recognition methods of malicious user based on honey pot system and relevant device |
CN110650128A (en) * | 2019-09-17 | 2020-01-03 | 西安电子科技大学 | System and method for detecting digital currency stealing attack of Etheng |
CN110650128B (en) * | 2019-09-17 | 2020-09-11 | 西安电子科技大学 | System and method for detecting digital currency stealing attack of Etheng |
CN111683084A (en) * | 2020-06-05 | 2020-09-18 | 广州大学 | Intelligent contract intrusion detection method and device, terminal equipment and storage medium |
CN111800407A (en) * | 2020-06-30 | 2020-10-20 | 北京海益同展信息科技有限公司 | Network attack defense method and device, electronic equipment and storage medium |
CN111953671A (en) * | 2020-07-31 | 2020-11-17 | 中国工商银行股份有限公司 | Block chain-based dynamic honey net data processing method and system |
CN111953671B (en) * | 2020-07-31 | 2022-08-26 | 中国工商银行股份有限公司 | Dynamic honey net data processing method and system based on block chain |
CN111835872B (en) * | 2020-09-14 | 2020-12-01 | 江苏开博科技有限公司 | Method for realizing decentralized distributed process daemon based on ad hoc network technology |
CN111835872A (en) * | 2020-09-14 | 2020-10-27 | 江苏开博科技有限公司 | Method for realizing decentralized distributed process daemon based on ad hoc network technology |
CN114218809A (en) * | 2021-12-29 | 2022-03-22 | 中国科学技术大学 | Automatic and formal protocol modeling method and system for Ether house intelligent contract |
CN116931844A (en) * | 2023-09-18 | 2023-10-24 | 北京云尚汇信息技术有限责任公司 | Data storage method and device based on multi-block subchain in block chain |
CN116931844B (en) * | 2023-09-18 | 2024-02-23 | 北京云尚汇信息技术有限责任公司 | Data storage method and device based on multi-block subchain in block chain |
Also Published As
Publication number | Publication date |
---|---|
CN108521426B (en) | 2020-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108521426A (en) | A kind of array honey jar cooperative control method based on block chain | |
CN108052530B (en) | Decentralized CA construction method and system based on alliance chain | |
Conti et al. | A survey on security and privacy issues of bitcoin | |
CN109447603B (en) | Ocean data resource sharing method based on block chain | |
Natoli et al. | The balance attack or why forkable blockchains are ill-suited for consortium | |
Ersoy et al. | Transaction propagation on permissionless blockchains: incentive and routing mechanisms | |
CN110868439A (en) | Block chain system | |
CN105099984B (en) | The method and apparatus of account intercommunication between a kind of APP | |
CN109462587A (en) | Block chain is layered common recognition method, block chain network system and block chain node | |
CN109241087A (en) | A kind of data processing method and terminal of alliance's chain | |
CN205334561U (en) | Cloud attendance system based on multimode biological identification technique | |
KR102230471B1 (en) | Method of generating group proof for efficient transaction on blockchain network | |
TW202101350A (en) | Method and device for cross-chain transmission of authenticable message based on processing module | |
CN109104395A (en) | The method and apparatus of internet assets scanning discovery and service identification | |
CN109510713A (en) | A kind of shared motivational techniques of the flow based on block chain | |
CN113407977B (en) | Cross-chain extension method and system based on aggregated signature | |
CN109831523A (en) | The method at game server framework and game server customer in response end | |
CN101060534B (en) | A p2p network application system and network side system | |
CN109005220A (en) | The service implementation method and access gateway of internet of things of internet-of-things terminal | |
CN110891050A (en) | Full-chain atomic-level active safe routing method | |
CN110175178A (en) | A kind of method of data processing, node device and system | |
CN113098677A (en) | Ore digging method and device based on block chain, computer equipment and storage medium | |
CN114465730A (en) | Internet of things equipment mutual authentication method and device based on block chain technology | |
CN108881127A (en) | A kind of method and system of control remote access permission | |
CN108337208A (en) | Data guard method, alternative based on cloud storage and cloud storage system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |