CN108921696A - Intelligent contract based on block chain calls and the method for contract transaction verification - Google Patents
Intelligent contract based on block chain calls and the method for contract transaction verification Download PDFInfo
- Publication number
- CN108921696A CN108921696A CN201810667205.3A CN201810667205A CN108921696A CN 108921696 A CN108921696 A CN 108921696A CN 201810667205 A CN201810667205 A CN 201810667205A CN 108921696 A CN108921696 A CN 108921696A
- Authority
- CN
- China
- Prior art keywords
- contract
- network
- intelligent contract
- block chain
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Abstract
The invention discloses based on block chain intelligent contract call and contract transaction verification method, the method includes:Intelligent contract generation method, intelligent contract storage method, intelligent contract call method, intelligent contract transaction verification method solve the poor technical problem of the existing intelligent contract storage mode storage security based on block chain, the intelligent contract storage security realized in this method is higher, and calls and the higher technical effect of transaction verification security.
Description
Technical field
The present invention relates to block chain application fields, and in particular, to the intelligent contract based on block chain calls and contract is handed over
The method easily verified.
Background technique
Block chain is the novel of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm
Application model.So-called common recognition mechanism is that the mathematics calculation established between different nodes and trust, obtain equity is realized in block catenary system
Method.
Block chain (Blockchain) is a key concept of bit coin, it is substantially the data of a decentralization
Library, while the Floor layer Technology as bit coin.Block chain is a string using the associated data block generated of cryptography method, each
The information of a bit coin network trading is contained in a data block, under verifying the validity (anti-fake) of its information and generating
One block.
Intelligent contract (English:Smart contract) it is that one kind is intended to that conjunction is propagated, verified or executed in a manner of information-based
Same computer protocol.The permission of intelligent contract carries out credible transaction in no third-party situation, these transaction it is traceable and
It is irreversible.
Conventionally, as the storage advantage of block chain, intelligent contract are stored in block chain, but existing skill
Intelligent contract is to be disclosed to be stored on block chain in art, other people are checked, then discovery loophole is attacked, because
This, the poor problem of the existing intelligent contract storage mode storage security based on block chain.
Summary of the invention
The present invention provides the methods of intelligent contract calling and contract transaction verification based on block chain, solve existing
The poor technical problem of intelligent contract storage mode storage security based on block chain, realizes the intelligent contract in this method
Storage security is higher, and calls and the higher technical effect of transaction verification security.
For achieving the above object, this application provides intelligent contract calling and contract transaction verification based on block chain
Method, the method includes:
Intelligent contract generation method:Network dealing record is obtained from network dealing platform, network deal contract, network are bought
Protocol data is sold, extracts key data from network dealing record, network deal contract, network Agreement for Sale and Purchase;Based on pass
Key digital data generates the first serial number data and label data;Random data is generated based on random number generator;By the first serial number number
The first encryption data is generated according to the first predetermined encryption algorithm according to random data;By network buy and sell record, network deal contract,
Network Agreement for Sale and Purchase data are encrypted, and generate encrypted network dealing record, network deal contract, network dealing association
Discuss data, wherein encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data clear crytpographic key be the
One encryption data;Label data and encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are carried out
Matching;Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data and is stored in block chain database
In, using label data as the critical data searched in block chain database;
Intelligent contract storage method:Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data
It is stored in block chain database, and returns to memory block address and memory block node, the memory block address based on return
Intelligent contract, which is generated, according to the second Encryption Algorithm with memory block node extracts password;
Intelligent contract call method:Search key is inputted, is searched in block chain database based on search key
Rope matches search key with label data, if successful match, inputs intelligent contract and calls password, by intelligent conjunction
It about calls password to extract password with intelligent contract to be matched, if successful match, calls the corresponding encrypted network of acquisition
Buy and sell record, network deal contract, network Agreement for Sale and Purchase data;
Intelligent contract transaction verification method:Encrypted network dealing record, network deal contract, net are obtained based on calling
Network Agreement for Sale and Purchase data input transaction verification clear crytpographic key, transaction verification clear crytpographic key are matched with the first encryption data,
Encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are decrypted if successful match, are obtained
Network after decryption buys and sells record, network deal contract, network Agreement for Sale and Purchase data, recorded based on the network dealing after decryption,
Network deal contract, network Agreement for Sale and Purchase data carry out intelligent contract transaction verification.
Wherein, the principle of the present invention is:The intelligent contract of the application and traditional intelligent contract storage mode of getting along well is the same,
The application first encrypts intelligent contract, is then stored, so that the user in block chain is merely able to see intelligent conjunction
Storage label about still can't see content, and intelligent contract needs corresponding extraction password when calling, in decrypted transaction
Corresponding special password is needed when verifying, so that entire intelligence contract safety in block chain is higher.
Wherein, the intelligent contract in the application is storing constantly, has carried out special generation to intelligent contract first and has designed,
Key data is extracted from network dealing record, network deal contract, network Agreement for Sale and Purchase;It is generated based on key data
First serial number data and label data, that is, the first serial number data and label data generated are close with intelligent contract content itself
Connection;Random data is generated based on random number generator;First serial number data and random data are calculated according to the first predetermined encryption
Method generates the first encryption data, by distinctive first serial number data, and the random data being randomly generated, along with encryption is calculated
Method generates the first encryption data, so that first encryption data is cracked very difficult, further improves safety;It will mark
Label data are matched with encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data;It will be encrypted
Network dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, using label data as
The critical data searched in block chain database quickly can search out needs from block chain by adding label data
Data.
Further, the application has also carried out corresponding special designing to intelligent contract storage method:By encrypted network
Dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, and return to memory block address
With memory block node, memory block address and memory block node based on return generate intelligence according to the second Encryption Algorithm and close
About extract password;Intelligent contract is generated according to the second Encryption Algorithm by the storage area block address and memory block node of return to extract
Password, i.e. extraction password is closely related with memory block address and memory block node, and is also encrypted by Encryption Algorithm, peace
Full property is higher, and is bonded with storage location precision.
Further, intelligent contract call method has also been devised in the application:Search key is inputted, search key is based on
It is scanned in block chain database, search key is matched with label data, if successful match, inputs intelligence
Contract calls password, calls password to extract password with intelligent contract intelligent contract and matches, if successful match, calling is obtained
It obtains encrypted network accordingly and buys and sells record, network deal contract, network Agreement for Sale and Purchase data;Need to extract when calling
Password is just capable of calling, and any with that can call difference per family on traditional block chain, and safety is higher.
Further, intelligent contract transaction verification method has also been devised in the application:Encrypted network is obtained based on calling
Record, network deal contract, network Agreement for Sale and Purchase data are bought and sold, transaction verification clear crytpographic key is inputted, transaction verification is decrypted close
Code is matched with the first encryption data, to encrypted network dealing record, network deal contract, network if successful match
Agreement for Sale and Purchase data are decrypted, and the network after being decrypted buys and sells record, network deal contract, network Agreement for Sale and Purchase data,
Intelligent contract transaction verification is carried out based on the network dealing record after decryption, network deal contract, network Agreement for Sale and Purchase data.It protects
The safety of transaction verification is hindered.
Further, key data includes:Buy and sell type, the type of merchandise, transaction amount, exchange hour, both parties
Title, dealing network platform title, transaction odd numbers.
Further, the first serial number data and label data are generated based on key data, specifically included:
To buy and sell the corresponding English classification of type, the corresponding number of the type of merchandise, the corresponding Arabic numerals of transaction amount,
Exchange hour it is corresponding number, both parties' title it is corresponding Chinese or English, dealing network platform title it is corresponding Chinese or
English, the corresponding Arabic numerals of transaction odd numbers are ranked up according to sequence from left to right, the data after generating sequence;It will row
Punctuation mark removal in data after sequence retains English, number and Chinese and generates treated sorting data;Based on first turn
Rule is changed, sorting data is converted from left to right by treated, the first serial number data of data combination producing after conversion;It will
Both parties' title, dealing network platform title are combined generation label data;First transformation rule is:When encountering English
When, corresponding number is converted to first, and conversion regime is that English A-Z respectively corresponds 1-26, and the number after conversion is preset
Operation, the number after obtaining default operation;When encountering Chinese, according to the stroke number of Chinese, Chinese is converted into corresponding number
Number after conversion is carried out default operation, the number after obtaining default operation by word;When encountering number, number is carried out pre-
Number if operation, after obtaining default operation;The number obtained after operation is subjected to permutation and combination from left to right and generates the first sequence
Number;Buying and selling type includes:The retail of A class and B class are wholesale;The type of merchandise is that network buys and sells platform to the number of commodity.Pass through
Above-mentioned special cipher mode is related to network business activities first, and proper with actual transaction content, passes through above-mentioned encryption
Mode ensures multi-enciphering, so that cracking, difficulty is big, and the both sides only to participate in business can decrypt, and safety is higher,
The safety of data is ensured using block chain.
Further, it calls password to extract password with intelligent contract intelligent contract to match, if successful match, adopt
It calls with the following methods and obtains corresponding encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data:
Data server in block chain is numbered, the position coordinates of the data server in block chain are obtained, it will
The position coordinates of data server in block chain are matched with number, establish the position coordinates of the data server in block chain
Map;
When receiving intelligent contract call instruction, intelligent contract call instruction is analyzed, intelligent contract is obtained and calls
Instruct the position coordinates of sender, the data service based on the position coordinates of intelligent contract call instruction sender, in block chain
It is labeled in the position coordinates map of device;
Position based on intelligent contract call instruction sender in position coordinates map, from away from a nearest area
Corresponding encrypted network is called to buy and sell record, network deal contract, network Agreement for Sale and Purchase in data server in block chain
Data and number, block chain server record the process of calling, are marked, are stored.
It calls data that quick calling may be implemented through the above way, the efficiency of calling is ensured, so that path is most short, and energy
The storage condition of data is enough checked by the position coordinates map of data server.
Further, intelligent contract call instruction sender calls corresponding intelligent contract to be decrypted, block chain service
Device records the result of decryption, and when decrypting failure result greater than 3 times, block chain server will prevent the intelligence contract tune
With instruction, sender continues to call the intelligence contract.It can be avoided malice calling by above-mentioned design to be decrypted, the frequency of failure
Malicious operation is then considered greater than 3 times, then shields its operation, ensures the safety of data on block chain.
Further, intelligent contract transaction verification instruction sender sends corresponding intelligent contract transaction verification instruction and carries out
Verifying, block chain server record transaction verification clear crytpographic key and the matching result of the first encryption data, when verifying is lost
When losing result greater than 3 times, block chain server will prevent intelligence contract transaction verification instruction from continuing to verify the intelligence contract.It is logical
Crossing above-mentioned design can be avoided malice seriously, and authentication failed number, which is greater than 3 times, is then considered malicious operation, then shields its operation,
Ensure the safety of data on block chain.
Further, the intelligent contract calls and the method for contract transaction verification further includes:
Record the calling record of intelligent contract;After some intelligent contract is called, then by intelligent contract and the called side
Connection is established, and carries out Secondary ordination when intelligent contract calls for the intelligent contract contacted is established with other called sides,
When some intelligent contract called side, which carries out intelligent contract, to be called, then first search establishes the intelligent contract contacted with it, and will
The intelligent contract contacted is established with other called sides and carries out Secondary ordination, i.e., search is contacted with intelligent contract called side foundation first
Intelligent contract, then search for and do not establish the intelligent contract contacted, final search and other intelligence with any intelligent contract called side
Energy contract called side establishes the intelligent contract of connection.By the way that called side to be associated with intelligent contract foundation, calling can be improved
Efficiency and accuracy rate avoid a large amount of operation of server from generating, huge data are store on block chain, if all to all data
Then speed is slower for traversal, and serious load can be caused to server, efficiency is improved through the above way, when reducing operation
Between, ensure the optimization processing of block chain data.
Further, the intelligent contract calls and the method for contract transaction verification further includes intelligent contract means of defence,
Including:
When the intelligent contract storage server in block chain is by attacking, the first protection instruction is generated, and first is protected
Finger shield order is propagated in block chain;
When the intelligent contract storage server in any one block chain receives the first protection instruction, then opening protection function is protected
Revetment;
When the intelligent contract storage server in block chain is by attacking, attacker is divided by attack server
Analysis obtains the attack address of attacker, attack pattern, is attacked position, attack content;Attack address based on attacker is attacked
Mode is hit, Defense Countermeasure is generated by attack position, attack content, and will be propagated in Defense Countermeasure block chain;
When the intelligent contract storage server in any one block chain receives Defense Countermeasure, then Defense Countermeasure carries out phase
The defence answered.
Since block chain is the huge network system, it comprises a large amount of server, each server, which exists, is attacked
The risk hit will lead to virus or wooden horse propagated in block chain, large area is caused to damage after a server is attacked,
Although data can be restored from other servers, recovery needs time and efforts, and therefore, the application devises block chain
Guard method of the server when being attacked generates first when the intelligent contract storage server in block chain is by attacking
Protection instruction, and the first protection instruction is propagated in block chain;When the intelligent contract storage service in any one block chain
Then opening protection function protects wall when device receives the first protection instruction, avoids being propagated further for virus, actively improves defence rank;When
When intelligent contract storage server in block chain is by attacking, attacker is analyzed by attack server, is attacked
Position, attack content, are attacked at attack pattern in the attack address of person;Attack address, attack pattern based on attacker are attacked
Hit position, attack content generates Defense Countermeasure, and will propagate in Defense Countermeasure block chain;Intelligence in any one block chain
When contract storage server receives Defense Countermeasure, then Defense Countermeasure is defendd accordingly, i.e., carries out analysis acquisition to attacker
Defense Countermeasure propagates Defense Countermeasure in block chain network, carries out specific aim defence.
Further, the intelligent contract calls and the method for contract transaction verification further includes that newly-increased block chain server is tested
Card method, including:
Newly-increased block chain server is detected, address, the capacity, storage mode of newly-increased block chain server are obtained;
Newly-increased block chain server is detected, including the detection of safety detection, network performance, storage capacity detection, place
The detection of reason ability, grades to newly-increased block chain server based on testing result;
When newly-increased block chain server passes through detection, then by other servers in newly-increased block chain server and block chain
Connection is established, data are preferentially stored based on rating result.
The quantity of block chain server be it is flexible and changeable, may there is new server to be added at any time, but right in tradition
There is no corresponding control modes for the server being newly added, and viral wooden horse is caused to be easy tradition in a network or certain services
Device ability is limited, and there is no great effect or contributions, therefore, in order to improve safety and the processing energy of entire block chain
Power has carried out special designing to the mode of newly-increased server, has ensured newly-increased server in the side such as safety and processing capacity
Face is more excellent, to improve the ability and safety of block chain on the whole.
Further, the intelligent contract calls and the method for contract transaction verification further includes intelligent contract correlating method,
Including:
When block chain server is in the new intelligent contract of storage, by the new corresponding label data of intelligent contract in block
Matching is associated in chain Servers-all, the similarity degree based on label data matches multiple intelligence that are mutually related and closes
About, when intelligent contract calls, multiple intelligent contracts that will be mutually related call out jointly.Improve the calling effect of intelligent contract
Rate avoids repetitive operation.
One or more technical solution provided by the present application, has at least the following technical effects or advantages:
It solves the poor technical problem of the existing intelligent contract storage mode storage security based on block chain, realizes
Intelligent contract storage security in this method is higher, and calls and transaction verification security higher technical effect.
Detailed description of the invention
Attached drawing described herein is used to provide to further understand the embodiment of the present invention, constitutes one of the application
Point, do not constitute the restriction to the embodiment of the present invention;
Fig. 1 is the method schematic diagram of the intelligent contract calling and contract transaction verification in the application based on block chain.
Specific embodiment
The present invention provides the methods of intelligent contract calling and contract transaction verification based on block chain, solve existing
The poor technical problem of intelligent contract storage mode storage security based on block chain, realizes the intelligent contract in this method
Storage security is higher, and calls and the higher technical effect of transaction verification security.
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real
Applying mode, the present invention is further described in detail.It should be noted that in the case where not conflicting mutually, the application's
Feature in embodiment and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also
Implemented with being different from the other modes being described herein in range using other, therefore, protection scope of the present invention is not by under
The limitation of specific embodiment disclosed in face.
Referring to FIG. 1, this application provides the method for intelligent contract calling and contract transaction verification based on block chain, institute
The method of stating includes:
Intelligent contract generation method:Network dealing record is obtained from network dealing platform, network deal contract, network are bought
Protocol data is sold, extracts key data from network dealing record, network deal contract, network Agreement for Sale and Purchase;Based on pass
Key digital data generates the first serial number data and label data;Random data is generated based on random number generator;By the first serial number number
The first encryption data is generated according to the first predetermined encryption algorithm according to random data;By network buy and sell record, network deal contract,
Network Agreement for Sale and Purchase data are encrypted, and generate encrypted network dealing record, network deal contract, network dealing association
Discuss data, wherein encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data clear crytpographic key be the
One encryption data;Label data and encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are carried out
Matching;Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data and is stored in block chain database
In, using label data as the critical data searched in block chain database;
Intelligent contract storage method:Encrypted network is bought and sold into record, network deal contract, network Agreement for Sale and Purchase data
It is stored in block chain database, and returns to memory block address and memory block node, the memory block address based on return
Intelligent contract, which is generated, according to the second Encryption Algorithm with memory block node extracts password;
Intelligent contract call method:Search key is inputted, is searched in block chain database based on search key
Rope matches search key with label data, if successful match, inputs intelligent contract and calls password, by intelligent conjunction
It about calls password to extract password with intelligent contract to be matched, if successful match, calls the corresponding encrypted network of acquisition
Buy and sell record, network deal contract, network Agreement for Sale and Purchase data;
Intelligent contract transaction verification method:Encrypted network dealing record, network deal contract, net are obtained based on calling
Network Agreement for Sale and Purchase data input transaction verification clear crytpographic key, transaction verification clear crytpographic key are matched with the first encryption data,
Encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are decrypted if successful match, are obtained
Network after decryption buys and sells record, network deal contract, network Agreement for Sale and Purchase data, recorded based on the network dealing after decryption,
Network deal contract, network Agreement for Sale and Purchase data carry out intelligent contract transaction verification.
Wherein, the principle of the present invention is:The intelligent contract of the application and traditional intelligent contract storage mode of getting along well is the same,
The application first encrypts intelligent contract, is then stored, so that the user in block chain is merely able to see intelligent conjunction
Storage label about still can't see content, and intelligent contract needs corresponding extraction password when calling, in decrypted transaction
Corresponding special password is needed when verifying, so that entire intelligence contract safety in block chain is higher.
Wherein, the intelligent contract in the application is storing constantly, has carried out special generation to intelligent contract first and has designed,
Key data is extracted from network dealing record, network deal contract, network Agreement for Sale and Purchase;It is generated based on key data
First serial number data and label data, that is, the first serial number data and label data generated are close with intelligent contract content itself
Connection;Random data is generated based on random number generator;First serial number data and random data are calculated according to the first predetermined encryption
Method generates the first encryption data, by distinctive first serial number data, and the random data being randomly generated, along with encryption is calculated
Method generates the first encryption data, so that first encryption data is cracked very difficult, further improves safety;It will mark
Label data are matched with encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data;It will be encrypted
Network dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, using label data as
The critical data searched in block chain database quickly can search out needs from block chain by adding label data
Data.
Wherein, in the embodiment of the present application, the application has also carried out corresponding special designing to intelligent contract storage method:It will
Encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are stored in block chain database, and return
Memory block address and memory block node, memory block address and memory block node based on return are calculated according to the second encryption
Method generates intelligent contract and extracts password;It is generated by the storage area block address and memory block node of return according to the second Encryption Algorithm
Intelligent contract extracts password, i.e. extraction password is closely related with memory block address and memory block node, and also by adding
Close algorithm for encryption, safety is higher, and is bonded with storage location precision.
Wherein, in the embodiment of the present application, intelligent contract call method has also been devised in the application:Search key is inputted,
It is scanned in block chain database based on search key, search key is matched with label data, if matching
Success then inputs intelligent contract and calls password, calls password to extract password with intelligent contract intelligent contract and matches, if
With success, then acquisition corresponding encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are called;I.e.
It needs to extract password when calling and is just capable of calling, and it is any with difference, safety can be called per family on traditional block chain
It is higher.
Wherein, in the embodiment of the present application, intelligent contract transaction verification method has also been devised in the application:It is obtained based on calling
Encrypted network buys and sells record, network deal contract, network Agreement for Sale and Purchase data, inputs transaction verification clear crytpographic key, will hand over
Easily verifying clear crytpographic key is matched with the first encryption data, to encrypted network dealing record, network if successful match
Deal contract, network Agreement for Sale and Purchase data are decrypted, network dealing record, network deal contract, network after being decrypted
Agreement for Sale and Purchase data carry out intelligent conjunction based on the network dealing record after decryption, network deal contract, network Agreement for Sale and Purchase data
About transaction verification.The safety of transaction verification is ensured.
Wherein, in the embodiment of the present application, key data includes:Buy and sell type, the type of merchandise, transaction amount, transaction
Time, both parties' title, dealing network platform title, transaction odd numbers.
Wherein, in the embodiment of the present application, the first serial number data and label data are generated based on key data, it is specific to wrap
It includes:
To buy and sell the corresponding English classification of type, the corresponding number of the type of merchandise, the corresponding Arabic numerals of transaction amount,
Exchange hour it is corresponding number, both parties' title it is corresponding Chinese or English, dealing network platform title it is corresponding Chinese or
English, the corresponding Arabic numerals of transaction odd numbers are ranked up according to sequence from left to right, the data after generating sequence;It will row
Punctuation mark removal in data after sequence retains English, number and Chinese and generates treated sorting data;Based on first turn
Rule is changed, sorting data is converted from left to right by treated, the first serial number data of data combination producing after conversion;It will
Both parties' title, dealing network platform title are combined generation label data;First transformation rule is:When encountering English
When, corresponding number is converted to first, and conversion regime is that English A-Z respectively corresponds 1-26, and the number after conversion is preset
Operation, the number after obtaining default operation;When encountering Chinese, according to the stroke number of Chinese, Chinese is converted into corresponding number
Number after conversion is carried out default operation, the number after obtaining default operation by word;When encountering number, number is carried out pre-
Number if operation, after obtaining default operation;The number obtained after operation is subjected to permutation and combination from left to right and generates the first sequence
Number;Buying and selling type includes:The retail of A class and B class are wholesale;The type of merchandise is that network buys and sells platform to the number of commodity.Pass through
Above-mentioned special cipher mode is related to network business activities first, and proper with actual transaction content, passes through above-mentioned encryption
Mode ensures multi-enciphering, so that cracking, difficulty is big, and the both sides only to participate in business can decrypt, and safety is higher,
The safety of data is ensured using block chain.
Wherein, in the embodiment of the present application, it calls password to extract password with intelligent contract intelligent contract to match, if
Successful match is then called in the following ways and obtains corresponding encrypted network dealing record, network deal contract, network are bought
Sell protocol data:
Data server in block chain is numbered, the position coordinates of the data server in block chain are obtained, it will
The position coordinates of data server in block chain are matched with number, establish the position coordinates of the data server in block chain
Map;
When receiving intelligent contract call instruction, intelligent contract call instruction is analyzed, intelligent contract is obtained and calls
Instruct the position coordinates of sender, the data service based on the position coordinates of intelligent contract call instruction sender, in block chain
It is labeled in the position coordinates map of device;
Position based on intelligent contract call instruction sender in position coordinates map, from away from a nearest area
Corresponding encrypted network is called to buy and sell record, network deal contract, network Agreement for Sale and Purchase in data server in block chain
Data and number, block chain server record the process of calling, are marked, are stored.
It calls data that quick calling may be implemented through the above way, the efficiency of calling is ensured, so that path is most short, and energy
The storage condition of data is enough checked by the position coordinates map of data server.
Wherein, in the embodiment of the present application, intelligent contract call instruction sender calls corresponding intelligent contract to solve
Close, block chain server records the result of decryption, and when decrypting failure result greater than 3 times, block chain server will hinder
Only intelligence contract call instruction sender continues to call the intelligence contract.It can be avoided malice by above-mentioned design and call progress
Decryption, the frequency of failure, which is greater than 3 times, is then considered malicious operation, then shields its operation, ensure the safety of data on block chain.
Wherein, in the embodiment of the present application, intelligent contract transaction verification instruction sender sends corresponding intelligent contract and hands over
Easily verifying instruction is verified, and block chain server carries out the matching result of transaction verification clear crytpographic key and the first encryption data
Record, when authentication failed result is greater than 3 times, block chain server will prevent intelligence contract transaction verification instruction from continuing to verify
The intelligence contract.It is serious to can be avoided malice by above-mentioned design, authentication failed number, which is greater than 3 times, is then considered malicious operation,
Its operation is then shielded, ensures the safety of data on block chain.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes:
Record the calling record of intelligent contract;After some intelligent contract is called, then by intelligent contract and the called side
Connection is established, and carries out Secondary ordination when intelligent contract calls for the intelligent contract contacted is established with other called sides,
When some intelligent contract called side, which carries out intelligent contract, to be called, then first search establishes the intelligent contract contacted with it, and will
The intelligent contract contacted is established with other called sides and carries out Secondary ordination, i.e., search is contacted with intelligent contract called side foundation first
Intelligent contract, then search for and do not establish the intelligent contract contacted, final search and other intelligence with any intelligent contract called side
Energy contract called side establishes the intelligent contract of connection.By the way that called side to be associated with intelligent contract foundation, calling can be improved
Efficiency and accuracy rate avoid a large amount of operation of server from generating, huge data are store on block chain, if all to all data
Then speed is slower for traversal, and serious load can be caused to server, efficiency is improved through the above way, when reducing operation
Between, ensure the optimization processing of block chain data.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes intelligence
Contract means of defence, including:
When the intelligent contract storage server in block chain is by attacking, the first protection instruction is generated, and first is protected
Finger shield order is propagated in block chain;
When the intelligent contract storage server in any one block chain receives the first protection instruction, then opening protection function is protected
Revetment;
When the intelligent contract storage server in block chain is by attacking, attacker is divided by attack server
Analysis obtains the attack address of attacker, attack pattern, is attacked position, attack content;Attack address based on attacker is attacked
Mode is hit, Defense Countermeasure is generated by attack position, attack content, and will be propagated in Defense Countermeasure block chain;
When the intelligent contract storage server in any one block chain receives Defense Countermeasure, then Defense Countermeasure carries out phase
The defence answered.
Since block chain is the huge network system, it comprises a large amount of server, each server, which exists, is attacked
The risk hit will lead to virus or wooden horse propagated in block chain, large area is caused to damage after a server is attacked,
Although data can be restored from other servers, recovery needs time and efforts, and therefore, the application devises block chain
Guard method of the server when being attacked generates first when the intelligent contract storage server in block chain is by attacking
Protection instruction, and the first protection instruction is propagated in block chain;When the intelligent contract storage service in any one block chain
Then opening protection function protects wall when device receives the first protection instruction, avoids being propagated further for virus, actively improves defence rank;When
When intelligent contract storage server in block chain is by attacking, attacker is analyzed by attack server, is attacked
Position, attack content, are attacked at attack pattern in the attack address of person;Attack address, attack pattern based on attacker are attacked
Hit position, attack content generates Defense Countermeasure, and will propagate in Defense Countermeasure block chain;Intelligence in any one block chain
When contract storage server receives Defense Countermeasure, then Defense Countermeasure is defendd accordingly, i.e., carries out analysis acquisition to attacker
Defense Countermeasure propagates Defense Countermeasure in block chain network, carries out specific aim defence.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes increasing newly
Block chain server validation method, including:
Newly-increased block chain server is detected, address, the capacity, storage mode of newly-increased block chain server are obtained;
Newly-increased block chain server is detected, including the detection of safety detection, network performance, storage capacity detection, place
The detection of reason ability, grades to newly-increased block chain server based on testing result;
When newly-increased block chain server passes through detection, then by other servers in newly-increased block chain server and block chain
Connection is established, data are preferentially stored based on rating result.
The quantity of block chain server be it is flexible and changeable, may there is new server to be added at any time, but right in tradition
There is no corresponding control modes for the server being newly added, and viral wooden horse is caused to be easy tradition in a network or certain services
Device ability is limited, and there is no great effect or contributions, therefore, in order to improve safety and the processing energy of entire block chain
Power has carried out special designing to the mode of newly-increased server, has ensured newly-increased server in the side such as safety and processing capacity
Face is more excellent, to improve the ability and safety of block chain on the whole.
Wherein, in the embodiment of the present application, the intelligent contract calls and the method for contract transaction verification further includes intelligence
Contract correlating method, including:
When block chain server is in the new intelligent contract of storage, by the new corresponding label data of intelligent contract in block
Matching is associated in chain Servers-all, the similarity degree based on label data matches multiple intelligence that are mutually related and closes
About, when intelligent contract calls, multiple intelligent contracts that will be mutually related call out jointly.Improve the calling effect of intelligent contract
Rate avoids repetitive operation.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. the intelligent contract based on block chain calls and the method for contract transaction verification, which is characterized in that the method includes:
Intelligent contract generation method:Network dealing record, network deal contract, network dealing association are obtained from network dealing platform
Data are discussed, extract key data from network dealing record, network deal contract, network Agreement for Sale and Purchase;Based on keyword
Data generate the first serial number data and label data;Random data is generated based on random number generator;By the first serial number data and
Random data generates the first encryption data according to the first predetermined encryption algorithm;By network dealing record, network deal contract, network
Agreement for Sale and Purchase data are encrypted, and generate encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase number
Clear crytpographic key according to, wherein encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data is first to add
Ciphertext data;By label data and encrypted network dealing record, network deal contract, the progress of network Agreement for Sale and Purchase data
Match;Encrypted network is bought and sold record, network deal contract, network Agreement for Sale and Purchase data to be stored in block chain database,
Using label data as the critical data searched in block chain database;
Intelligent contract storage method:Encrypted network is bought and sold into record, network deal contract, the storage of network Agreement for Sale and Purchase data
In block chain database, and memory block address and memory block node are returned to, the memory block address based on return and deposited
Storage area block node generates intelligent contract according to the second Encryption Algorithm and extracts password;
Intelligent contract call method:Search key is inputted, is scanned in block chain database based on search key, it will
Search key is matched with label data, if successful match, is inputted intelligent contract and is called password, intelligent contract is called
Password extracts password with intelligent contract and is matched, if successful match, calls the corresponding encrypted network dealing note of acquisition
Record, network deal contract, network Agreement for Sale and Purchase data;
Intelligent contract transaction verification method:Based on calling, the encrypted network of acquisition buys and sells record, network deal contract, network are bought
Protocol data is sold, transaction verification clear crytpographic key is inputted, transaction verification clear crytpographic key is matched with the first encryption data, if
Then encrypted network dealing record, network deal contract, network Agreement for Sale and Purchase data are decrypted with success, are decrypted
Network afterwards buys and sells record, network deal contract, network Agreement for Sale and Purchase data, based on network dealing record, the network after decryption
Deal contract, network Agreement for Sale and Purchase data carry out intelligent contract transaction verification.
2. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature
It is, key data includes:Buy and sell type, the type of merchandise, transaction amount, exchange hour, both parties' title, dealing network
Platform names, transaction odd numbers.
3. the intelligent contract according to claim 2 based on block chain calls and the method for contract transaction verification, feature
It is, the first serial number data and label data is generated based on key data, specifically included:
The corresponding English classification of type, the corresponding number of the type of merchandise, the corresponding Arabic numerals of transaction amount, transaction will be bought and sold
Time it is corresponding number, both parties' title it is corresponding Chinese or English, dealing network platform title it is corresponding Chinese or English,
The corresponding Arabic numerals of transaction odd numbers are ranked up according to sequence from left to right, the data after generating sequence;After sorting
Data in punctuation mark removal, retain English, number and Chinese and generate treated sorting data;Based on the first conversion rule
Then, by treated, sorting data is converted from left to right, the first serial number data of data combination producing after conversion;It will dealing
Both sides' title, dealing network platform title are combined generation label data;First transformation rule is:It is first when encountering English
Corresponding number is first converted to, conversion regime is that English A-Z respectively corresponds 1-26, the number after conversion is subjected to default operation,
Number after obtaining default operation;When encountering Chinese, according to the stroke number of Chinese, Chinese is converted into corresponding number, it will
Number after conversion carries out default operation, the number after obtaining default operation;When encountering number, number is subjected to default fortune
It calculates, the number after obtaining default operation;The number obtained after operation is subjected to permutation and combination from left to right and generates the first serial number number
According to;Buying and selling type includes:The retail of A class and B class are wholesale;The type of merchandise is that network buys and sells platform to the number of commodity.
4. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature
It is, calls password to extract password with intelligent contract intelligent contract and match, if successful match, adjust in the following ways
Record, network deal contract, network Agreement for Sale and Purchase data are bought and sold with corresponding encrypted network is obtained:
Data server in block chain is numbered, the position coordinates of the data server in block chain are obtained, by block
The position coordinates of data server in chain are matched with number, with establishing the position coordinates of the data server in block chain
Figure;
When receiving intelligent contract call instruction, intelligent contract call instruction is analyzed, obtains intelligent contract call instruction
The position coordinates of sender, based on the position coordinates of intelligent contract call instruction sender, data server in block chain
It is labeled in position coordinates map;
Position based on intelligent contract call instruction sender in position coordinates map, from away from a nearest block chain
In data server in call corresponding encrypted network to buy and sell record, network deal contract, network Agreement for Sale and Purchase data
And number, block chain server record the process of calling, are marked, are stored.
5. the intelligent contract according to claim 4 based on block chain calls and the method for contract transaction verification, feature
It is, intelligent contract call instruction sender calls corresponding intelligent contract to be decrypted, knot of the block chain server to decryption
Fruit is recorded, and when decrypting failure result greater than 3 times, block chain server will prevent intelligence contract call instruction sender
Continue to call the intelligence contract.
6. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature
It is, intelligent contract transaction verification instruction sender sends corresponding intelligent contract transaction verification instruction and verifies, block chain
Server records transaction verification clear crytpographic key and the matching result of the first encryption data, when authentication failed result is greater than 3
When secondary, block chain server will prevent intelligence contract transaction verification instruction from continuing to verify the intelligence contract.
7. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature
It is, the intelligence contract calls and the method for contract transaction verification further includes:
Record the calling record of intelligent contract;After some intelligent contract is called, then intelligent contract and the called side are established
Connection, and Secondary ordination is carried out when intelligent contract calls by the intelligent contract contacted is established with other called sides, when certain
When a intelligence contract called side carries out intelligent contract calling, then first search establishes the intelligent contract contacted with it, and will be with it
The intelligent contract that his called side establishes connection carries out Secondary ordination, i.e., searches for first and establish the intelligence contacted with intelligent contract called side
Then energy contract is searched for and does not establish the intelligent contract contacted, final search and other intelligently conjunctions with any intelligent contract called side
About called side establishes the intelligent contract contacted.
8. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature
It is, the intelligence contract calls and the method for contract transaction verification further includes intelligent contract means of defence, including:
When the intelligent contract storage server in block chain is by attacking, the first protection instruction is generated, and the first protection is referred to
Order is propagated in block chain;
When the intelligent contract storage server in any one block chain receives the first protection instruction, then opening protection function protects wall;
When the intelligent contract storage server in block chain is by attacking, attacker is analyzed by attack server, is obtained
It obtains the attack address of attacker, attack pattern, attacked position, attack content;Attack address based on attacker, attacker
Formula is generated Defense Countermeasure, and will be propagated in Defense Countermeasure block chain by attack position, attack content;
When the intelligent contract storage server in any one block chain receives Defense Countermeasure, then Defense Countermeasure carries out corresponding
Defence.
9. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature
It is, the intelligence contract calls and the method for contract transaction verification further includes newly-increased block chain server validation method, including:
Newly-increased block chain server is detected, address, the capacity, storage mode of newly-increased block chain server are obtained;
Newly-increased block chain server is detected, including the detection of safety detection, network performance, storage capacity detection, processing energy
Power detection, grades to newly-increased block chain server based on testing result;
When newly-increased block chain server passes through detection, then other servers in newly-increased block chain server and block chain are established
Connection, preferentially stores data based on rating result.
10. the intelligent contract according to claim 1 based on block chain calls and the method for contract transaction verification, feature
It is, the intelligence contract calls and the method for contract transaction verification further includes intelligent contract correlating method, including:
When block chain server is in the new intelligent contract of storage, by the new corresponding label data of intelligent contract in block chain institute
Having and is associated matching in server, the similarity degree based on label data matches multiple intelligent contracts that are mutually related,
When intelligent contract calls, multiple intelligent contracts that will be mutually related call out jointly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810667205.3A CN108921696B (en) | 2018-06-26 | 2018-06-26 | Intelligent contract calling and contract transaction verification method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810667205.3A CN108921696B (en) | 2018-06-26 | 2018-06-26 | Intelligent contract calling and contract transaction verification method based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108921696A true CN108921696A (en) | 2018-11-30 |
CN108921696B CN108921696B (en) | 2020-10-16 |
Family
ID=64423086
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810667205.3A Active CN108921696B (en) | 2018-06-26 | 2018-06-26 | Intelligent contract calling and contract transaction verification method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108921696B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109711200A (en) * | 2018-12-29 | 2019-05-03 | 百度在线网络技术(北京)有限公司 | Accurate poverty alleviation method, apparatus, equipment and medium based on block chain |
CN109903123A (en) * | 2019-01-18 | 2019-06-18 | 众安信息技术服务有限公司 | A kind of house lease method and system |
CN109934000A (en) * | 2019-03-12 | 2019-06-25 | 黑龙江世纪精彩科技有限公司 | Entertainment industry cooperation intention matching process and storage medium based on block chain technology |
CN110135986A (en) * | 2019-04-23 | 2019-08-16 | 武汉大学 | It is a kind of to can search for encrypted file data method based on what block chain intelligence contract was realized |
CN110148003A (en) * | 2019-05-26 | 2019-08-20 | 贾渊培 | A kind of carbon emissions trading method and system |
CN110190968A (en) * | 2019-06-03 | 2019-08-30 | 魏靖 | Block chain big data security processing system and method |
CN112052473A (en) * | 2019-06-05 | 2020-12-08 | 国际商业机器公司 | Geographic location compliance |
CN113407188A (en) * | 2021-06-03 | 2021-09-17 | 广东辰宜信息科技有限公司 | Intelligent contract construction method and device, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106295401A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | A kind of read-only secure file storage system and method for block chain |
CA2938758A1 (en) * | 2015-08-13 | 2017-02-13 | The Toronto-Dominion Bank | A system and method for implementing hybrid public-private block-chain ledgers |
US20170177898A1 (en) * | 2015-12-16 | 2017-06-22 | International Business Machines Corporation | Personal ledger blockchain |
CN107248994A (en) * | 2017-06-26 | 2017-10-13 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
CN107730254A (en) * | 2016-08-12 | 2018-02-23 | 深圳市嗨马支付信息有限公司 | Currency affaris safety trade system and currency method for secure transactions |
EP3312756A1 (en) * | 2016-10-24 | 2018-04-25 | Trustonic Limited | Establishing cryptographic identity for an electronic device |
-
2018
- 2018-06-26 CN CN201810667205.3A patent/CN108921696B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2938758A1 (en) * | 2015-08-13 | 2017-02-13 | The Toronto-Dominion Bank | A system and method for implementing hybrid public-private block-chain ledgers |
US20170177898A1 (en) * | 2015-12-16 | 2017-06-22 | International Business Machines Corporation | Personal ledger blockchain |
CN107730254A (en) * | 2016-08-12 | 2018-02-23 | 深圳市嗨马支付信息有限公司 | Currency affaris safety trade system and currency method for secure transactions |
CN106295401A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | A kind of read-only secure file storage system and method for block chain |
EP3312756A1 (en) * | 2016-10-24 | 2018-04-25 | Trustonic Limited | Establishing cryptographic identity for an electronic device |
CN107248994A (en) * | 2017-06-26 | 2017-10-13 | 联动优势科技有限公司 | A kind of method for sending information, processing method and processing device |
Non-Patent Citations (2)
Title |
---|
祝烈煌等: "区块链交易数据隐私保护机制", 《大数据》 * |
翟社平等: "区块链技术:应用及问题", 《西安邮电大学学报》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109711200A (en) * | 2018-12-29 | 2019-05-03 | 百度在线网络技术(北京)有限公司 | Accurate poverty alleviation method, apparatus, equipment and medium based on block chain |
CN109903123A (en) * | 2019-01-18 | 2019-06-18 | 众安信息技术服务有限公司 | A kind of house lease method and system |
CN109934000A (en) * | 2019-03-12 | 2019-06-25 | 黑龙江世纪精彩科技有限公司 | Entertainment industry cooperation intention matching process and storage medium based on block chain technology |
CN109934000B (en) * | 2019-03-12 | 2021-06-29 | 黑龙江世纪精彩科技有限公司 | Entertainment industry cooperative intention matching method based on block chain technology and storage medium |
CN110135986A (en) * | 2019-04-23 | 2019-08-16 | 武汉大学 | It is a kind of to can search for encrypted file data method based on what block chain intelligence contract was realized |
CN110135986B (en) * | 2019-04-23 | 2024-01-16 | 武汉大学 | Method for realizing searchable encrypted file data based on blockchain intelligent contract |
CN110148003A (en) * | 2019-05-26 | 2019-08-20 | 贾渊培 | A kind of carbon emissions trading method and system |
CN110190968A (en) * | 2019-06-03 | 2019-08-30 | 魏靖 | Block chain big data security processing system and method |
CN112052473A (en) * | 2019-06-05 | 2020-12-08 | 国际商业机器公司 | Geographic location compliance |
CN113407188A (en) * | 2021-06-03 | 2021-09-17 | 广东辰宜信息科技有限公司 | Intelligent contract construction method and device, computer equipment and storage medium |
CN113407188B (en) * | 2021-06-03 | 2024-02-09 | 广东辰宜信息科技有限公司 | Intelligent contract construction method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108921696B (en) | 2020-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108921696A (en) | Intelligent contract based on block chain calls and the method for contract transaction verification | |
US8429421B2 (en) | Server-side encrypted pattern matching | |
CN106776904B (en) | The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment | |
Zhuang et al. | A new ultralightweight RFID protocol for low-cost tags: R 2 AP | |
CN110224808A (en) | Bank data sharing method and relevant device based on block chain | |
Chen et al. | Graph-fraudster: Adversarial attacks on graph neural network-based vertical federated learning | |
Kumar | Cloud computing security issues and its challenges: a comprehensive research | |
Latchoumi et al. | Synthetic Identity of Crime Detection | |
Shoker | Brief announcement: Sustainable blockchains through proof of exercise | |
Prianga et al. | Evolutionary survey on data security in cloud computing using blockchain | |
Dubey et al. | SQL filtering: An effective technique to prevent SQL injection attack | |
Chaum et al. | W-OTS+ up my sleeve! a hidden secure fallback for cryptocurrency wallets | |
Polpong et al. | Authentication and password storing improvement using SXR algorithm with a hash function | |
Vahedi et al. | Identifying and categorizing malicious content on paste sites: a neural topic modeling approach | |
Biswas et al. | Protecting network-on-chip intellectual property using timing channel fingerprinting | |
Li et al. | DSE-RB: A privacy-preserving dynamic searchable encryption framework on redactable blockchain | |
KR20210053844A (en) | Server of artificial intelligence personal privacy data security system | |
Zhang et al. | Privacy-preserving multi-pattern matching | |
Peng et al. | All roads lead to Rome: Many ways to double spend your cryptocurrency | |
Geetha et al. | Blockchain based Mechanism for Cloud Security | |
Fareed et al. | Proposal to enhance the information security system of the cloud using data mining techniques | |
KR102010644B1 (en) | METHOD AND SYSTEM FOR k-NN CLASSIFICATION PROCESSING BASED ON GARBLED CIRCUIT | |
Sude et al. | Authenticated CRF based improved ranked multi-keyword search for multi-owner model in cloud computing | |
Mishra | Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier | |
Islam et al. | Trojan bio-hacking of DNA-sequencing pipeline |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200804 Address after: 510000 room 711, floor 7, No. 733 (1), Dongfeng East Road, Yuexiu District, Guangzhou City, Guangdong Province (only for office use) Applicant after: GUANGZHOU TENTCOO SOFTWARE TECHNOLOGY Co.,Ltd. Address before: 510000 Guangdong Guangzhou Haizhuqu District Xingang East Road 1000 1103, 1104, 1105, 1106 rooms Applicant before: GUANGZHOU YOUPU NETWORK TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |