CN109345390A - A kind of intelligence contract access method, system, equipment and computer storage medium - Google Patents
A kind of intelligence contract access method, system, equipment and computer storage medium Download PDFInfo
- Publication number
- CN109345390A CN109345390A CN201811115832.2A CN201811115832A CN109345390A CN 109345390 A CN109345390 A CN 109345390A CN 201811115832 A CN201811115832 A CN 201811115832A CN 109345390 A CN109345390 A CN 109345390A
- Authority
- CN
- China
- Prior art keywords
- contract
- intelligent
- access
- safe
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of intelligent contract access method, system, equipment and computer storage medium, applied in the either block chain node of block catenary system, wherein this method comprises: obtaining Intelligent target contract;Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract.A kind of intelligent contract access method disclosed in the present application, after obtaining Intelligent target contract, it is not direct permission invocation target intelligence contract, but first judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract again, so that the Intelligent target contract that can be accessed calling is safe and intelligent contract, compared with calling directly intelligent contract in the prior art, the safety of intelligent contract can be improved to a certain extent.A kind of intelligent contract access system, equipment and computer readable storage medium disclosed in the present application also solve the problems, such as relevant art.
Description
Technical field
This application involves block chain technical fields, more specifically to a kind of intelligent contract access method, system, set
Standby and computer storage medium.
Background technique
With the reinforcement of confidential notions and demand, block chain technology is able to extensively due to its characteristic that can not be tampered easily
Using.In existing block chain application platform, the address of intelligent contract is stored in central server, and attacker can use technology
Means distort the address of intelligent contract, user institute intelligent contract to be applied are oriented to other intelligent contracts, thus directly adjusting
With cause information to defraud of after Intelligent target contract, the consequences such as financial fraud.
In conclusion the safety for how improving intelligent contract is a problem to be solved by those skilled in the art.
Summary of the invention
The purpose of the application is to provide a kind of intelligent contract access method, can solve how to improve intelligence to a certain extent
The technical issues of safety of energy contract.Present invention also provides a kind of intelligent contract access system, block chain node device and
Computer readable storage medium.
To achieve the goals above, the application provides the following technical solutions:
A kind of intelligence contract access method, applied in the either block chain node of block catenary system, comprising:
Obtain Intelligent target contract;
Judge whether the Intelligent target contract is safe and intelligent contract, if so, allowing to access and call the target
Intelligent contract.
It is preferably, described to judge whether the Intelligent target contract is safe and intelligent contract, comprising:
Obtain the access address of the Intelligent target contract;
Judge whether the access address belongs to safe and intelligent contract address list;
If so, determining the Intelligent target contract for safe and intelligent contract;
If it is not, then further judging whether the access address belongs to dangerous intelligent contract address list, if belonging to described
Dangerous intelligence contract address list then determines the Intelligent target contract for dangerous intelligent contract.
Preferably, it is described judge whether the access address belongs to the dangerous intelligent contract address list after, also
Include:
If the access address is not belonging to the dangerous intelligent contract address list, judge whether to receive upwards transmission port
The home type of the access address of transmission, the home type includes the safety information of the access address;
If so, based on the home type by the access address be added to the safe and intelligent contract address list or
The dangerous intelligent contract address list.
It is preferably, described to judge whether the access address belongs to before safe and intelligent contract address list, further includes:
Create the safe and intelligent contract address list and the dangerous intelligent contract address list;
Receive the home type of the address for the intelligent contract that third party's trust authority is sent;
According to the home type by the address of the intelligent contract be added to the safe and intelligent contract address list or
The dangerous intelligent contract address list.
It is preferably, described to judge whether the Intelligent target contract is safe and intelligent contract, comprising:
The Intelligent target contract is directly transmitted to intelligent contract test macro;
The intelligent contract test macro is received to the test result of the Intelligent target contract;
The test result is parsed, if the test result shows the Intelligent target contract safety, determines the mesh
Marking intelligent contract is safe and intelligent contract.
Preferably, it is described judge whether the Intelligent target contract is safe and intelligent contract after, further includes:
If it is determined that the Intelligent target contract is dangerous intelligent contract, then send a warning message to the access Intelligent target
The user client of contract.
Preferably, after the judgement Intelligent target contract is dangerous intelligent contract, further includes:
Judge whether to receive that the user client sends continues to call the solicited message of the Intelligent target contract,
If so, allowing the user client to call the Intelligent target contract, if it is not, the user client is then forbidden to call institute
State Intelligent target contract.
A kind of intelligence contract access system, applied in the either block chain node of block catenary system, comprising:
First obtains module, for obtaining Intelligent target contract;
First judgment module, for judging whether the Intelligent target contract is safe and intelligent contract, if so, allowing to visit
It asks and calls the Intelligent target contract.
Preferably, the first judgment module includes:
First acquisition unit, for obtaining the access address of the Intelligent target contract;
First judging unit, for judging whether the access address belongs to safe and intelligent contract address list, if so,
Determine the Intelligent target contract for safe and intelligent contract;
Second judgment unit, for first judging unit determine the Intelligent target contract address be not belonging to it is described
When safe and intelligent contract address list, further judge whether the access address belongs to dangerous intelligent contract address list, if
Belong to the dangerous intelligent contract address list, then determines the Intelligent target contract for dangerous intelligent contract.
Preferably, further includes:
Second judgment module, for judging whether the address of the Intelligent target contract belongs in the second judgment unit
After the dangerous intelligent contract address list, if the access address is not belonging to the dangerous intelligent contract address list,
Judge whether to receive the home type of the address of the Intelligent target contract of upwards transmission port transmission, the home type includes
The safety information of the access address;If so, the access address is added to the safety based on the home type
Intelligent contract address list or the dangerous intelligent contract address list.
Preferably, further includes:
Creation module judges whether the access address belongs to safe and intelligent contract address for the first judgment module
Before list, the safe and intelligent contract address list and the dangerous intelligent contract address list are created;
Receiving module, the home type of the address of the intelligent contract for receiving the transmission of third party's trust authority;
Adding module is closed for the address of the intelligent contract to be added to the safe and intelligent according to the home type
About address list or the dangerous intelligent contract address list.
Preferably, the first judgment module includes:
Transmission unit, for directly transmitting the Intelligent target contract to intelligent contract test macro;
Receiving unit, for receiving the intelligent contract test macro to the test result of the Intelligent target contract;
Resolution unit, for parsing the test result, if the test result shows the Intelligent target contract safety,
Then determine the Intelligent target contract for safe and intelligent contract.
Preferably, further includes:
Sending module, for the first judgment module judge the Intelligent target contract whether be safe and intelligent contract it
Afterwards, it if it is determined that the Intelligent target contract is dangerous intelligent contract, then sends a warning message to the access Intelligent target contract
User client.
Preferably, further includes:
Third judgment module, for the first judgment module determine the Intelligent target contract for dangerous intelligent contract it
Afterwards, judge whether to receive that the user client sends continues to call the solicited message of the Intelligent target contract, if so,
The user client is then allowed to call the Intelligent target contract, if it is not, the user client is then forbidden to call the mesh
Mark intelligent contract.
A kind of block chain node device, comprising:
Memory, for storing computer program;
Processor realizes the step of as above any intelligent contract access method when for executing the computer program
Suddenly.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, described
The step of as above any described intelligent contract access method is realized when computer program is executed by processor.
A kind of intelligent contract access method provided by the present application, applied in the either block chain node of block catenary system,
It include: to obtain Intelligent target contract;Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access and adjust
With Intelligent target contract.A kind of intelligent contract access method provided by the present application is not straight after obtaining Intelligent target contract
Connecing allows to access simultaneously invocation target intelligence contract, but first judges whether Intelligent target contract is safe and intelligent contract, if so,
Allow to access again and invocation target intelligence contract, so that can be accessed and the Intelligent target contract that calls is that safe and intelligent closes
About, compared with calling directly intelligent contract in the prior art, the safety of intelligent contract can be improved to a certain extent.This Shen
A kind of intelligent contract access system, block chain node device and the computer readable storage medium that please be provided also solve corresponding skill
Art problem.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of first pass figure of intelligent contract access method provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of intelligent contract access method provided by the embodiments of the present application in practical application;
Fig. 3 is the structural schematic diagram that a kind of intelligent contract provided by the embodiments of the present application accesses system;
Fig. 4 is a kind of structural schematic diagram of block chain node device provided by the embodiments of the present application;
Fig. 5 is a kind of another structural schematic diagram of block chain node device provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
This application involves block chain technologies, in order to make it easy to understand, below will be to block chain in the embodiment of the present application
(Block Chain) is simply introduced, and block chain is distribution disclosed in all block chain nodes to access server
The data structure of storage includes several blocks (Block).User terminal comprising client can be registered as an area
Block chain node forms P2P network with other block chain nodes of access block chain server, and block chain data can be stored in
P2P network, any one or more block chain nodes of P2P network paralysis, will not result in the loss of block chain data, such area
Block chain data just have very strong safety, it is ensured that the persistence of data and can not distort.When a block is persisted to area
When in block chain data, the block chain node of access server can add the block;Block is according to persistence time sequencing
Singly it is added in block chain data, each block other than first block in block chain data will chain
It is connected to its previous block, such block chain data just form a block and link this block, just as a chain one
Sample, as soon as the block can not be modified after a block is persisted to block chain data.
With the reinforcement of confidential notions and demand, block chain technology is able to extensively due to its characteristic that can not be tampered easily
Using.In existing block chain application platform, the address of intelligent contract is stored in central server, and attacker can use technology
Means distort the address of intelligent contract, user institute intelligent contract to be applied are oriented to other intelligent contracts, to call directly
Information is caused to defraud of after intelligent contract, the consequences such as financial fraud.A kind of intelligent contract access method provided by the present application can mention
The safety of high intelligence contract.
Referring to Fig. 1, Fig. 1 is a kind of first pass figure of intelligent contract access method provided by the embodiments of the present application.
A kind of intelligent contract access method provided by the embodiments of the present application, is applied in block catenary system, may include:
Step S101: Intelligent target contract is obtained.
In practical application, block chain node first obtains Intelligent target contract, and Intelligent target contract is the intelligence to be called
Contract, the type and function of Intelligent target contract can be determine according to actual needs.In addition, Intelligent target contract can be in advance
The intelligent contract being stored in block catenary system is also possible to the intelligent contract etc. that block chain node real-time reception arrives.
Step S102: judging whether Intelligent target contract is safe and intelligent contract, if so, thening follow the steps S103: allowing
Access simultaneously invocation target intelligence contract.
Block chain node first judges whether Intelligent target contract is safe and intelligent contract after obtaining Intelligent target contract,
If so, allowing to access simultaneously invocation target intelligence contract, if it is not, the operation etc. for forbidding invocation target intelligence contract can be executed.
Judge whether Intelligent target contract is that the mode of safe and intelligent contract can be determined flexibly according to actual needs, for example it can be adopted
Judge whether Intelligent target contract is safe and intelligent contract with the mode of static state judgement, then judges whether Intelligent target contract is peace
Full intelligence contract, can be with specifically: the access address for obtaining Intelligent target contract judges that the access address of Intelligent target contract is
It is no to belong to safe and intelligent contract address list, if so, determining that Intelligent target contract is safe and intelligent contract;If Intelligent target closes
Address about is not belonging to safe and intelligent contract address list, then further judges whether the address of Intelligent target contract belongs to danger
Intelligent contract address list determines Intelligent target contract for dangerous intelligent contract if belonging to dangerous intelligent contract address list;
Wherein, the intelligent contract address in safe and intelligent contract address list is safe and intelligent contract address, dangerous intelligence contract
Intelligent contract address in the list of location is dangerous intelligent contract address.
Optionally, the intelligent contract address in safe and intelligent contract address list and dangerous intelligent contract address list can be with
It is directly specified by extraneous, then judges whether the address of Intelligent target contract belongs to before safe and intelligent contract address list, block
Chain node first creates safe and intelligent contract address list and dangerous intelligent contract address list;Third party's trust authority is received to send
Intelligent contract address home type, include the safety information of access address in home type, to indicate intelligent conjunction
Whether address about is safe;The address of intelligent contract is added to safe and intelligent contract address list or danger according to home type
Intelligent contract address list.Third party's trust authority can be determined flexibly according to actual needs, from the effect of home type
Home type shows that the address of an intelligent contract belongs to safe and intelligent contract address list or dangerous intelligent contract address column
Table.In addition, block chain node had both been not belonging to safe and intelligent contract address list in the address for determining Intelligent target contract, also do not belong to
When dangerous intelligent contract address list, just indicate that the Intelligent target contract is the unknown intelligent contract of safety, at this point, block
Chain node can decide whether to receive the home type of the access address of the Intelligent target contract of upwards transmission port transmission, if so,
The access address of Intelligent target contract is then added to by safe and intelligent contract address list based on home type or dangerous intelligence is closed
About address list, and determine whether Intelligent target contract is safe based on home type;In concrete application scene, in order to verify as early as possible
Intelligent target contract can be sent to the credible machine of third party by the safety of unknown Intelligent target contract, block chain node
Structure prompts third party's trust authority to verify Intelligent target contract.In addition, block chain node can also be according to intelligent contract
Danger classes dangerous intelligent contract address list is divided into the intelligent contract address list for indicating different danger classes, such as can
With the grade for having potential threat according to intelligent contract and having invasive to threaten, dangerous intelligent contract address list is divided into potential prestige
Intelligent contract address list, the intelligent contract address list of invasive threat are coerced, correspondingly, can be according to the intelligence of different danger classes
Energy contract address list does differentiated processing, such as area to the intelligent contract for belonging to different dangerous intelligent contract address lists
Block chain node, which can permit to call under specific condition, belongs to the intelligent contract of potential threat intelligence contract address list and any
In the case of do not allow to call and belong to the intelligent contract etc. that invasive threatens intelligent contract address list, dangerous intelligence contract address
The specific hierarchical approaches of list and the mode handled the differentiated of the intelligent contract address list of different danger classes can roots
According to actual needs flexibly setting.
In practical application, whether the mode that block chain node can use dynamic to judge judges Intelligent target contract as safety
Intelligent contract then judges whether Intelligent target contract is safe and intelligent contract, can be with specifically: directly transmits Intelligent target contract
To intelligent contract test macro;Intelligent contract test macro is received to the test result of Intelligent target contract;Test result is parsed,
If test result shows Intelligent target contract safety, Intelligent target contract is determined for safe and intelligent contract, if test result table
Bright Intelligent target contract is dangerous, then determines Intelligent target contract for dangerous intelligent contract.Optionally, it is tested by intelligent contract
The mode that system carries out safety judgement to Intelligent target contract can be with above-mentioned by safe and intelligent contract address list and danger
Danger intelligence contract address list judges that the mode of the safety of Intelligent target contract combines, for example block chain node testing
The result shows that the address of Intelligent target contract can be stored in safe and intelligent contract address list when Intelligent target contract is safe,
And when test result shows that Intelligent target contract is dangerous, the address of Intelligent target contract can be stored in dangerous intelligent contract
Address list etc., other feasible combinations can be determine according to actual needs.
In practical application, in the case where block chain node forbids user client invocation target intelligence contract, in order to full
Grasp of the sufficient user client to information, block chain node can be after determining Intelligent target contract for dangerous intelligent contract, hair
Send warning information to the user client of access target intelligence contract.The particular content and form of warning information can be according to reality
It needs to be determined that for example it may include the consequence etc. of risk present in Intelligent target contract and invocation target intelligence contract.
In addition, in order to improve the hommization of block catenary system, after block chain node determines Intelligent target contract for dangerous intelligent contract,
It can also first judge whether to receive the solicited message of the continuation invocation target intelligence contract of user client transmission, if so,
Allow user client invocation target intelligence contract, if it is not, then forbidding user client invocation target intelligence contract;In addition, being
Accurately the behavior for calling dangerous intelligent contract is really weighed convenient for subsequent, block chain node can also send out user client
It send and continues this information cochain of the solicited message of invocation target intelligence contract.
A kind of intelligent contract access method provided by the present application, applied in the either block chain node of block catenary system,
It include: to obtain Intelligent target contract;Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access and adjust
With Intelligent target contract.A kind of intelligent contract access method provided by the present application is not straight after obtaining Intelligent target contract
Connecing allows to access simultaneously invocation target intelligence contract, but first judges whether Intelligent target contract is safe and intelligent contract, if so,
Allow to access again and invocation target intelligence contract, so that can be accessed and the Intelligent target contract that calls is that safe and intelligent closes
About, compared with calling directly intelligent contract in the prior art, the safety of intelligent contract can be improved to a certain extent.
Referring to Fig. 2, Fig. 2 is a kind of process of intelligent contract access method provided by the embodiments of the present application in practical application
Figure.
A kind of intelligent contract access method provided by the embodiments of the present application may comprise steps of in practical application:
Step S201: creation safe and intelligent contract address list and dangerous intelligent contract address list.
Step S202: the home type of the address for the intelligent contract that third party's trust authority is sent is received;According to ownership class
The address of intelligent contract is added to safe and intelligent contract address list or dangerous intelligent contract address list by type.
Step S203: Intelligent target contract is obtained.
Step S204: judging whether the address of Intelligent target contract belongs to safe and intelligent contract address list, if so, holding
Row step S205;If the address of Intelligent target contract is not belonging to safe and intelligent contract address list, S206 is thened follow the steps.
Step S205: allowing to access and invocation target intelligence contract.
Step S206: judging whether the address of Intelligent target contract belongs to dangerous intelligent contract address list, if so, holding
Row step S207, if it is not, thening follow the steps S208.
Step S207: forbid invocation target intelligence contract.
Step S208: Intelligent target contract is directly transmitted to intelligent contract test macro, receives intelligent contract test macro
To the test result of Intelligent target contract, test result is parsed.
Step S209: if test result shows Intelligent target contract safety, determine Intelligent target contract for safe and intelligent
The address of Intelligent target contract is added to safe and intelligent contract address list by contract.
Step S210: if test result shows Intelligent target, contract is dangerous, determines Intelligent target contract for dangerous intelligence
The address of Intelligent target contract is added to dangerous intelligent contract address list by energy contract.
Present invention also provides a kind of intelligent contracts to access system, with a kind of intelligence conjunction provided by the embodiments of the present application
About effect is corresponded to possessed by access method.Referring to Fig. 3, Fig. 3 is a kind of intelligent contract access provided by the embodiments of the present application
The structural schematic diagram of system.
A kind of intelligent contract provided by the embodiments of the present application accesses system, is applied in block catenary system, may include:
First obtains module 301, for obtaining Intelligent target contract;
First judgment module 302, for judging whether Intelligent target contract is safe and intelligent contract, if so, allowing to visit
Ask simultaneously invocation target intelligence contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, first judgment module may include:
First acquisition unit, for obtaining the access address of Intelligent target contract;
First judging unit, for judging whether access address belongs to safe and intelligent contract address list, if so, determining
Intelligent target contract is safe and intelligent contract;
Second judgment unit determines that access address is not belonging to safe and intelligent contract address list for the first judging unit
When, further judge whether the address of Intelligent target contract belongs to dangerous intelligent contract address list, is closed if belonging to dangerous intelligence
About address list then determines Intelligent target contract for dangerous intelligent contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Second judgment module, for judging whether the address of Intelligent target contract belongs to dangerous intelligence in second judgment unit
After contract address list, if the access address of Intelligent target contract is not belonging to dangerous intelligent contract address list, judgement is
The home type of the address of the no Intelligent target contract for receiving upwards transmission port transmission, home type includes the safety of access address
Property information;If so, the access address of Intelligent target contract is added to safe and intelligent contract address list based on home type
Or dangerous intelligent contract address list.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Creation module judges whether the access address of Intelligent target contract belongs to safe and intelligent and close for first judgment module
About before address list, safe and intelligent contract address list and dangerous intelligent contract address list are created;
Receiving module, the home type of the address of the intelligent contract for receiving the transmission of third party's trust authority;
Adding module, for according to home type by the address of intelligent contract be added to safe and intelligent contract address list or
Dangerous intelligence contract address list.
In a kind of intelligent contract access system provided by the embodiments of the present application, first judgment module may include:
Transmission unit, for directly transmitting Intelligent target contract to intelligent contract test macro;
Receiving unit, for receiving intelligent contract test macro to the test result of Intelligent target contract;
Resolution unit, if test result shows Intelligent target contract safety, determines target intelligence for parsing test result
Energy contract is safe and intelligent contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Sending module, after judging whether Intelligent target contract is safe and intelligent contract for first judgment module, if sentencing
The intelligent contract that sets the goal is dangerous intelligent contract, then sends a warning message to the user client of access target intelligence contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Third judgment module, after determining Intelligent target contract for dangerous intelligent contract for first judgment module, judgement
Whether the solicited message of the continuation invocation target intelligence contract of user client transmission is received, if so, allowing user client
Invocation target intelligence contract is held, if it is not, then forbidding user client invocation target intelligence contract.
Present invention also provides a kind of block chain node device and computer readable storage mediums, all have the application reality
It applies and corresponds to effect possessed by a kind of intelligent contract access method of example offer.Referring to Fig. 4, Fig. 4 mentions for the embodiment of the present application
A kind of structural schematic diagram of the block chain node device supplied.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor
Following steps are realized when the computer program stored in 402 execution memories 401:
Obtain Intelligent target contract;
Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor
Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: obtaining the access of Intelligent target contract
Address, judges whether the access address of Intelligent target contract belongs to safe and intelligent contract address list, if so, determining target intelligence
Energy contract is safe and intelligent contract;If the access address of Intelligent target contract is not belonging to safe and intelligent contract address list, into
One step judges whether the access address of Intelligent target contract belongs to dangerous intelligent contract address list, if belonging to dangerous intelligent contract
Address list then determines Intelligent target contract for dangerous intelligent contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor
Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: judging the access of Intelligent target contract
Whether address belongs to after dangerous intelligent contract address list, if the access address of Intelligent target contract is not belonging to dangerous intelligence and closes
About address list then judges whether the home type for receiving the address of the Intelligent target contract of upwards transmission port transmission, belongs to class
Type includes the safety information of access address, if so, being added to the access address of Intelligent target contract based on home type
Safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor
Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: judging the access of Intelligent target contract
Whether address belongs to before safe and intelligent contract address list, with creating safe and intelligent contract address list and dangerous intelligent contract
Location list;Receive the home type of the address for the intelligent contract that third party's trust authority is sent;According to home type by intelligent conjunction
Address about is added to safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor
Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: directly transmitting Intelligent target contract extremely
Intelligent contract test macro;Intelligent contract test macro is received to the test result of Intelligent target contract;Test result is parsed, if
Test result shows Intelligent target contract safety, then determines Intelligent target contract for safe and intelligent contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor
402 execution memories 401 in store computer subprogram when be implemented as follows step: judge Intelligent target contract whether be
After safe and intelligent contract, if it is determined that Intelligent target contract is dangerous intelligent contract, then send a warning message to access target intelligence
The user client of energy contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor
Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: determining that Intelligent target contract is danger
After intelligent contract, judge whether the solicited message for receiving the continuation invocation target intelligence contract of user client transmission, if
It is then to allow user client invocation target intelligence contract, if it is not, then forbidding user client invocation target intelligence contract.
Referring to Fig. 5, can also include: in another intelligent contract protection equipment provided by the embodiments of the present application and handle
The input port 403 that device 402 connects is used for transmission the extraneous order inputted to processor 402;What is connect with processor 402 is aobvious
Show unit 404, the processing result for video-stream processor 402 is to the external world;The communication module 405 connecting with processor 402, is used for
Realize block chain node device and extraneous communication.Display unit 404 can make display etc. for display panel, laser scanning;
Communication mode used by communication module 405 includes but is not limited to mobile high definition chained technology (HML), universal serial bus
(USB), high-definition media interface (HDMI), wireless connection: adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption are blue
The tooth communication technology, the communication technology based on IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Calculation machine program, realizes following steps when computer program is executed by processor:
Obtain Intelligent target contract;
Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: obtaining the access of Intelligent target contract
Address, judges whether the access address of Intelligent target contract belongs to safe and intelligent contract address list, if so, determining target intelligence
Energy contract is safe and intelligent contract;If the access address of Intelligent target contract is not belonging to safe and intelligent contract address list, into
One step judges whether the access address of Intelligent target contract belongs to dangerous intelligent contract address list, if so, determining target intelligence
Energy contract is dangerous intelligent contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: judging the access of Intelligent target contract
Whether address belongs to after dangerous intelligent contract address list, if the access address of Intelligent target contract is not belonging to dangerous intelligence and closes
About address list then judges whether the home type for receiving the access address of the Intelligent target contract of upwards transmission port transmission, returns
Belong to include in type access address safety information, if so, based on home type by the access address of Intelligent target contract
It is added to safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: judging the access of Intelligent target contract
Whether address belongs to before safe and intelligent contract address list, with creating safe and intelligent contract address list and dangerous intelligent contract
Location list;Receive the home type of the address for the intelligent contract that third party's trust authority is sent;According to home type by intelligent conjunction
Address about is added to safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: directly transmitting Intelligent target contract extremely
Intelligent contract test macro;Intelligent contract test macro is received to the test result of Intelligent target contract;Test result is parsed, if
Test result shows Intelligent target contract safety, then determines Intelligent target contract for safe and intelligent contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Calculate loom program, computer subprogram is implemented as follows step when being executed by processor: judge Intelligent target contract whether be
After safe and intelligent contract, if it is determined that Intelligent target contract is dangerous intelligent contract, then send a warning message to access target intelligence
The user client of energy contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium
Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: determining that Intelligent target contract is danger
After intelligent contract, judge whether the solicited message for receiving the continuation invocation target intelligence contract of user client transmission, if
It is then to allow user client invocation target intelligence contract, if it is not, then forbidding user client invocation target intelligence contract.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
Any other form of storage medium well known to interior.
A kind of intelligent contract access system, block chain node device and computer-readable storage provided by the embodiments of the present application
The explanation of relevant portion refers to corresponding part in a kind of intelligent contract access method provided by the embodiments of the present application in medium
It is described in detail, details are not described herein.In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond to skill in the prior art
The consistent part of art scheme realization principle is simultaneously unspecified, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one
Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation
There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can
Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited
It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest
Range.
Claims (10)
1. a kind of intelligence contract access method, which is characterized in that applied in the either block chain node of block catenary system, wrap
It includes:
Obtain Intelligent target contract;
Judge whether the Intelligent target contract is safe and intelligent contract, if so, allowing to access and call the Intelligent target
Contract.
2. judging whether the Intelligent target contract is safety intelligent the method according to claim 1, wherein described
Energy contract, comprising:
Obtain the access address of the Intelligent target contract;
Judge whether the access address belongs to safe and intelligent contract address list;
If so, determining the Intelligent target contract for safe and intelligent contract;
If it is not, then further judging whether the access address belongs to dangerous intelligent contract address list, if belonging to the danger
Intelligent contract address list then determines the Intelligent target contract for dangerous intelligent contract.
3. according to the method described in claim 2, it is characterized in that, judging whether the access address belongs to the danger described
After the intelligence contract address list of danger, further includes:
If the access address is not belonging to the dangerous intelligent contract address list, judge whether to receive upwards transmission port transmission
The access address home type, the home type includes the safety information of the access address;
If so, the access address is added to the safe and intelligent contract address list or described based on the home type
Dangerous intelligence contract address list.
4. according to the method described in claim 2, it is characterized in that, described judge whether the access address belongs to safe and intelligent
Before contract address list, further includes:
Create the safe and intelligent contract address list and the dangerous intelligent contract address list;
Receive the home type of the address for the intelligent contract that third party's trust authority is sent;
The address of the intelligent contract is added to the safe and intelligent contract address list or described according to the home type
Dangerous intelligence contract address list.
5. judging whether the Intelligent target contract is safety intelligent the method according to claim 1, wherein described
Energy contract, comprising:
The Intelligent target contract is directly transmitted to intelligent contract test macro;
The intelligent contract test macro is received to the test result of the Intelligent target contract;
The test result is parsed, if the test result shows the Intelligent target contract safety, determines the target intelligence
Energy contract is safe and intelligent contract.
6. method according to any one of claims 1 to 5, which is characterized in that described to judge that the Intelligent target contract is
It is no for after safe and intelligent contract, further includes:
If it is determined that the Intelligent target contract is dangerous intelligent contract, then send a warning message to the access Intelligent target contract
User client.
7. according to the method described in claim 6, it is characterized in that, described determine that the Intelligent target contract closes for dangerous intelligence
After about, further includes:
Judge whether to receive that the user client sends continues to call the solicited message of the Intelligent target contract, if
It is that the user client is then allowed to call the Intelligent target contract, if it is not, then forbidding described in the user client calling
Intelligent target contract.
8. a kind of intelligence contract accesses system, which is characterized in that applied in the either block chain node of block catenary system, wrap
It includes:
First obtains module, for obtaining Intelligent target contract;
First judgment module, for judging whether the Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously
Call the Intelligent target contract.
9. a kind of block chain node device characterized by comprising
Memory, for storing computer program;
Processor realizes intelligent contract access as described in any one of claim 1 to 7 when for executing the computer program
The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program, the computer program realize intelligent contract access side as described in any one of claim 1 to 7 when being executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811115832.2A CN109345390A (en) | 2018-09-25 | 2018-09-25 | A kind of intelligence contract access method, system, equipment and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811115832.2A CN109345390A (en) | 2018-09-25 | 2018-09-25 | A kind of intelligence contract access method, system, equipment and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109345390A true CN109345390A (en) | 2019-02-15 |
Family
ID=65306659
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811115832.2A Pending CN109345390A (en) | 2018-09-25 | 2018-09-25 | A kind of intelligence contract access method, system, equipment and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109345390A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110245506A (en) * | 2019-05-30 | 2019-09-17 | 阿里巴巴集团控股有限公司 | Intelligent contract administration method and device based on block chain, electronic equipment |
CN110517047A (en) * | 2019-09-04 | 2019-11-29 | 腾讯科技(深圳)有限公司 | Virtual objects calling processing method, device and equipment and medium based on block chain |
CN110610423A (en) * | 2019-09-09 | 2019-12-24 | 杭州秘猿科技有限公司 | Processing method for supporting stateful and stateless contracts by block chain intelligent contract platform |
CN110765490A (en) * | 2019-10-31 | 2020-02-07 | 北京海益同展信息科技有限公司 | Method and apparatus for processing information |
CN111444090A (en) * | 2020-03-24 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Contract testing method and device in block chain, electronic equipment and storage medium |
US10839107B2 (en) | 2019-05-30 | 2020-11-17 | Advanced New Technologies Co., Ltd. | Managing a smart contract on a blockchain |
CN112199096A (en) * | 2020-09-30 | 2021-01-08 | 深圳壹账通智能科技有限公司 | Intelligent contract deployment detection method and device, node equipment and storage medium |
CN112862493A (en) * | 2021-01-27 | 2021-05-28 | 中山大学 | Intelligent Pompe deception detection method, device, terminal and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180089759A1 (en) * | 2016-09-26 | 2018-03-29 | Shapeshift Ag | System and method of managing trustless asset portfolios |
CN108462724A (en) * | 2018-05-17 | 2018-08-28 | 北京京东金融科技控股有限公司 | Data sharing method, device, system, member node and readable storage medium storing program for executing |
CN108537668A (en) * | 2018-04-11 | 2018-09-14 | 北京奇虎科技有限公司 | Digital cash method of commerce and device, computing device based on intelligent contract |
-
2018
- 2018-09-25 CN CN201811115832.2A patent/CN109345390A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180089759A1 (en) * | 2016-09-26 | 2018-03-29 | Shapeshift Ag | System and method of managing trustless asset portfolios |
CN108537668A (en) * | 2018-04-11 | 2018-09-14 | 北京奇虎科技有限公司 | Digital cash method of commerce and device, computing device based on intelligent contract |
CN108462724A (en) * | 2018-05-17 | 2018-08-28 | 北京京东金融科技控股有限公司 | Data sharing method, device, system, member node and readable storage medium storing program for executing |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110245506A (en) * | 2019-05-30 | 2019-09-17 | 阿里巴巴集团控股有限公司 | Intelligent contract administration method and device based on block chain, electronic equipment |
US10839107B2 (en) | 2019-05-30 | 2020-11-17 | Advanced New Technologies Co., Ltd. | Managing a smart contract on a blockchain |
US11048825B2 (en) | 2019-05-30 | 2021-06-29 | Advanced New Technologies Co., Ltd. | Managing a smart contract on a blockchain |
CN110517047A (en) * | 2019-09-04 | 2019-11-29 | 腾讯科技(深圳)有限公司 | Virtual objects calling processing method, device and equipment and medium based on block chain |
CN110610423A (en) * | 2019-09-09 | 2019-12-24 | 杭州秘猿科技有限公司 | Processing method for supporting stateful and stateless contracts by block chain intelligent contract platform |
CN110765490A (en) * | 2019-10-31 | 2020-02-07 | 北京海益同展信息科技有限公司 | Method and apparatus for processing information |
CN111444090A (en) * | 2020-03-24 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Contract testing method and device in block chain, electronic equipment and storage medium |
CN111444090B (en) * | 2020-03-24 | 2024-04-26 | 腾讯科技(深圳)有限公司 | Contract testing method and device in blockchain, electronic equipment and storage medium |
CN112199096A (en) * | 2020-09-30 | 2021-01-08 | 深圳壹账通智能科技有限公司 | Intelligent contract deployment detection method and device, node equipment and storage medium |
CN112862493A (en) * | 2021-01-27 | 2021-05-28 | 中山大学 | Intelligent Pompe deception detection method, device, terminal and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109345390A (en) | A kind of intelligence contract access method, system, equipment and computer storage medium | |
CN104620225B (en) | Method and system for server security checking | |
CN104486138A (en) | Flow monitoring method and device and monitoring server | |
CN113762525B (en) | Federal learning model training method with differential privacy protection | |
CN106604362B (en) | A kind of Wireless Fidelity Wi-Fi scan method and mobile terminal | |
CN105873049A (en) | Method and equipment for obtaining shared wireless access point | |
CN109445820A (en) | A kind of intelligence contract upgrade method, system, equipment and computer storage medium | |
CN109213857A (en) | A kind of fraud recognition methods and device | |
CN113094761B (en) | Method for monitoring federated learning data tamper-proofing and related device | |
CN105260660A (en) | Monitoring method, device and system of intelligent terminal payment environment | |
CN109272324A (en) | A kind of business function implementation method, system, equipment and computer storage medium | |
CN106201856A (en) | A kind of multi version performance test methods and device | |
CN107370685A (en) | A kind of internet-of-things terminal cut-in method and device | |
CN105550584A (en) | RBAC based malicious program interception and processing method in Android platform | |
CN109474599A (en) | Network protection method and device based on block chain | |
CN105873239A (en) | Method used for establishing wireless connection for application of user equipment | |
CN107623732A (en) | A kind of date storage method based on cloud platform, device, equipment and storage medium | |
US20190147443A1 (en) | Payment method based on mobile terminal and mobile terminal | |
CN106127463A (en) | One is transferred accounts control method and terminal unit | |
CN109743231A (en) | A kind of acl feature test method and device | |
CN106664535B (en) | A kind of method for sending information, device, terminal device and system | |
CN105916181A (en) | Network switching method and device | |
CN107301349A (en) | A kind of Access and control strategy of database method and system | |
CN110209417A (en) | A kind of base station and base station update method | |
CN106550405B (en) | Network data receiving control method and system based on mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190215 |
|
RJ01 | Rejection of invention patent application after publication |