CN109345390A - A kind of intelligence contract access method, system, equipment and computer storage medium - Google Patents

A kind of intelligence contract access method, system, equipment and computer storage medium Download PDF

Info

Publication number
CN109345390A
CN109345390A CN201811115832.2A CN201811115832A CN109345390A CN 109345390 A CN109345390 A CN 109345390A CN 201811115832 A CN201811115832 A CN 201811115832A CN 109345390 A CN109345390 A CN 109345390A
Authority
CN
China
Prior art keywords
contract
intelligent
access
safe
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811115832.2A
Other languages
Chinese (zh)
Inventor
刘新
黄庆财
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201811115832.2A priority Critical patent/CN109345390A/en
Publication of CN109345390A publication Critical patent/CN109345390A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of intelligent contract access method, system, equipment and computer storage medium, applied in the either block chain node of block catenary system, wherein this method comprises: obtaining Intelligent target contract;Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract.A kind of intelligent contract access method disclosed in the present application, after obtaining Intelligent target contract, it is not direct permission invocation target intelligence contract, but first judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract again, so that the Intelligent target contract that can be accessed calling is safe and intelligent contract, compared with calling directly intelligent contract in the prior art, the safety of intelligent contract can be improved to a certain extent.A kind of intelligent contract access system, equipment and computer readable storage medium disclosed in the present application also solve the problems, such as relevant art.

Description

A kind of intelligence contract access method, system, equipment and computer storage medium
Technical field
This application involves block chain technical fields, more specifically to a kind of intelligent contract access method, system, set Standby and computer storage medium.
Background technique
With the reinforcement of confidential notions and demand, block chain technology is able to extensively due to its characteristic that can not be tampered easily Using.In existing block chain application platform, the address of intelligent contract is stored in central server, and attacker can use technology Means distort the address of intelligent contract, user institute intelligent contract to be applied are oriented to other intelligent contracts, thus directly adjusting With cause information to defraud of after Intelligent target contract, the consequences such as financial fraud.
In conclusion the safety for how improving intelligent contract is a problem to be solved by those skilled in the art.
Summary of the invention
The purpose of the application is to provide a kind of intelligent contract access method, can solve how to improve intelligence to a certain extent The technical issues of safety of energy contract.Present invention also provides a kind of intelligent contract access system, block chain node device and Computer readable storage medium.
To achieve the goals above, the application provides the following technical solutions:
A kind of intelligence contract access method, applied in the either block chain node of block catenary system, comprising:
Obtain Intelligent target contract;
Judge whether the Intelligent target contract is safe and intelligent contract, if so, allowing to access and call the target Intelligent contract.
It is preferably, described to judge whether the Intelligent target contract is safe and intelligent contract, comprising:
Obtain the access address of the Intelligent target contract;
Judge whether the access address belongs to safe and intelligent contract address list;
If so, determining the Intelligent target contract for safe and intelligent contract;
If it is not, then further judging whether the access address belongs to dangerous intelligent contract address list, if belonging to described Dangerous intelligence contract address list then determines the Intelligent target contract for dangerous intelligent contract.
Preferably, it is described judge whether the access address belongs to the dangerous intelligent contract address list after, also Include:
If the access address is not belonging to the dangerous intelligent contract address list, judge whether to receive upwards transmission port The home type of the access address of transmission, the home type includes the safety information of the access address;
If so, based on the home type by the access address be added to the safe and intelligent contract address list or The dangerous intelligent contract address list.
It is preferably, described to judge whether the access address belongs to before safe and intelligent contract address list, further includes:
Create the safe and intelligent contract address list and the dangerous intelligent contract address list;
Receive the home type of the address for the intelligent contract that third party's trust authority is sent;
According to the home type by the address of the intelligent contract be added to the safe and intelligent contract address list or The dangerous intelligent contract address list.
It is preferably, described to judge whether the Intelligent target contract is safe and intelligent contract, comprising:
The Intelligent target contract is directly transmitted to intelligent contract test macro;
The intelligent contract test macro is received to the test result of the Intelligent target contract;
The test result is parsed, if the test result shows the Intelligent target contract safety, determines the mesh Marking intelligent contract is safe and intelligent contract.
Preferably, it is described judge whether the Intelligent target contract is safe and intelligent contract after, further includes:
If it is determined that the Intelligent target contract is dangerous intelligent contract, then send a warning message to the access Intelligent target The user client of contract.
Preferably, after the judgement Intelligent target contract is dangerous intelligent contract, further includes:
Judge whether to receive that the user client sends continues to call the solicited message of the Intelligent target contract, If so, allowing the user client to call the Intelligent target contract, if it is not, the user client is then forbidden to call institute State Intelligent target contract.
A kind of intelligence contract access system, applied in the either block chain node of block catenary system, comprising:
First obtains module, for obtaining Intelligent target contract;
First judgment module, for judging whether the Intelligent target contract is safe and intelligent contract, if so, allowing to visit It asks and calls the Intelligent target contract.
Preferably, the first judgment module includes:
First acquisition unit, for obtaining the access address of the Intelligent target contract;
First judging unit, for judging whether the access address belongs to safe and intelligent contract address list, if so, Determine the Intelligent target contract for safe and intelligent contract;
Second judgment unit, for first judging unit determine the Intelligent target contract address be not belonging to it is described When safe and intelligent contract address list, further judge whether the access address belongs to dangerous intelligent contract address list, if Belong to the dangerous intelligent contract address list, then determines the Intelligent target contract for dangerous intelligent contract.
Preferably, further includes:
Second judgment module, for judging whether the address of the Intelligent target contract belongs in the second judgment unit After the dangerous intelligent contract address list, if the access address is not belonging to the dangerous intelligent contract address list, Judge whether to receive the home type of the address of the Intelligent target contract of upwards transmission port transmission, the home type includes The safety information of the access address;If so, the access address is added to the safety based on the home type Intelligent contract address list or the dangerous intelligent contract address list.
Preferably, further includes:
Creation module judges whether the access address belongs to safe and intelligent contract address for the first judgment module Before list, the safe and intelligent contract address list and the dangerous intelligent contract address list are created;
Receiving module, the home type of the address of the intelligent contract for receiving the transmission of third party's trust authority;
Adding module is closed for the address of the intelligent contract to be added to the safe and intelligent according to the home type About address list or the dangerous intelligent contract address list.
Preferably, the first judgment module includes:
Transmission unit, for directly transmitting the Intelligent target contract to intelligent contract test macro;
Receiving unit, for receiving the intelligent contract test macro to the test result of the Intelligent target contract;
Resolution unit, for parsing the test result, if the test result shows the Intelligent target contract safety, Then determine the Intelligent target contract for safe and intelligent contract.
Preferably, further includes:
Sending module, for the first judgment module judge the Intelligent target contract whether be safe and intelligent contract it Afterwards, it if it is determined that the Intelligent target contract is dangerous intelligent contract, then sends a warning message to the access Intelligent target contract User client.
Preferably, further includes:
Third judgment module, for the first judgment module determine the Intelligent target contract for dangerous intelligent contract it Afterwards, judge whether to receive that the user client sends continues to call the solicited message of the Intelligent target contract, if so, The user client is then allowed to call the Intelligent target contract, if it is not, the user client is then forbidden to call the mesh Mark intelligent contract.
A kind of block chain node device, comprising:
Memory, for storing computer program;
Processor realizes the step of as above any intelligent contract access method when for executing the computer program Suddenly.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, described The step of as above any described intelligent contract access method is realized when computer program is executed by processor.
A kind of intelligent contract access method provided by the present application, applied in the either block chain node of block catenary system, It include: to obtain Intelligent target contract;Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access and adjust With Intelligent target contract.A kind of intelligent contract access method provided by the present application is not straight after obtaining Intelligent target contract Connecing allows to access simultaneously invocation target intelligence contract, but first judges whether Intelligent target contract is safe and intelligent contract, if so, Allow to access again and invocation target intelligence contract, so that can be accessed and the Intelligent target contract that calls is that safe and intelligent closes About, compared with calling directly intelligent contract in the prior art, the safety of intelligent contract can be improved to a certain extent.This Shen A kind of intelligent contract access system, block chain node device and the computer readable storage medium that please be provided also solve corresponding skill Art problem.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of first pass figure of intelligent contract access method provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of intelligent contract access method provided by the embodiments of the present application in practical application;
Fig. 3 is the structural schematic diagram that a kind of intelligent contract provided by the embodiments of the present application accesses system;
Fig. 4 is a kind of structural schematic diagram of block chain node device provided by the embodiments of the present application;
Fig. 5 is a kind of another structural schematic diagram of block chain node device provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
This application involves block chain technologies, in order to make it easy to understand, below will be to block chain in the embodiment of the present application (Block Chain) is simply introduced, and block chain is distribution disclosed in all block chain nodes to access server The data structure of storage includes several blocks (Block).User terminal comprising client can be registered as an area Block chain node forms P2P network with other block chain nodes of access block chain server, and block chain data can be stored in P2P network, any one or more block chain nodes of P2P network paralysis, will not result in the loss of block chain data, such area Block chain data just have very strong safety, it is ensured that the persistence of data and can not distort.When a block is persisted to area When in block chain data, the block chain node of access server can add the block;Block is according to persistence time sequencing Singly it is added in block chain data, each block other than first block in block chain data will chain It is connected to its previous block, such block chain data just form a block and link this block, just as a chain one Sample, as soon as the block can not be modified after a block is persisted to block chain data.
With the reinforcement of confidential notions and demand, block chain technology is able to extensively due to its characteristic that can not be tampered easily Using.In existing block chain application platform, the address of intelligent contract is stored in central server, and attacker can use technology Means distort the address of intelligent contract, user institute intelligent contract to be applied are oriented to other intelligent contracts, to call directly Information is caused to defraud of after intelligent contract, the consequences such as financial fraud.A kind of intelligent contract access method provided by the present application can mention The safety of high intelligence contract.
Referring to Fig. 1, Fig. 1 is a kind of first pass figure of intelligent contract access method provided by the embodiments of the present application.
A kind of intelligent contract access method provided by the embodiments of the present application, is applied in block catenary system, may include:
Step S101: Intelligent target contract is obtained.
In practical application, block chain node first obtains Intelligent target contract, and Intelligent target contract is the intelligence to be called Contract, the type and function of Intelligent target contract can be determine according to actual needs.In addition, Intelligent target contract can be in advance The intelligent contract being stored in block catenary system is also possible to the intelligent contract etc. that block chain node real-time reception arrives.
Step S102: judging whether Intelligent target contract is safe and intelligent contract, if so, thening follow the steps S103: allowing Access simultaneously invocation target intelligence contract.
Block chain node first judges whether Intelligent target contract is safe and intelligent contract after obtaining Intelligent target contract, If so, allowing to access simultaneously invocation target intelligence contract, if it is not, the operation etc. for forbidding invocation target intelligence contract can be executed. Judge whether Intelligent target contract is that the mode of safe and intelligent contract can be determined flexibly according to actual needs, for example it can be adopted Judge whether Intelligent target contract is safe and intelligent contract with the mode of static state judgement, then judges whether Intelligent target contract is peace Full intelligence contract, can be with specifically: the access address for obtaining Intelligent target contract judges that the access address of Intelligent target contract is It is no to belong to safe and intelligent contract address list, if so, determining that Intelligent target contract is safe and intelligent contract;If Intelligent target closes Address about is not belonging to safe and intelligent contract address list, then further judges whether the address of Intelligent target contract belongs to danger Intelligent contract address list determines Intelligent target contract for dangerous intelligent contract if belonging to dangerous intelligent contract address list; Wherein, the intelligent contract address in safe and intelligent contract address list is safe and intelligent contract address, dangerous intelligence contract Intelligent contract address in the list of location is dangerous intelligent contract address.
Optionally, the intelligent contract address in safe and intelligent contract address list and dangerous intelligent contract address list can be with It is directly specified by extraneous, then judges whether the address of Intelligent target contract belongs to before safe and intelligent contract address list, block Chain node first creates safe and intelligent contract address list and dangerous intelligent contract address list;Third party's trust authority is received to send Intelligent contract address home type, include the safety information of access address in home type, to indicate intelligent conjunction Whether address about is safe;The address of intelligent contract is added to safe and intelligent contract address list or danger according to home type Intelligent contract address list.Third party's trust authority can be determined flexibly according to actual needs, from the effect of home type Home type shows that the address of an intelligent contract belongs to safe and intelligent contract address list or dangerous intelligent contract address column Table.In addition, block chain node had both been not belonging to safe and intelligent contract address list in the address for determining Intelligent target contract, also do not belong to When dangerous intelligent contract address list, just indicate that the Intelligent target contract is the unknown intelligent contract of safety, at this point, block Chain node can decide whether to receive the home type of the access address of the Intelligent target contract of upwards transmission port transmission, if so, The access address of Intelligent target contract is then added to by safe and intelligent contract address list based on home type or dangerous intelligence is closed About address list, and determine whether Intelligent target contract is safe based on home type;In concrete application scene, in order to verify as early as possible Intelligent target contract can be sent to the credible machine of third party by the safety of unknown Intelligent target contract, block chain node Structure prompts third party's trust authority to verify Intelligent target contract.In addition, block chain node can also be according to intelligent contract Danger classes dangerous intelligent contract address list is divided into the intelligent contract address list for indicating different danger classes, such as can With the grade for having potential threat according to intelligent contract and having invasive to threaten, dangerous intelligent contract address list is divided into potential prestige Intelligent contract address list, the intelligent contract address list of invasive threat are coerced, correspondingly, can be according to the intelligence of different danger classes Energy contract address list does differentiated processing, such as area to the intelligent contract for belonging to different dangerous intelligent contract address lists Block chain node, which can permit to call under specific condition, belongs to the intelligent contract of potential threat intelligence contract address list and any In the case of do not allow to call and belong to the intelligent contract etc. that invasive threatens intelligent contract address list, dangerous intelligence contract address The specific hierarchical approaches of list and the mode handled the differentiated of the intelligent contract address list of different danger classes can roots According to actual needs flexibly setting.
In practical application, whether the mode that block chain node can use dynamic to judge judges Intelligent target contract as safety Intelligent contract then judges whether Intelligent target contract is safe and intelligent contract, can be with specifically: directly transmits Intelligent target contract To intelligent contract test macro;Intelligent contract test macro is received to the test result of Intelligent target contract;Test result is parsed, If test result shows Intelligent target contract safety, Intelligent target contract is determined for safe and intelligent contract, if test result table Bright Intelligent target contract is dangerous, then determines Intelligent target contract for dangerous intelligent contract.Optionally, it is tested by intelligent contract The mode that system carries out safety judgement to Intelligent target contract can be with above-mentioned by safe and intelligent contract address list and danger Danger intelligence contract address list judges that the mode of the safety of Intelligent target contract combines, for example block chain node testing The result shows that the address of Intelligent target contract can be stored in safe and intelligent contract address list when Intelligent target contract is safe, And when test result shows that Intelligent target contract is dangerous, the address of Intelligent target contract can be stored in dangerous intelligent contract Address list etc., other feasible combinations can be determine according to actual needs.
In practical application, in the case where block chain node forbids user client invocation target intelligence contract, in order to full Grasp of the sufficient user client to information, block chain node can be after determining Intelligent target contract for dangerous intelligent contract, hair Send warning information to the user client of access target intelligence contract.The particular content and form of warning information can be according to reality It needs to be determined that for example it may include the consequence etc. of risk present in Intelligent target contract and invocation target intelligence contract. In addition, in order to improve the hommization of block catenary system, after block chain node determines Intelligent target contract for dangerous intelligent contract, It can also first judge whether to receive the solicited message of the continuation invocation target intelligence contract of user client transmission, if so, Allow user client invocation target intelligence contract, if it is not, then forbidding user client invocation target intelligence contract;In addition, being Accurately the behavior for calling dangerous intelligent contract is really weighed convenient for subsequent, block chain node can also send out user client It send and continues this information cochain of the solicited message of invocation target intelligence contract.
A kind of intelligent contract access method provided by the present application, applied in the either block chain node of block catenary system, It include: to obtain Intelligent target contract;Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access and adjust With Intelligent target contract.A kind of intelligent contract access method provided by the present application is not straight after obtaining Intelligent target contract Connecing allows to access simultaneously invocation target intelligence contract, but first judges whether Intelligent target contract is safe and intelligent contract, if so, Allow to access again and invocation target intelligence contract, so that can be accessed and the Intelligent target contract that calls is that safe and intelligent closes About, compared with calling directly intelligent contract in the prior art, the safety of intelligent contract can be improved to a certain extent.
Referring to Fig. 2, Fig. 2 is a kind of process of intelligent contract access method provided by the embodiments of the present application in practical application Figure.
A kind of intelligent contract access method provided by the embodiments of the present application may comprise steps of in practical application:
Step S201: creation safe and intelligent contract address list and dangerous intelligent contract address list.
Step S202: the home type of the address for the intelligent contract that third party's trust authority is sent is received;According to ownership class The address of intelligent contract is added to safe and intelligent contract address list or dangerous intelligent contract address list by type.
Step S203: Intelligent target contract is obtained.
Step S204: judging whether the address of Intelligent target contract belongs to safe and intelligent contract address list, if so, holding Row step S205;If the address of Intelligent target contract is not belonging to safe and intelligent contract address list, S206 is thened follow the steps.
Step S205: allowing to access and invocation target intelligence contract.
Step S206: judging whether the address of Intelligent target contract belongs to dangerous intelligent contract address list, if so, holding Row step S207, if it is not, thening follow the steps S208.
Step S207: forbid invocation target intelligence contract.
Step S208: Intelligent target contract is directly transmitted to intelligent contract test macro, receives intelligent contract test macro To the test result of Intelligent target contract, test result is parsed.
Step S209: if test result shows Intelligent target contract safety, determine Intelligent target contract for safe and intelligent The address of Intelligent target contract is added to safe and intelligent contract address list by contract.
Step S210: if test result shows Intelligent target, contract is dangerous, determines Intelligent target contract for dangerous intelligence The address of Intelligent target contract is added to dangerous intelligent contract address list by energy contract.
Present invention also provides a kind of intelligent contracts to access system, with a kind of intelligence conjunction provided by the embodiments of the present application About effect is corresponded to possessed by access method.Referring to Fig. 3, Fig. 3 is a kind of intelligent contract access provided by the embodiments of the present application The structural schematic diagram of system.
A kind of intelligent contract provided by the embodiments of the present application accesses system, is applied in block catenary system, may include:
First obtains module 301, for obtaining Intelligent target contract;
First judgment module 302, for judging whether Intelligent target contract is safe and intelligent contract, if so, allowing to visit Ask simultaneously invocation target intelligence contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, first judgment module may include:
First acquisition unit, for obtaining the access address of Intelligent target contract;
First judging unit, for judging whether access address belongs to safe and intelligent contract address list, if so, determining Intelligent target contract is safe and intelligent contract;
Second judgment unit determines that access address is not belonging to safe and intelligent contract address list for the first judging unit When, further judge whether the address of Intelligent target contract belongs to dangerous intelligent contract address list, is closed if belonging to dangerous intelligence About address list then determines Intelligent target contract for dangerous intelligent contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Second judgment module, for judging whether the address of Intelligent target contract belongs to dangerous intelligence in second judgment unit After contract address list, if the access address of Intelligent target contract is not belonging to dangerous intelligent contract address list, judgement is The home type of the address of the no Intelligent target contract for receiving upwards transmission port transmission, home type includes the safety of access address Property information;If so, the access address of Intelligent target contract is added to safe and intelligent contract address list based on home type Or dangerous intelligent contract address list.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Creation module judges whether the access address of Intelligent target contract belongs to safe and intelligent and close for first judgment module About before address list, safe and intelligent contract address list and dangerous intelligent contract address list are created;
Receiving module, the home type of the address of the intelligent contract for receiving the transmission of third party's trust authority;
Adding module, for according to home type by the address of intelligent contract be added to safe and intelligent contract address list or Dangerous intelligence contract address list.
In a kind of intelligent contract access system provided by the embodiments of the present application, first judgment module may include:
Transmission unit, for directly transmitting Intelligent target contract to intelligent contract test macro;
Receiving unit, for receiving intelligent contract test macro to the test result of Intelligent target contract;
Resolution unit, if test result shows Intelligent target contract safety, determines target intelligence for parsing test result Energy contract is safe and intelligent contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Sending module, after judging whether Intelligent target contract is safe and intelligent contract for first judgment module, if sentencing The intelligent contract that sets the goal is dangerous intelligent contract, then sends a warning message to the user client of access target intelligence contract.
In a kind of intelligent contract access system provided by the embodiments of the present application, can also include:
Third judgment module, after determining Intelligent target contract for dangerous intelligent contract for first judgment module, judgement Whether the solicited message of the continuation invocation target intelligence contract of user client transmission is received, if so, allowing user client Invocation target intelligence contract is held, if it is not, then forbidding user client invocation target intelligence contract.
Present invention also provides a kind of block chain node device and computer readable storage mediums, all have the application reality It applies and corresponds to effect possessed by a kind of intelligent contract access method of example offer.Referring to Fig. 4, Fig. 4 mentions for the embodiment of the present application A kind of structural schematic diagram of the block chain node device supplied.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor Following steps are realized when the computer program stored in 402 execution memories 401:
Obtain Intelligent target contract;
Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: obtaining the access of Intelligent target contract Address, judges whether the access address of Intelligent target contract belongs to safe and intelligent contract address list, if so, determining target intelligence Energy contract is safe and intelligent contract;If the access address of Intelligent target contract is not belonging to safe and intelligent contract address list, into One step judges whether the access address of Intelligent target contract belongs to dangerous intelligent contract address list, if belonging to dangerous intelligent contract Address list then determines Intelligent target contract for dangerous intelligent contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: judging the access of Intelligent target contract Whether address belongs to after dangerous intelligent contract address list, if the access address of Intelligent target contract is not belonging to dangerous intelligence and closes About address list then judges whether the home type for receiving the address of the Intelligent target contract of upwards transmission port transmission, belongs to class Type includes the safety information of access address, if so, being added to the access address of Intelligent target contract based on home type Safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: judging the access of Intelligent target contract Whether address belongs to before safe and intelligent contract address list, with creating safe and intelligent contract address list and dangerous intelligent contract Location list;Receive the home type of the address for the intelligent contract that third party's trust authority is sent;According to home type by intelligent conjunction Address about is added to safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: directly transmitting Intelligent target contract extremely Intelligent contract test macro;Intelligent contract test macro is received to the test result of Intelligent target contract;Test result is parsed, if Test result shows Intelligent target contract safety, then determines Intelligent target contract for safe and intelligent contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor 402 execution memories 401 in store computer subprogram when be implemented as follows step: judge Intelligent target contract whether be After safe and intelligent contract, if it is determined that Intelligent target contract is dangerous intelligent contract, then send a warning message to access target intelligence The user client of energy contract.
A kind of block chain node device provided by the embodiments of the present application, including memory 401 and processor 402, processor Step is implemented as follows when the computer subprogram stored in 402 execution memories 401: determining that Intelligent target contract is danger After intelligent contract, judge whether the solicited message for receiving the continuation invocation target intelligence contract of user client transmission, if It is then to allow user client invocation target intelligence contract, if it is not, then forbidding user client invocation target intelligence contract.
Referring to Fig. 5, can also include: in another intelligent contract protection equipment provided by the embodiments of the present application and handle The input port 403 that device 402 connects is used for transmission the extraneous order inputted to processor 402;What is connect with processor 402 is aobvious Show unit 404, the processing result for video-stream processor 402 is to the external world;The communication module 405 connecting with processor 402, is used for Realize block chain node device and extraneous communication.Display unit 404 can make display etc. for display panel, laser scanning; Communication mode used by communication module 405 includes but is not limited to mobile high definition chained technology (HML), universal serial bus (USB), high-definition media interface (HDMI), wireless connection: adopting wireless fidelity technology (WiFi), Bluetooth Communication Technology, low-power consumption are blue The tooth communication technology, the communication technology based on IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Calculation machine program, realizes following steps when computer program is executed by processor:
Obtain Intelligent target contract;
Judge whether Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously invocation target intelligence contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: obtaining the access of Intelligent target contract Address, judges whether the access address of Intelligent target contract belongs to safe and intelligent contract address list, if so, determining target intelligence Energy contract is safe and intelligent contract;If the access address of Intelligent target contract is not belonging to safe and intelligent contract address list, into One step judges whether the access address of Intelligent target contract belongs to dangerous intelligent contract address list, if so, determining target intelligence Energy contract is dangerous intelligent contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: judging the access of Intelligent target contract Whether address belongs to after dangerous intelligent contract address list, if the access address of Intelligent target contract is not belonging to dangerous intelligence and closes About address list then judges whether the home type for receiving the access address of the Intelligent target contract of upwards transmission port transmission, returns Belong to include in type access address safety information, if so, based on home type by the access address of Intelligent target contract It is added to safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: judging the access of Intelligent target contract Whether address belongs to before safe and intelligent contract address list, with creating safe and intelligent contract address list and dangerous intelligent contract Location list;Receive the home type of the address for the intelligent contract that third party's trust authority is sent;According to home type by intelligent conjunction Address about is added to safe and intelligent contract address list or dangerous intelligent contract address list.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: directly transmitting Intelligent target contract extremely Intelligent contract test macro;Intelligent contract test macro is received to the test result of Intelligent target contract;Test result is parsed, if Test result shows Intelligent target contract safety, then determines Intelligent target contract for safe and intelligent contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Calculate loom program, computer subprogram is implemented as follows step when being executed by processor: judge Intelligent target contract whether be After safe and intelligent contract, if it is determined that Intelligent target contract is dangerous intelligent contract, then send a warning message to access target intelligence The user client of energy contract.
A kind of computer readable storage medium provided by the embodiments of the present application is stored with meter in computer readable storage medium Loom program is calculated, computer subprogram is implemented as follows step when being executed by processor: determining that Intelligent target contract is danger After intelligent contract, judge whether the solicited message for receiving the continuation invocation target intelligence contract of user client transmission, if It is then to allow user client invocation target intelligence contract, if it is not, then forbidding user client invocation target intelligence contract.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field Any other form of storage medium well known to interior.
A kind of intelligent contract access system, block chain node device and computer-readable storage provided by the embodiments of the present application The explanation of relevant portion refers to corresponding part in a kind of intelligent contract access method provided by the embodiments of the present application in medium It is described in detail, details are not described herein.In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond to skill in the prior art The consistent part of art scheme realization principle is simultaneously unspecified, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest Range.

Claims (10)

1. a kind of intelligence contract access method, which is characterized in that applied in the either block chain node of block catenary system, wrap It includes:
Obtain Intelligent target contract;
Judge whether the Intelligent target contract is safe and intelligent contract, if so, allowing to access and call the Intelligent target Contract.
2. judging whether the Intelligent target contract is safety intelligent the method according to claim 1, wherein described Energy contract, comprising:
Obtain the access address of the Intelligent target contract;
Judge whether the access address belongs to safe and intelligent contract address list;
If so, determining the Intelligent target contract for safe and intelligent contract;
If it is not, then further judging whether the access address belongs to dangerous intelligent contract address list, if belonging to the danger Intelligent contract address list then determines the Intelligent target contract for dangerous intelligent contract.
3. according to the method described in claim 2, it is characterized in that, judging whether the access address belongs to the danger described After the intelligence contract address list of danger, further includes:
If the access address is not belonging to the dangerous intelligent contract address list, judge whether to receive upwards transmission port transmission The access address home type, the home type includes the safety information of the access address;
If so, the access address is added to the safe and intelligent contract address list or described based on the home type Dangerous intelligence contract address list.
4. according to the method described in claim 2, it is characterized in that, described judge whether the access address belongs to safe and intelligent Before contract address list, further includes:
Create the safe and intelligent contract address list and the dangerous intelligent contract address list;
Receive the home type of the address for the intelligent contract that third party's trust authority is sent;
The address of the intelligent contract is added to the safe and intelligent contract address list or described according to the home type Dangerous intelligence contract address list.
5. judging whether the Intelligent target contract is safety intelligent the method according to claim 1, wherein described Energy contract, comprising:
The Intelligent target contract is directly transmitted to intelligent contract test macro;
The intelligent contract test macro is received to the test result of the Intelligent target contract;
The test result is parsed, if the test result shows the Intelligent target contract safety, determines the target intelligence Energy contract is safe and intelligent contract.
6. method according to any one of claims 1 to 5, which is characterized in that described to judge that the Intelligent target contract is It is no for after safe and intelligent contract, further includes:
If it is determined that the Intelligent target contract is dangerous intelligent contract, then send a warning message to the access Intelligent target contract User client.
7. according to the method described in claim 6, it is characterized in that, described determine that the Intelligent target contract closes for dangerous intelligence After about, further includes:
Judge whether to receive that the user client sends continues to call the solicited message of the Intelligent target contract, if It is that the user client is then allowed to call the Intelligent target contract, if it is not, then forbidding described in the user client calling Intelligent target contract.
8. a kind of intelligence contract accesses system, which is characterized in that applied in the either block chain node of block catenary system, wrap It includes:
First obtains module, for obtaining Intelligent target contract;
First judgment module, for judging whether the Intelligent target contract is safe and intelligent contract, if so, allowing to access simultaneously Call the Intelligent target contract.
9. a kind of block chain node device characterized by comprising
Memory, for storing computer program;
Processor realizes intelligent contract access as described in any one of claim 1 to 7 when for executing the computer program The step of method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program, the computer program realize intelligent contract access side as described in any one of claim 1 to 7 when being executed by processor The step of method.
CN201811115832.2A 2018-09-25 2018-09-25 A kind of intelligence contract access method, system, equipment and computer storage medium Pending CN109345390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811115832.2A CN109345390A (en) 2018-09-25 2018-09-25 A kind of intelligence contract access method, system, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811115832.2A CN109345390A (en) 2018-09-25 2018-09-25 A kind of intelligence contract access method, system, equipment and computer storage medium

Publications (1)

Publication Number Publication Date
CN109345390A true CN109345390A (en) 2019-02-15

Family

ID=65306659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811115832.2A Pending CN109345390A (en) 2018-09-25 2018-09-25 A kind of intelligence contract access method, system, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN109345390A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245506A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Intelligent contract administration method and device based on block chain, electronic equipment
CN110517047A (en) * 2019-09-04 2019-11-29 腾讯科技(深圳)有限公司 Virtual objects calling processing method, device and equipment and medium based on block chain
CN110610423A (en) * 2019-09-09 2019-12-24 杭州秘猿科技有限公司 Processing method for supporting stateful and stateless contracts by block chain intelligent contract platform
CN110765490A (en) * 2019-10-31 2020-02-07 北京海益同展信息科技有限公司 Method and apparatus for processing information
CN111444090A (en) * 2020-03-24 2020-07-24 腾讯科技(深圳)有限公司 Contract testing method and device in block chain, electronic equipment and storage medium
US10839107B2 (en) 2019-05-30 2020-11-17 Advanced New Technologies Co., Ltd. Managing a smart contract on a blockchain
CN112199096A (en) * 2020-09-30 2021-01-08 深圳壹账通智能科技有限公司 Intelligent contract deployment detection method and device, node equipment and storage medium
CN112862493A (en) * 2021-01-27 2021-05-28 中山大学 Intelligent Pompe deception detection method, device, terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180089759A1 (en) * 2016-09-26 2018-03-29 Shapeshift Ag System and method of managing trustless asset portfolios
CN108462724A (en) * 2018-05-17 2018-08-28 北京京东金融科技控股有限公司 Data sharing method, device, system, member node and readable storage medium storing program for executing
CN108537668A (en) * 2018-04-11 2018-09-14 北京奇虎科技有限公司 Digital cash method of commerce and device, computing device based on intelligent contract

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180089759A1 (en) * 2016-09-26 2018-03-29 Shapeshift Ag System and method of managing trustless asset portfolios
CN108537668A (en) * 2018-04-11 2018-09-14 北京奇虎科技有限公司 Digital cash method of commerce and device, computing device based on intelligent contract
CN108462724A (en) * 2018-05-17 2018-08-28 北京京东金融科技控股有限公司 Data sharing method, device, system, member node and readable storage medium storing program for executing

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245506A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Intelligent contract administration method and device based on block chain, electronic equipment
US10839107B2 (en) 2019-05-30 2020-11-17 Advanced New Technologies Co., Ltd. Managing a smart contract on a blockchain
US11048825B2 (en) 2019-05-30 2021-06-29 Advanced New Technologies Co., Ltd. Managing a smart contract on a blockchain
CN110517047A (en) * 2019-09-04 2019-11-29 腾讯科技(深圳)有限公司 Virtual objects calling processing method, device and equipment and medium based on block chain
CN110610423A (en) * 2019-09-09 2019-12-24 杭州秘猿科技有限公司 Processing method for supporting stateful and stateless contracts by block chain intelligent contract platform
CN110765490A (en) * 2019-10-31 2020-02-07 北京海益同展信息科技有限公司 Method and apparatus for processing information
CN111444090A (en) * 2020-03-24 2020-07-24 腾讯科技(深圳)有限公司 Contract testing method and device in block chain, electronic equipment and storage medium
CN111444090B (en) * 2020-03-24 2024-04-26 腾讯科技(深圳)有限公司 Contract testing method and device in blockchain, electronic equipment and storage medium
CN112199096A (en) * 2020-09-30 2021-01-08 深圳壹账通智能科技有限公司 Intelligent contract deployment detection method and device, node equipment and storage medium
CN112862493A (en) * 2021-01-27 2021-05-28 中山大学 Intelligent Pompe deception detection method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN109345390A (en) A kind of intelligence contract access method, system, equipment and computer storage medium
CN104620225B (en) Method and system for server security checking
CN104486138A (en) Flow monitoring method and device and monitoring server
CN113762525B (en) Federal learning model training method with differential privacy protection
CN106604362B (en) A kind of Wireless Fidelity Wi-Fi scan method and mobile terminal
CN105873049A (en) Method and equipment for obtaining shared wireless access point
CN109445820A (en) A kind of intelligence contract upgrade method, system, equipment and computer storage medium
CN109213857A (en) A kind of fraud recognition methods and device
CN113094761B (en) Method for monitoring federated learning data tamper-proofing and related device
CN105260660A (en) Monitoring method, device and system of intelligent terminal payment environment
CN109272324A (en) A kind of business function implementation method, system, equipment and computer storage medium
CN106201856A (en) A kind of multi version performance test methods and device
CN107370685A (en) A kind of internet-of-things terminal cut-in method and device
CN105550584A (en) RBAC based malicious program interception and processing method in Android platform
CN109474599A (en) Network protection method and device based on block chain
CN105873239A (en) Method used for establishing wireless connection for application of user equipment
CN107623732A (en) A kind of date storage method based on cloud platform, device, equipment and storage medium
US20190147443A1 (en) Payment method based on mobile terminal and mobile terminal
CN106127463A (en) One is transferred accounts control method and terminal unit
CN109743231A (en) A kind of acl feature test method and device
CN106664535B (en) A kind of method for sending information, device, terminal device and system
CN105916181A (en) Network switching method and device
CN107301349A (en) A kind of Access and control strategy of database method and system
CN110209417A (en) A kind of base station and base station update method
CN106550405B (en) Network data receiving control method and system based on mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190215

RJ01 Rejection of invention patent application after publication