CN109639715A - Method, apparatus, equipment and the computer readable storage medium for avoiding honeysuckle from attacking - Google Patents
Method, apparatus, equipment and the computer readable storage medium for avoiding honeysuckle from attacking Download PDFInfo
- Publication number
- CN109639715A CN109639715A CN201910006208.7A CN201910006208A CN109639715A CN 109639715 A CN109639715 A CN 109639715A CN 201910006208 A CN201910006208 A CN 201910006208A CN 109639715 A CN109639715 A CN 109639715A
- Authority
- CN
- China
- Prior art keywords
- node
- chain
- alliance
- user
- operator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
- H04W8/28—Number portability ; Network address portability
Abstract
The present invention provides a kind of method, apparatus, equipment and computer readable storage medium for avoiding honeysuckle from attacking, and method includes: that user node obtains the corresponding operator list of alliance's chain;User node determines network operation business to be turned from the operator list;User node sends broadcast message according to the network operation business to be turned, the broadcast message includes network operation business mark, the corresponding mark of the user node and the public key information to be turned, so that each operator node in alliance's chain is according to the broadcast information updating user list, and the digging mine node in alliance's chain is written by the broadcast message in the account book of alliance's chain.So as to guarantee the safety of alliance's chain, and then it can guarantee the safety of user account.
Description
Technical field
The present invention relates to block chain field more particularly to a kind of method, apparatus, equipment and computers for avoiding honeysuckle from attacking
Readable storage medium storing program for executing.
Background technique
The number of taking, which turns net, can be also referred to as that number can carry, number portable specifically holds a mobile operator number
Mobile phone user can be transferred to other carrier networks, enjoy the telecommunications operation service of other operators.The number of taking turns net one side energy
The cost that user turns net is enough reduced, is offered convenience to consumer, on the other hand, the number of taking, which turns net, can also optimize market structure, lead to
The measure of control in market is crossed, realizes effective competition, improves consumer welfare.
But after implementing the number of taking and turning net, due to problem of management, user data information can not synchronize in time, therefore,
May exist hacker user pretend to be the operator being newly added and possess it is huge that dig mine machine enter block chain, it is easy to
The book keeping operation power for obtaining the whole network, to initiate honeysuckle attack, or throws a spanner into the works, and influence the operation of whole system.What is more,
One malicious user even has the ability to forge a completely new block chain account book, and causes completely to the operator node being newly added
The state of fascination.
Summary of the invention
The present invention provides a kind of method, apparatus, equipment and computer readable storage medium for avoiding honeysuckle from attacking, for real
It applies the number of taking to turn after netting, due to problem of management, user data information can not synchronize in time and malicious user is caused to carry out honeysuckle
The technical issues of attack.
The first aspect of the invention is to provide a kind of method for avoiding honeysuckle from attacking, comprising:
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes described wait turn net fortune
Trade mark knowledge, the corresponding mark of the user node and public key information are sought, so that each operator node root in alliance's chain
According to the broadcast information updating user list, and it is described that the digging mine node in alliance's chain is written by the broadcast message
In the account book of alliance's chain.
Another aspect of the present invention is to provide a kind of device for avoiding honeysuckle from attacking, comprising:
Module is obtained, for obtaining the corresponding operator list of alliance's chain;
Determining module, for determining network operation business to be turned from the operator list;
Sending module, for sending broadcast message according to the network operation business to be turned, the broadcast message include it is described to
Turn network operation business mark, the corresponding mark of the user node and public key information, so that each operator in alliance's chain
The digging mine node in alliance's chain is written by the broadcast message according to the broadcast information updating user list in node
In the account book of alliance's chain.
An additional aspect of the present invention is to provide a kind of equipment for avoiding honeysuckle from attacking, comprising: memory, processor;
Memory;For storing the memory of the processor-executable instruction;
Wherein, the processor is configured to being executed by the processor such as the above-mentioned method for avoiding honeysuckle from attacking.
An additional aspect of the present invention is to provide a kind of computer readable storage medium, the computer readable storage medium
In be stored with computer executed instructions, when the computer executed instructions are executed by processor for realizing it is such as above-mentioned avoid it is double
The method of flower attack.
Method, apparatus, equipment and the computer readable storage medium provided by the invention for avoiding honeysuckle from attacking, passes through user
Node obtains the corresponding operator list of alliance's chain;User node determines network operation business to be turned from the operator list;With
Family node sends broadcast message according to the network operation business to be turned, the broadcast message include the network operation business mark to be turned,
The corresponding mark of the user node and public key information, so that each operator node in alliance's chain is according to the broadcast
Information update user list, and make the digging mine node in alliance's chain that the broadcast message to be written to the account book of alliance's chain
In.So as to guarantee the safety of alliance's chain, and then it can guarantee the safety of user account.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention
Some embodiments be also possible to obtain other drawings based on these drawings for those of ordinary skill in the art.
Fig. 1 is the structural schematic diagram of communication system provided in an embodiment of the present invention;
Fig. 2 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention one provides;
Fig. 3 is the flow diagram of the method provided by Embodiment 2 of the present invention for avoiding honeysuckle from attacking;
Fig. 4 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the device for avoiding honeysuckle from attacking that the embodiment of the present invention four provides;
Fig. 6 is the structural schematic diagram for the equipment for avoiding honeysuckle from attacking that the embodiment of the present invention five provides.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawings
It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments
Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The method provided by the invention for avoiding honeysuckle from attacking, can be adapted for communication system shown in FIG. 1.As shown in Figure 1,
The communication system includes: access network equipment 11, terminal device 12 and server 13.It should be noted that communication shown in FIG. 1
System can be adapted for different network formats, for example, can be adapted for global system for mobile telecommunications (Global System of
Mobile communication, abbreviation GSM), CDMA (Code Division Multiple Access, referred to as
CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, abbreviation WCDMA), time division synchronous
CDMA (Time Division-Synchronous Code Division Multiple Access, abbreviation TD-
SCDMA), the network formats such as the 5G in long term evolution (Long Term Evolution, abbreviation LTE) system and future.Optionally,
Above-mentioned communication system can communicate (Ultra-Reliable and Low Latency for low time delay highly reliable in 5G communication system
Communications, abbreviation URLLC) transmission scene in system.
So optionally, above-mentioned access network equipment 11 can be base station (the Base Transceiver in GSM or CDMA
Station, abbreviation BTS) and/or base station controller, it is also possible to base station (NodeB, abbreviation NB) in WCDMA and/or wireless
Network controller (Radio Network Controller, abbreviation RNC), can also be the evolved base station in LTE
(Evolutional Node B, abbreviation eNB or eNodeB) perhaps base in relay station or access point or future 5G network
Stand (gNB) etc., and the present invention does not limit herein.
Above-mentioned terminal device 12 can be wireless terminal and be also possible to catv terminal.Wireless terminal can be directed to user and mention
For voice and/or the equipment of other business datum connectivity, there is the handheld device of wireless connecting function or be connected to wireless
Other processing equipments of modem.Wireless terminal can be through wireless access network (Radio Access Network, abbreviation
RAN it) is communicated with one or more equipments of the core network, wireless terminal can be mobile terminal, as mobile phone (or is
" honeycomb " phone) and computer with mobile terminal, for example, it may be portable, pocket, hand-held, built-in computer
Or vehicle-mounted mobile device, they exchange language and/or data with wireless access network.For another example wireless terminal can be with
It is personal communication service (Personal Communication Service, abbreviation PCS) phone, wireless phone, session setup
Agreement (Session Initiation Protocol, abbreviation SIP) phone, wireless local loop (Wireless Local
Loop, abbreviation WLL) it stands, the equipment such as personal digital assistant (Personal Digital Assistant, abbreviation PDA).It is wireless whole
End is referred to as system, subscriber unit (Subscriber Unit), subscriber station (Subscriber Station), movement station
(Mobile Station), mobile station (Mobile), distant station (Remote Station), remote terminal (Remote
Terminal), access terminal (Access Terminal), user terminal (User Terminal), user agent (User
Agent), user equipment (User Device or User Equipment), is not limited thereto.Optionally, above-mentioned terminal is set
Standby 12 can also be the equipment such as smartwatch, tablet computer.Optionally, terminal device 12 and server 13 can be block link network
Node in network.In addition, in the block chain network can also include other nodes such as node 15, node 14, terminal device 12,
Server 13, node 15, node 14 specifically may make up peer-to-peer network.
Fig. 2 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention one provides, as shown in Figure 1, institute
The method of stating includes:
Step 201, user node obtain the corresponding operator list of alliance's chain.
The executing subject of the present embodiment is user node, which belongs to preset alliance's chain.Alliance's chain, just for
The member of some specific group and limited third party, inside specify the node of multiple pre-selections for book keeping operation people, each piece of generation
It is codetermined by all preselected nodes, other access nodes can participate in business, but keep aloof from accounting procedure, other third parties
Inquiry can be defined by the open API of the block chain.It should be noted that including at least two operations in alliance's chain
Quotient's node and wound generation node, for example, the operator node can be communicating joint point, mobile node and telecommunication node
It can be Ministry of Industry and Information's node Deng, the wound generation node, founder of Ministry of Industry and Information's node as alliance's chain, Ministry of Industry and Information's node is with sending extensively
The mode for broadcasting message issues the wound generation node of alliance's chain in alliance's chain, which includes the mark of Ministry of Industry and Information's node
The identity information of knowledge, public key and founder, the broadcast message are broadcast to alliance after the private key signature using Ministry of Industry and Information's row node
In chain network, become first block of alliance's chain, i.e. wound generation block.Ministry of Industry and Information's node generates wound generation block, will create generation block
In father's block cryptographic Hash write as the public key of the fast chain founder of local area, the public key of this block chain founder can also be passed through
SHA256 algorithm generates father's block cryptographic Hash that a Hash codes are put into block head.Block height, head in wound generation block head
Hash, Merkle root, timestamp, difficulty value and random number are written all in accordance with a under type: in wound generation block, incite somebody to action this
The big operator's essential information in ground existing three is recorded into block main body, and All Activity in this block is generated in block main body and is believed
The Merkle tree of breath, the value of Merkle tree root is stored in block head, current time is saved in timestamp field, difficulty
Be set as the preset difficulty appropriate of publicly-owned chain promoter it.It is big that this block current existing three is written in block main body
The essential information of operator.The broadcast message is broadcast in block chain network after the private key signature using Ministry of Industry and Information's node, the wound
Generation block is first block of this block chain.The operator list of You Yigeben alliance chain is locally stored in Ministry of Industry and Information's node, should
It include the mark and public key information of whole operators in current alliance's chain in list.
Optionally, when user wants to realize that the number of taking turns net, it is necessary first to determine the operator wait turn net.Therefore,
The operator list of this alliance chain is locally stored in the available Ministry of Industry and Information's node of user node, thus true according to the operator list
The essential information of whole operators before settled, and then realize the selection for turning network operation business.Specifically, user node can be believed to work
Portion's node sends the request of inquiry this alliance chain operator list, and receives the newest operator column of Ministry of Industry and Information's node transmission
Table, wherein Ministry of Industry and Information's node is by sending after private key signature when the operator list.
Step 202, user node determine network operation business to be turned from the operator list.
In the present embodiment, user node get Ministry of Industry and Information's node be locally stored this alliance chain operator list it
Afterwards, user can determine network operation business currently to be turned according to the essential information of operator in operator list.
Step 203, user node send broadcast message according to the network operation business to be turned, and the broadcast message includes described
Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain
Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list
In the account book for entering alliance's chain.
In the present embodiment, user node in the operator list after determining wait turn network operation business, in order to protect
It is enough synchronous in time to demonstrate,prove user data information, malicious user is avoided to carry out honeysuckle attack, user node can be according to wait turn net operation
Quotient initiates broadcast message, wherein include in the information to be forwarded network operation business to be turned mark, the corresponding mark of user node and
Public key information.It should be noted that by being sent after the private key signature of user node when the broadcast message.Correspondingly, block
The digging mine node of Ministry of Industry and Information's node and all operator nodes as this block chain in chain network, receive the broadcast message it
Afterwards, which can be written in new block, is then synchronized in whole nodes in block chain and is saved.
In addition, can be carried out more according to user list of the broadcast message to itself after operator node receives the broadcast message
Newly.Specifically, if inquiring the user not is the user of itself, which can be deleted from the user list of oneself, and
And the pause of user's existing business type and charge accounting are operated.In addition, operator node also needs to be initiated according to delete operation
Broadcast message, the broadcast message are specifically as follows: the user identifier of user A, user A with oneself relieve disappearing for contract
Breath, the information such as the mark of operator node and public key.It should be noted that operator node passes through oneself when the broadcast message
It is broadcast to after private key signature in block chain network.
The method provided in this embodiment for avoiding honeysuckle from attacking obtains the corresponding operator of alliance's chain by user node and arranges
Table;User node determines network operation business to be turned from the operator list;User node is sent out according to the network operation business to be turned
Broadcast message is sent, the broadcast message includes network operation business mark, the corresponding mark of the user node and the public affairs to be turned
Key information so that each operator node in alliance's chain is according to the broadcast information updating user list, and makes described
Digging mine node in alliance's chain the broadcast message is written in the account book of alliance's chain.So as to guarantee the safety of alliance's chain
Property, and then can guarantee the safety of user account.
Fig. 3 is the flow diagram of the method provided by Embodiment 2 of the present invention for avoiding honeysuckle from attacking, in above-described embodiment
On the basis of, as shown in Figure 3, which comprises
Step 301, user node obtain the corresponding operator list of alliance's chain;
Step 302, user node determine network operation business to be turned from the operator list;
Step 303, user node send broadcast message according to the network operation business to be turned, and the broadcast message includes described
Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain
Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list
In the account book for entering alliance's chain;
Step 304, user node receive the business information that the network operation business to be turned is sent;
Step 305, user node instruct according to the user's choice selects business datum from the business information.
In the present embodiment, user node obtains the corresponding operator list of alliance's chain;User node is from the operator
Network operation business to be turned is determined in list;After user node sends broadcast message according to the network operation business to be turned, if operator
Nodal test to the user has relieved cooperative relationship with a upper operator and net to be turned is under oneself, then records the user's
The information such as mark, and oneself internal business information is sent to user node, wherein the information is by operator node
It is sent after private key signature.Correspondingly, user can receive the business information that network operation business to be turned is sent, and according to the choosing of user
It selects instruction and selects one or more business datums from business information, and established and closed according to the business datum and operator node
About, realize that the number of taking turns net.
The method provided in this embodiment for avoiding honeysuckle from attacking receives the network operation business to be turned by user node and sends
Business information;User node instructs according to the user's choice selects business datum from the business information.So as to reality
The current family number of taking turns autonomous operation on the line of net, improves the efficiency for turning net.
Further, based on any of the above embodiments, the method also includes:
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes described wait turn net fortune
Trade mark knowledge, the corresponding mark of the user node and public key information are sought, so that each operator node root in alliance's chain
According to the broadcast information updating user list, and it is described that the digging mine node in alliance's chain is written by the broadcast message
In the account book of alliance's chain;
User node receives the business information that the network operation business to be turned is sent;
User node instructs according to the user's choice selects business datum from the business information;
User node and the operator node sign the intelligent contract about the business datum;And pass through the user
The intelligent contract is sent to the operator node by the private key of node;
User node receives the operator node by the intelligent contract after operator's private key dual signature, completes
The signing of business datum.
In the present embodiment, user node obtains the corresponding operator list of alliance's chain;User node is from the operator
Network operation business to be turned is determined in list;After user node sends broadcast message according to the network operation business to be turned, if operator
Nodal test to the user has relieved cooperative relationship with a upper operator and net to be turned is under oneself, then records the user's
The information such as mark, and oneself internal business information is sent to user node, wherein the information is by operator node
It is sent after private key signature.Correspondingly, user can receive the business information that network operation business to be turned is sent, and according to the choosing of user
It selects instruction and selects one or more business datums from business information, and established and closed according to the business datum and operator node
About, realize that the number of taking turns net.Specifically, user node can establish intelligent contract according to the business datum with operator node, and
The intelligence contract is sent to operator node by the private key of user node.Correspondingly, operator node receives the intelligence
After contract, inquiring the intelligence contract, there is no problem, then the private key that operator node can be used carries out secondary label to the contract
Name simultaneously sends it to user node, to realize the signing to intelligent contract.User node can go to entity business hall to exchange for
New mobile phone card with original number, the mobile phone card can be any form of card such as SIM card, usim card, and the present invention is again
With no restrictions.
The method provided in this embodiment for avoiding honeysuckle from attacking, by user node and the operator node sign about
The intelligent contract of the business datum;And the intelligent contract is sent to by the operator by the private key of the user node
Node;User node receives the operator node by the intelligent contract after operator's private key dual signature, completes industry
The signing for data of being engaged in.So as to realize that user's number of taking turns autonomous operation on the line of net, the efficiency for turning net is improved.
Fig. 4 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention four provides, in above-mentioned any reality
On the basis of applying example, as shown in figure 4, the method also includes:
Step 401, user node determine the wound generation node in alliance's chain;
Step 402, user node determine founder's node in alliance's chain from the wound generation node;
Step 403, user node send application request to founder's node, include the use in the application request
Block chain mark, the operator information of public key information and the user node of family node, so that the founder saves
Point judges whether the user node has the permission that alliance's chain is added according to application request, and according to judging result
Take respective handling;
Step 404, user node obtain the corresponding operator list of alliance's chain;
Step 405, user node determine network operation business to be turned from the operator list;
Step 406, user node send broadcast message according to the network operation business to be turned, and the broadcast message includes described
Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain
Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list
In the account book for entering alliance's chain.
In embodiment, alliance's chain, member and limited third party, inside just for some specific group specify multiple
The node of pre-selection is book keeping operation people, and each piece of generation is codetermined by all preselected nodes, other access nodes can participate in
Transaction, but accounting procedure is kept aloof from, other third parties can be defined inquiry by the open API of the block chain.Therefore, if
Any user node is wanted to need when user node intervenes alliance's chain for the first time to alliance's chain as the member of alliance's chain
The addition information of itself is broadcasted, which includes identity information, user identifier and public key information of user node etc., is incited somebody to action
The addition information after private key encryption by broadcasting into alliance's chain.It needs to be determined that the wound generation node in alliance's chain, determines wound generation
After node, which is stored in local, and from the address for determining the founder of alliance's chain in generation node is created, to the wound
Beginning people's node sends application request, so that founder's node can request to judge whether user node has addition according to this application
The permission of alliance's chain.Correspondingly, it if judge that the user node has permission, can add it in alliance's chain, if it is not,
The user node is not allowed then to coalize chain.
Correspondingly, if any operator node wants the member as alliance's chain, alliance is intervened for the first time in operator node
When chain, need to broadcast the addition information of itself to alliance's chain, which includes the identity information of operator node, institute
Belong to operator identifier and public key information etc., by the addition information by broadcasting after private key encryption into alliance's chain.It needs really
Determine the wound generation node in alliance's chain, after determining wound generation node, which is stored in local, and from wound generation node really
The address for determining the founder of alliance's chain sends application request to founder's node, wherein operator node in this application request
Block chain mark, public key information and the operator node operator information, wherein operator packet
Business Name, the legal representative's information, registered capital, registered address, Business Registration Number of operator are included, the letter such as time is set up
Breath, so that founder's node can request to judge the permission whether operator node has the chain that coalizes according to this application.Phase
If Ying Di can add it to operator's section that wound generation node is locally stored judge that the operator node has permission
In point list, if it is not, the operator node is not allowed then to coalize chain.
The method provided in this embodiment for avoiding honeysuckle from attacking, the wound generation section in alliance's chain is determined by user node
Point;User node determines founder's node in alliance's chain from the wound generation node;User node is to the founder
Node sends application request, includes block chain mark, the public key information and described of the user node in the application request
The operator information of user node, so that founder's node judges that the user node is according to application request
It is no that there is the permission that alliance's chain is added, and respective handling is taken according to judging result, so as to guarantee in alliance's chain
Information security provides guarantee for the information security of user.
Further, based on any of the above embodiments, the method also includes:
User node inquires the wound generation node of alliance's chain to its adjacent node;
User node receives the wound generation node to be verified of the adjacent node feedback, and the frequency of occurrences is highest to be verified
Generation node is created as the wound generation node in alliance's chain;
User node determines founder's node in alliance's chain from the wound generation node;
User node sends application request to founder's node, includes the user node in the application request
Block chain mark, the operator information of public key information and the user node, so that founder's node is according to institute
It states application request and judges whether the user node has the permission that alliance's chain is added, and taken accordingly according to judging result
Processing;
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes described wait turn net fortune
Trade mark knowledge, the corresponding mark of the user node and public key information are sought, so that each operator node root in alliance's chain
According to the broadcast information updating user list, and it is described that the digging mine node in alliance's chain is written by the broadcast message
In the account book of alliance's chain.
In the present embodiment, user node can inquire the wound generation node of alliance's chain to its adjacent node, this is adjacent
The number of node can be user's self-setting, or system default.Due to block when block chain there is the premise assumed
Most of in chain are good person, and therefore, user node receives the wound generation node to be verified of the adjacent node feedback, and will occur
The highest wound generation node to be verified of frequency is as the wound generation node in alliance's chain.User node is true from the wound generation node
Founder's node in fixed alliance's chain;User node sends application request, the application request to founder's node
In include the user node block chain mark, public key information and the user node operator information so that
Founder's node judges whether the user node has the permission that alliance's chain is added according to application request, and
Respective handling is taken according to judging result;User node obtains the corresponding operator list of alliance's chain;User node is from the fortune
It seeks and determines network operation business to be turned in quotient's list;User node sends broadcast message, the broadcast according to the network operation business to be turned
Information includes network operation business mark, the corresponding mark of the user node and the public key information to be turned, so that the alliance
Each operator node in chain makes digging mine node in alliance's chain by institute according to the broadcast information updating user list
Broadcast message is stated to be written in the account book of alliance's chain.
Note transmission method provided in this embodiment based on block chain inquires institute to its adjacent node by user node
State the wound generation node of alliance's chain;User node receives the wound generation node to be verified of adjacent node feedback, and by the frequency of occurrences
Highest wound generation node to be verified is as the wound generation node in alliance's chain, so as to guarantee that the information in alliance's chain is pacified
Entirely, guarantee is provided for the information security of user.
Fig. 5 is the structural schematic diagram for the device for avoiding honeysuckle from attacking that the embodiment of the present invention four provides, as shown in figure 5, institute
Stating device includes:
Module 51 is obtained, for obtaining the corresponding operator list of alliance's chain.
Determining module 52, for determining network operation business to be turned from the operator list.
Sending module 53, for sending broadcast message according to the network operation business to be turned, the broadcast message includes described
Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain
Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list
In the account book for entering alliance's chain.
The device provided in this embodiment for avoiding honeysuckle from attacking obtains the corresponding operator of alliance's chain by user node and arranges
Table;User node determines network operation business to be turned from the operator list;User node is sent out according to the network operation business to be turned
Broadcast message is sent, the broadcast message includes network operation business mark, the corresponding mark of the user node and the public affairs to be turned
Key information so that each operator node in alliance's chain is according to the broadcast information updating user list, and makes described
Digging mine node in alliance's chain the broadcast message is written in the account book of alliance's chain.So as to guarantee the safety of alliance's chain
Property, and then can guarantee the safety of user account.
Optionally, described device further include:
Receiving module, the business information sent for receiving the network operation business to be turned;
Selecting module selects business datum from the business information for instructing according to the user's choice.
Optionally, described device further include:
Generation node determining module is created, for determining the wound generation node in alliance's chain;
Founder's node determining module, for determining founder's node in alliance's chain from the wound generation node;
Apply for request sending module, for sending application request to founder's node, includes in the application request
Block chain mark, the operator information of public key information and the user node of the user node, so that the wound
Beginning people's node judges whether the user node has a permission that alliance's chain is added according to application request, and according to sentencing
Disconnected result takes respective handling.
Optionally, the wound generation node determining module includes:
Query unit, for inquiring the wound generation node of alliance's chain to its adjacent node;
Receiving unit, for receiving the wound generation node to be verified of the adjacent node feedback, and the frequency of occurrences is highest
Wound generation node to be verified is as the wound generation node in alliance's chain.
Optionally, described device further include:
Module is signed, for signing the intelligent contract about the business datum with the operator node;And pass through institute
The intelligent contract is sent to the operator node by the private key for stating user node;
Signature blocks are closed for receiving the operator node by the intelligence after operator's private key dual signature
About, the signing of finishing service data.
Fig. 6 is the structural schematic diagram for the equipment for avoiding honeysuckle from attacking that the embodiment of the present invention five provides, as described in Figure 6, institute
State the equipment for avoiding honeysuckle from attacking, comprising: memory 61, processor 62;
Memory 61;For storing the memory 61 of 62 executable instruction of processor;
Wherein, the processor 62 is configured as being executed by the processor 62 such as the above-mentioned side for avoiding honeysuckle from attacking
Method.
Further embodiment of this invention provides a kind of computer readable storage medium, deposits in the computer readable storage medium
Computer executed instructions are contained, avoid honeysuckle from attacking for realizing such as above-mentioned when the computer executed instructions are executed by processor
The method hit.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description
Specific work process, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unit
Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention
The part steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various
It can store the medium of program code.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division progress for example, in practical application, can according to need and above-mentioned function distribution is complete by different functional modules
At the internal structure of device being divided into different functional modules, to complete all or part of the functions described above.On
The specific work process for stating the device of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of method for avoiding honeysuckle from attacking characterized by comprising
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes the network operation business to be turned
Mark, the corresponding mark of the user node and public key information, so that each operator node in alliance's chain is according to institute
Broadcast information updating user list is stated, and makes the digging mine node in alliance's chain that alliance's chain is written in the broadcast message
Account book in.
2. the method according to claim 1, wherein the user node is sent according to the network operation business to be turned
After broadcast message, further includes:
User node receives the business information that the network operation business to be turned is sent;
User node instructs according to the user's choice selects business datum from the business information.
3. the method according to claim 1, wherein the user node obtains the corresponding operator's column of alliance's chain
Before table, further includes:
User node determines the wound generation node in alliance's chain;
User node determines founder's node in alliance's chain from the wound generation node;
User node sends application request to founder's node, includes the block of the user node in the application request
Chain mark, the operator information of public key information and the user node, so that founder's node is according to the Shen
It please request to judge whether the user node has the permission that alliance's chain is added, and corresponding position is taken according to judging result
Reason.
4. according to the method described in claim 3, it is characterized in that, the user node determines the wound generation section in alliance's chain
Point, comprising:
User node inquires the wound generation node of alliance's chain to its adjacent node;
User node receives the wound generation node to be verified of adjacent node feedback, and by the highest wound generation to be verified of the frequency of occurrences
Node is as the wound generation node in alliance's chain.
5. according to the method described in claim 2, it is characterized in that, the user node is instructed according to the user's choice from described
In business information after selection business datum, further includes:
User node and the operator node sign the intelligent contract about the business datum;And pass through the user node
Private key the intelligent contract is sent to the operator node;
User node receives the operator node and passes through the intelligent contract after operator's private key dual signature, finishing service
The signing of data.
6. a kind of device for avoiding honeysuckle from attacking characterized by comprising
Module is obtained, for obtaining the corresponding operator list of alliance's chain;
Determining module, for determining network operation business to be turned from the operator list;
Sending module, for sending broadcast message according to the network operation business to be turned, the broadcast message includes the net to be turned
Operator identifier, the corresponding mark of the user node and public key information, so that each operator node in alliance's chain
According to the broadcast information updating user list, and make the digging mine node in alliance's chain will be described in broadcast message write-in
In the account book of alliance's chain.
7. device according to claim 6, which is characterized in that described device further include:
Receiving module, the business information sent for receiving the network operation business to be turned;
Selecting module selects business datum from the business information for instructing according to the user's choice.
8. device according to claim 6, which is characterized in that described device further include:
Generation node determining module is created, for determining the wound generation node in alliance's chain;
Founder's node determining module, for determining founder's node in alliance's chain from the wound generation node;
Apply for request sending module, includes described in the application request for sending application request to founder's node
Block chain mark, the operator information of public key information and the user node of user node, so that the founder
Node judges whether the user node has the permission that alliance's chain is added according to application request, and is tied according to judgement
Fruit takes respective handling.
9. a kind of equipment for avoiding honeysuckle from attacking characterized by comprising memory, processor;
Memory;For storing the memory of the processor-executable instruction;
Wherein, the processor is configured to by the processor execute it is as claimed in claims 1-5 avoid honeysuckle attack
Method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
It executes instruction, is kept away when the computer executed instructions are executed by processor for realizing as described in any one in claim 1-5
Exempt from the method for honeysuckle attack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910006208.7A CN109639715B (en) | 2019-01-04 | 2019-01-04 | Method, device and equipment for avoiding double-flower attack and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910006208.7A CN109639715B (en) | 2019-01-04 | 2019-01-04 | Method, device and equipment for avoiding double-flower attack and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109639715A true CN109639715A (en) | 2019-04-16 |
CN109639715B CN109639715B (en) | 2021-05-18 |
Family
ID=66056705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910006208.7A Active CN109639715B (en) | 2019-01-04 | 2019-01-04 | Method, device and equipment for avoiding double-flower attack and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109639715B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111538791A (en) * | 2020-05-07 | 2020-08-14 | 深圳创客区块链技术有限公司 | Block chain multiple cross-chain mutual protection method, device and storage medium |
CN113222590A (en) * | 2020-01-21 | 2021-08-06 | 鸿富锦精密电子(天津)有限公司 | Method and device for preventing double-flower attack and computer readable storage medium |
CN114025345A (en) * | 2020-07-16 | 2022-02-08 | 中国移动通信有限公司研究院 | Number portability processing system, method, equipment and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107995197A (en) * | 2017-12-04 | 2018-05-04 | 中国电子科技集团公司第三十研究所 | A kind of method for realizing across management domain identity and authority information is shared |
US20180183687A1 (en) * | 2016-12-28 | 2018-06-28 | Acronis International Gmbh | System and Method for Managing Services and Licenses Using a Blockchain Network |
CN108990048A (en) * | 2017-05-31 | 2018-12-11 | 华为技术有限公司 | The method and apparatus for determining the mark of terminal device |
CN109005033A (en) * | 2018-09-07 | 2018-12-14 | 全链通有限公司 | The method for realizing the registration of block chain system of real name based on phone number |
CN109041175A (en) * | 2018-09-25 | 2018-12-18 | 全链通有限公司 | Base station connection method, equipment, network and storage medium based on block chain |
-
2019
- 2019-01-04 CN CN201910006208.7A patent/CN109639715B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180183687A1 (en) * | 2016-12-28 | 2018-06-28 | Acronis International Gmbh | System and Method for Managing Services and Licenses Using a Blockchain Network |
CN108990048A (en) * | 2017-05-31 | 2018-12-11 | 华为技术有限公司 | The method and apparatus for determining the mark of terminal device |
CN107995197A (en) * | 2017-12-04 | 2018-05-04 | 中国电子科技集团公司第三十研究所 | A kind of method for realizing across management domain identity and authority information is shared |
CN109005033A (en) * | 2018-09-07 | 2018-12-14 | 全链通有限公司 | The method for realizing the registration of block chain system of real name based on phone number |
CN109041175A (en) * | 2018-09-25 | 2018-12-18 | 全链通有限公司 | Base station connection method, equipment, network and storage medium based on block chain |
Non-Patent Citations (1)
Title |
---|
谢剑超: "区块链将改变运营商运作模式", 《通信企业管理》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113222590A (en) * | 2020-01-21 | 2021-08-06 | 鸿富锦精密电子(天津)有限公司 | Method and device for preventing double-flower attack and computer readable storage medium |
CN113222590B (en) * | 2020-01-21 | 2023-10-31 | 富联精密电子(天津)有限公司 | Method, apparatus and computer readable storage medium for preventing double-flower attack |
CN111538791A (en) * | 2020-05-07 | 2020-08-14 | 深圳创客区块链技术有限公司 | Block chain multiple cross-chain mutual protection method, device and storage medium |
CN111538791B (en) * | 2020-05-07 | 2023-09-22 | 深圳创客区块链技术有限公司 | Block chain multiple-cross-chain mutual protection method, device and storage medium |
CN114025345A (en) * | 2020-07-16 | 2022-02-08 | 中国移动通信有限公司研究院 | Number portability processing system, method, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN109639715B (en) | 2021-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108810119A (en) | block chain processing method, device and block chain node | |
CN105578544B (en) | A kind of method and terminal device of circuit domain exchange falling | |
CN108574969A (en) | Connection processing method in multiple access scene and device | |
CN109640274A (en) | Note transmission method, device and computer readable storage medium based on block chain | |
CN104581652B (en) | Message treatment method, the method and apparatus for selecting MME | |
CN108712506B (en) | Block chain node communication method and device and block chain node | |
CN109639715A (en) | Method, apparatus, equipment and the computer readable storage medium for avoiding honeysuckle from attacking | |
CN109451446A (en) | The number of taking turns network method, device and equipment | |
CN105340212A (en) | Methods and apparatus for generating keys in device-to-device communications | |
CN105848255B (en) | A kind of method and device selecting frequency point | |
CN108769142A (en) | Exchange information processing method and block generate node | |
CN109087100A (en) | Cryptographic key distribution method, device, equipment and storage medium | |
CN101772193A (en) | Method, system and mobile access gateway for optimizing local routing | |
CN108683727B (en) | Block processing method and main node | |
CN108566275A (en) | Identity identifying method, device and block chain node | |
CN108123783A (en) | Data transmission method, apparatus and system | |
CN109673010A (en) | The number of taking based on block chain turns network method and device, storage medium | |
CN108876611A (en) | Exchange information processing method, device and block chain node | |
CN104301106B (en) | Wireless communication system and its authentication method | |
CN109087096B (en) | Block chain account checking method, device, equipment and storage medium | |
CN108777712B (en) | Block chain node communication method and device and block chain node | |
CN108777710B (en) | Inter-node communication method and device of block chain and block chain node | |
CN108768961A (en) | storage processing method and home gateway | |
CN112543484B (en) | Method and equipment for maintaining service continuity | |
JP2019528603A (en) | Data transmission method, first device and second device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |