CN109639715A - Method, apparatus, equipment and the computer readable storage medium for avoiding honeysuckle from attacking - Google Patents

Method, apparatus, equipment and the computer readable storage medium for avoiding honeysuckle from attacking Download PDF

Info

Publication number
CN109639715A
CN109639715A CN201910006208.7A CN201910006208A CN109639715A CN 109639715 A CN109639715 A CN 109639715A CN 201910006208 A CN201910006208 A CN 201910006208A CN 109639715 A CN109639715 A CN 109639715A
Authority
CN
China
Prior art keywords
node
chain
alliance
user
operator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910006208.7A
Other languages
Chinese (zh)
Other versions
CN109639715B (en
Inventor
田新雪
马书惠
肖征荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201910006208.7A priority Critical patent/CN109639715B/en
Publication of CN109639715A publication Critical patent/CN109639715A/en
Application granted granted Critical
Publication of CN109639715B publication Critical patent/CN109639715B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/28Number portability ; Network address portability

Abstract

The present invention provides a kind of method, apparatus, equipment and computer readable storage medium for avoiding honeysuckle from attacking, and method includes: that user node obtains the corresponding operator list of alliance's chain;User node determines network operation business to be turned from the operator list;User node sends broadcast message according to the network operation business to be turned, the broadcast message includes network operation business mark, the corresponding mark of the user node and the public key information to be turned, so that each operator node in alliance's chain is according to the broadcast information updating user list, and the digging mine node in alliance's chain is written by the broadcast message in the account book of alliance's chain.So as to guarantee the safety of alliance's chain, and then it can guarantee the safety of user account.

Description

Method, apparatus, equipment and the computer readable storage medium for avoiding honeysuckle from attacking
Technical field
The present invention relates to block chain field more particularly to a kind of method, apparatus, equipment and computers for avoiding honeysuckle from attacking Readable storage medium storing program for executing.
Background technique
The number of taking, which turns net, can be also referred to as that number can carry, number portable specifically holds a mobile operator number Mobile phone user can be transferred to other carrier networks, enjoy the telecommunications operation service of other operators.The number of taking turns net one side energy The cost that user turns net is enough reduced, is offered convenience to consumer, on the other hand, the number of taking, which turns net, can also optimize market structure, lead to The measure of control in market is crossed, realizes effective competition, improves consumer welfare.
But after implementing the number of taking and turning net, due to problem of management, user data information can not synchronize in time, therefore, May exist hacker user pretend to be the operator being newly added and possess it is huge that dig mine machine enter block chain, it is easy to The book keeping operation power for obtaining the whole network, to initiate honeysuckle attack, or throws a spanner into the works, and influence the operation of whole system.What is more, One malicious user even has the ability to forge a completely new block chain account book, and causes completely to the operator node being newly added The state of fascination.
Summary of the invention
The present invention provides a kind of method, apparatus, equipment and computer readable storage medium for avoiding honeysuckle from attacking, for real It applies the number of taking to turn after netting, due to problem of management, user data information can not synchronize in time and malicious user is caused to carry out honeysuckle The technical issues of attack.
The first aspect of the invention is to provide a kind of method for avoiding honeysuckle from attacking, comprising:
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes described wait turn net fortune Trade mark knowledge, the corresponding mark of the user node and public key information are sought, so that each operator node root in alliance's chain According to the broadcast information updating user list, and it is described that the digging mine node in alliance's chain is written by the broadcast message In the account book of alliance's chain.
Another aspect of the present invention is to provide a kind of device for avoiding honeysuckle from attacking, comprising:
Module is obtained, for obtaining the corresponding operator list of alliance's chain;
Determining module, for determining network operation business to be turned from the operator list;
Sending module, for sending broadcast message according to the network operation business to be turned, the broadcast message include it is described to Turn network operation business mark, the corresponding mark of the user node and public key information, so that each operator in alliance's chain The digging mine node in alliance's chain is written by the broadcast message according to the broadcast information updating user list in node In the account book of alliance's chain.
An additional aspect of the present invention is to provide a kind of equipment for avoiding honeysuckle from attacking, comprising: memory, processor;
Memory;For storing the memory of the processor-executable instruction;
Wherein, the processor is configured to being executed by the processor such as the above-mentioned method for avoiding honeysuckle from attacking.
An additional aspect of the present invention is to provide a kind of computer readable storage medium, the computer readable storage medium In be stored with computer executed instructions, when the computer executed instructions are executed by processor for realizing it is such as above-mentioned avoid it is double The method of flower attack.
Method, apparatus, equipment and the computer readable storage medium provided by the invention for avoiding honeysuckle from attacking, passes through user Node obtains the corresponding operator list of alliance's chain;User node determines network operation business to be turned from the operator list;With Family node sends broadcast message according to the network operation business to be turned, the broadcast message include the network operation business mark to be turned, The corresponding mark of the user node and public key information, so that each operator node in alliance's chain is according to the broadcast Information update user list, and make the digging mine node in alliance's chain that the broadcast message to be written to the account book of alliance's chain In.So as to guarantee the safety of alliance's chain, and then it can guarantee the safety of user account.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is the present invention Some embodiments be also possible to obtain other drawings based on these drawings for those of ordinary skill in the art.
Fig. 1 is the structural schematic diagram of communication system provided in an embodiment of the present invention;
Fig. 2 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention one provides;
Fig. 3 is the flow diagram of the method provided by Embodiment 2 of the present invention for avoiding honeysuckle from attacking;
Fig. 4 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention four provides;
Fig. 5 is the structural schematic diagram for the device for avoiding honeysuckle from attacking that the embodiment of the present invention four provides;
Fig. 6 is the structural schematic diagram for the equipment for avoiding honeysuckle from attacking that the embodiment of the present invention five provides.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail.These attached drawings It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments Those skilled in the art illustrate the concept of the disclosure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The method provided by the invention for avoiding honeysuckle from attacking, can be adapted for communication system shown in FIG. 1.As shown in Figure 1, The communication system includes: access network equipment 11, terminal device 12 and server 13.It should be noted that communication shown in FIG. 1 System can be adapted for different network formats, for example, can be adapted for global system for mobile telecommunications (Global System of Mobile communication, abbreviation GSM), CDMA (Code Division Multiple Access, referred to as CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, abbreviation WCDMA), time division synchronous CDMA (Time Division-Synchronous Code Division Multiple Access, abbreviation TD- SCDMA), the network formats such as the 5G in long term evolution (Long Term Evolution, abbreviation LTE) system and future.Optionally, Above-mentioned communication system can communicate (Ultra-Reliable and Low Latency for low time delay highly reliable in 5G communication system Communications, abbreviation URLLC) transmission scene in system.
So optionally, above-mentioned access network equipment 11 can be base station (the Base Transceiver in GSM or CDMA Station, abbreviation BTS) and/or base station controller, it is also possible to base station (NodeB, abbreviation NB) in WCDMA and/or wireless Network controller (Radio Network Controller, abbreviation RNC), can also be the evolved base station in LTE (Evolutional Node B, abbreviation eNB or eNodeB) perhaps base in relay station or access point or future 5G network Stand (gNB) etc., and the present invention does not limit herein.
Above-mentioned terminal device 12 can be wireless terminal and be also possible to catv terminal.Wireless terminal can be directed to user and mention For voice and/or the equipment of other business datum connectivity, there is the handheld device of wireless connecting function or be connected to wireless Other processing equipments of modem.Wireless terminal can be through wireless access network (Radio Access Network, abbreviation RAN it) is communicated with one or more equipments of the core network, wireless terminal can be mobile terminal, as mobile phone (or is " honeycomb " phone) and computer with mobile terminal, for example, it may be portable, pocket, hand-held, built-in computer Or vehicle-mounted mobile device, they exchange language and/or data with wireless access network.For another example wireless terminal can be with It is personal communication service (Personal Communication Service, abbreviation PCS) phone, wireless phone, session setup Agreement (Session Initiation Protocol, abbreviation SIP) phone, wireless local loop (Wireless Local Loop, abbreviation WLL) it stands, the equipment such as personal digital assistant (Personal Digital Assistant, abbreviation PDA).It is wireless whole End is referred to as system, subscriber unit (Subscriber Unit), subscriber station (Subscriber Station), movement station (Mobile Station), mobile station (Mobile), distant station (Remote Station), remote terminal (Remote Terminal), access terminal (Access Terminal), user terminal (User Terminal), user agent (User Agent), user equipment (User Device or User Equipment), is not limited thereto.Optionally, above-mentioned terminal is set Standby 12 can also be the equipment such as smartwatch, tablet computer.Optionally, terminal device 12 and server 13 can be block link network Node in network.In addition, in the block chain network can also include other nodes such as node 15, node 14, terminal device 12, Server 13, node 15, node 14 specifically may make up peer-to-peer network.
Fig. 2 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention one provides, as shown in Figure 1, institute The method of stating includes:
Step 201, user node obtain the corresponding operator list of alliance's chain.
The executing subject of the present embodiment is user node, which belongs to preset alliance's chain.Alliance's chain, just for The member of some specific group and limited third party, inside specify the node of multiple pre-selections for book keeping operation people, each piece of generation It is codetermined by all preselected nodes, other access nodes can participate in business, but keep aloof from accounting procedure, other third parties Inquiry can be defined by the open API of the block chain.It should be noted that including at least two operations in alliance's chain Quotient's node and wound generation node, for example, the operator node can be communicating joint point, mobile node and telecommunication node It can be Ministry of Industry and Information's node Deng, the wound generation node, founder of Ministry of Industry and Information's node as alliance's chain, Ministry of Industry and Information's node is with sending extensively The mode for broadcasting message issues the wound generation node of alliance's chain in alliance's chain, which includes the mark of Ministry of Industry and Information's node The identity information of knowledge, public key and founder, the broadcast message are broadcast to alliance after the private key signature using Ministry of Industry and Information's row node In chain network, become first block of alliance's chain, i.e. wound generation block.Ministry of Industry and Information's node generates wound generation block, will create generation block In father's block cryptographic Hash write as the public key of the fast chain founder of local area, the public key of this block chain founder can also be passed through SHA256 algorithm generates father's block cryptographic Hash that a Hash codes are put into block head.Block height, head in wound generation block head Hash, Merkle root, timestamp, difficulty value and random number are written all in accordance with a under type: in wound generation block, incite somebody to action this The big operator's essential information in ground existing three is recorded into block main body, and All Activity in this block is generated in block main body and is believed The Merkle tree of breath, the value of Merkle tree root is stored in block head, current time is saved in timestamp field, difficulty Be set as the preset difficulty appropriate of publicly-owned chain promoter it.It is big that this block current existing three is written in block main body The essential information of operator.The broadcast message is broadcast in block chain network after the private key signature using Ministry of Industry and Information's node, the wound Generation block is first block of this block chain.The operator list of You Yigeben alliance chain is locally stored in Ministry of Industry and Information's node, should It include the mark and public key information of whole operators in current alliance's chain in list.
Optionally, when user wants to realize that the number of taking turns net, it is necessary first to determine the operator wait turn net.Therefore, The operator list of this alliance chain is locally stored in the available Ministry of Industry and Information's node of user node, thus true according to the operator list The essential information of whole operators before settled, and then realize the selection for turning network operation business.Specifically, user node can be believed to work Portion's node sends the request of inquiry this alliance chain operator list, and receives the newest operator column of Ministry of Industry and Information's node transmission Table, wherein Ministry of Industry and Information's node is by sending after private key signature when the operator list.
Step 202, user node determine network operation business to be turned from the operator list.
In the present embodiment, user node get Ministry of Industry and Information's node be locally stored this alliance chain operator list it Afterwards, user can determine network operation business currently to be turned according to the essential information of operator in operator list.
Step 203, user node send broadcast message according to the network operation business to be turned, and the broadcast message includes described Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list In the account book for entering alliance's chain.
In the present embodiment, user node in the operator list after determining wait turn network operation business, in order to protect It is enough synchronous in time to demonstrate,prove user data information, malicious user is avoided to carry out honeysuckle attack, user node can be according to wait turn net operation Quotient initiates broadcast message, wherein include in the information to be forwarded network operation business to be turned mark, the corresponding mark of user node and Public key information.It should be noted that by being sent after the private key signature of user node when the broadcast message.Correspondingly, block The digging mine node of Ministry of Industry and Information's node and all operator nodes as this block chain in chain network, receive the broadcast message it Afterwards, which can be written in new block, is then synchronized in whole nodes in block chain and is saved. In addition, can be carried out more according to user list of the broadcast message to itself after operator node receives the broadcast message Newly.Specifically, if inquiring the user not is the user of itself, which can be deleted from the user list of oneself, and And the pause of user's existing business type and charge accounting are operated.In addition, operator node also needs to be initiated according to delete operation Broadcast message, the broadcast message are specifically as follows: the user identifier of user A, user A with oneself relieve disappearing for contract Breath, the information such as the mark of operator node and public key.It should be noted that operator node passes through oneself when the broadcast message It is broadcast to after private key signature in block chain network.
The method provided in this embodiment for avoiding honeysuckle from attacking obtains the corresponding operator of alliance's chain by user node and arranges Table;User node determines network operation business to be turned from the operator list;User node is sent out according to the network operation business to be turned Broadcast message is sent, the broadcast message includes network operation business mark, the corresponding mark of the user node and the public affairs to be turned Key information so that each operator node in alliance's chain is according to the broadcast information updating user list, and makes described Digging mine node in alliance's chain the broadcast message is written in the account book of alliance's chain.So as to guarantee the safety of alliance's chain Property, and then can guarantee the safety of user account.
Fig. 3 is the flow diagram of the method provided by Embodiment 2 of the present invention for avoiding honeysuckle from attacking, in above-described embodiment On the basis of, as shown in Figure 3, which comprises
Step 301, user node obtain the corresponding operator list of alliance's chain;
Step 302, user node determine network operation business to be turned from the operator list;
Step 303, user node send broadcast message according to the network operation business to be turned, and the broadcast message includes described Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list In the account book for entering alliance's chain;
Step 304, user node receive the business information that the network operation business to be turned is sent;
Step 305, user node instruct according to the user's choice selects business datum from the business information.
In the present embodiment, user node obtains the corresponding operator list of alliance's chain;User node is from the operator Network operation business to be turned is determined in list;After user node sends broadcast message according to the network operation business to be turned, if operator Nodal test to the user has relieved cooperative relationship with a upper operator and net to be turned is under oneself, then records the user's The information such as mark, and oneself internal business information is sent to user node, wherein the information is by operator node It is sent after private key signature.Correspondingly, user can receive the business information that network operation business to be turned is sent, and according to the choosing of user It selects instruction and selects one or more business datums from business information, and established and closed according to the business datum and operator node About, realize that the number of taking turns net.
The method provided in this embodiment for avoiding honeysuckle from attacking receives the network operation business to be turned by user node and sends Business information;User node instructs according to the user's choice selects business datum from the business information.So as to reality The current family number of taking turns autonomous operation on the line of net, improves the efficiency for turning net.
Further, based on any of the above embodiments, the method also includes:
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes described wait turn net fortune Trade mark knowledge, the corresponding mark of the user node and public key information are sought, so that each operator node root in alliance's chain According to the broadcast information updating user list, and it is described that the digging mine node in alliance's chain is written by the broadcast message In the account book of alliance's chain;
User node receives the business information that the network operation business to be turned is sent;
User node instructs according to the user's choice selects business datum from the business information;
User node and the operator node sign the intelligent contract about the business datum;And pass through the user The intelligent contract is sent to the operator node by the private key of node;
User node receives the operator node by the intelligent contract after operator's private key dual signature, completes The signing of business datum.
In the present embodiment, user node obtains the corresponding operator list of alliance's chain;User node is from the operator Network operation business to be turned is determined in list;After user node sends broadcast message according to the network operation business to be turned, if operator Nodal test to the user has relieved cooperative relationship with a upper operator and net to be turned is under oneself, then records the user's The information such as mark, and oneself internal business information is sent to user node, wherein the information is by operator node It is sent after private key signature.Correspondingly, user can receive the business information that network operation business to be turned is sent, and according to the choosing of user It selects instruction and selects one or more business datums from business information, and established and closed according to the business datum and operator node About, realize that the number of taking turns net.Specifically, user node can establish intelligent contract according to the business datum with operator node, and The intelligence contract is sent to operator node by the private key of user node.Correspondingly, operator node receives the intelligence After contract, inquiring the intelligence contract, there is no problem, then the private key that operator node can be used carries out secondary label to the contract Name simultaneously sends it to user node, to realize the signing to intelligent contract.User node can go to entity business hall to exchange for New mobile phone card with original number, the mobile phone card can be any form of card such as SIM card, usim card, and the present invention is again With no restrictions.
The method provided in this embodiment for avoiding honeysuckle from attacking, by user node and the operator node sign about The intelligent contract of the business datum;And the intelligent contract is sent to by the operator by the private key of the user node Node;User node receives the operator node by the intelligent contract after operator's private key dual signature, completes industry The signing for data of being engaged in.So as to realize that user's number of taking turns autonomous operation on the line of net, the efficiency for turning net is improved.
Fig. 4 is the flow diagram for the method for avoiding honeysuckle from attacking that the embodiment of the present invention four provides, in above-mentioned any reality On the basis of applying example, as shown in figure 4, the method also includes:
Step 401, user node determine the wound generation node in alliance's chain;
Step 402, user node determine founder's node in alliance's chain from the wound generation node;
Step 403, user node send application request to founder's node, include the use in the application request Block chain mark, the operator information of public key information and the user node of family node, so that the founder saves Point judges whether the user node has the permission that alliance's chain is added according to application request, and according to judging result Take respective handling;
Step 404, user node obtain the corresponding operator list of alliance's chain;
Step 405, user node determine network operation business to be turned from the operator list;
Step 406, user node send broadcast message according to the network operation business to be turned, and the broadcast message includes described Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list In the account book for entering alliance's chain.
In embodiment, alliance's chain, member and limited third party, inside just for some specific group specify multiple The node of pre-selection is book keeping operation people, and each piece of generation is codetermined by all preselected nodes, other access nodes can participate in Transaction, but accounting procedure is kept aloof from, other third parties can be defined inquiry by the open API of the block chain.Therefore, if Any user node is wanted to need when user node intervenes alliance's chain for the first time to alliance's chain as the member of alliance's chain The addition information of itself is broadcasted, which includes identity information, user identifier and public key information of user node etc., is incited somebody to action The addition information after private key encryption by broadcasting into alliance's chain.It needs to be determined that the wound generation node in alliance's chain, determines wound generation After node, which is stored in local, and from the address for determining the founder of alliance's chain in generation node is created, to the wound Beginning people's node sends application request, so that founder's node can request to judge whether user node has addition according to this application The permission of alliance's chain.Correspondingly, it if judge that the user node has permission, can add it in alliance's chain, if it is not, The user node is not allowed then to coalize chain.
Correspondingly, if any operator node wants the member as alliance's chain, alliance is intervened for the first time in operator node When chain, need to broadcast the addition information of itself to alliance's chain, which includes the identity information of operator node, institute Belong to operator identifier and public key information etc., by the addition information by broadcasting after private key encryption into alliance's chain.It needs really Determine the wound generation node in alliance's chain, after determining wound generation node, which is stored in local, and from wound generation node really The address for determining the founder of alliance's chain sends application request to founder's node, wherein operator node in this application request Block chain mark, public key information and the operator node operator information, wherein operator packet Business Name, the legal representative's information, registered capital, registered address, Business Registration Number of operator are included, the letter such as time is set up Breath, so that founder's node can request to judge the permission whether operator node has the chain that coalizes according to this application.Phase If Ying Di can add it to operator's section that wound generation node is locally stored judge that the operator node has permission In point list, if it is not, the operator node is not allowed then to coalize chain.
The method provided in this embodiment for avoiding honeysuckle from attacking, the wound generation section in alliance's chain is determined by user node Point;User node determines founder's node in alliance's chain from the wound generation node;User node is to the founder Node sends application request, includes block chain mark, the public key information and described of the user node in the application request The operator information of user node, so that founder's node judges that the user node is according to application request It is no that there is the permission that alliance's chain is added, and respective handling is taken according to judging result, so as to guarantee in alliance's chain Information security provides guarantee for the information security of user.
Further, based on any of the above embodiments, the method also includes:
User node inquires the wound generation node of alliance's chain to its adjacent node;
User node receives the wound generation node to be verified of the adjacent node feedback, and the frequency of occurrences is highest to be verified Generation node is created as the wound generation node in alliance's chain;
User node determines founder's node in alliance's chain from the wound generation node;
User node sends application request to founder's node, includes the user node in the application request Block chain mark, the operator information of public key information and the user node, so that founder's node is according to institute It states application request and judges whether the user node has the permission that alliance's chain is added, and taken accordingly according to judging result Processing;
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes described wait turn net fortune Trade mark knowledge, the corresponding mark of the user node and public key information are sought, so that each operator node root in alliance's chain According to the broadcast information updating user list, and it is described that the digging mine node in alliance's chain is written by the broadcast message In the account book of alliance's chain.
In the present embodiment, user node can inquire the wound generation node of alliance's chain to its adjacent node, this is adjacent The number of node can be user's self-setting, or system default.Due to block when block chain there is the premise assumed Most of in chain are good person, and therefore, user node receives the wound generation node to be verified of the adjacent node feedback, and will occur The highest wound generation node to be verified of frequency is as the wound generation node in alliance's chain.User node is true from the wound generation node Founder's node in fixed alliance's chain;User node sends application request, the application request to founder's node In include the user node block chain mark, public key information and the user node operator information so that Founder's node judges whether the user node has the permission that alliance's chain is added according to application request, and Respective handling is taken according to judging result;User node obtains the corresponding operator list of alliance's chain;User node is from the fortune It seeks and determines network operation business to be turned in quotient's list;User node sends broadcast message, the broadcast according to the network operation business to be turned Information includes network operation business mark, the corresponding mark of the user node and the public key information to be turned, so that the alliance Each operator node in chain makes digging mine node in alliance's chain by institute according to the broadcast information updating user list Broadcast message is stated to be written in the account book of alliance's chain.
Note transmission method provided in this embodiment based on block chain inquires institute to its adjacent node by user node State the wound generation node of alliance's chain;User node receives the wound generation node to be verified of adjacent node feedback, and by the frequency of occurrences Highest wound generation node to be verified is as the wound generation node in alliance's chain, so as to guarantee that the information in alliance's chain is pacified Entirely, guarantee is provided for the information security of user.
Fig. 5 is the structural schematic diagram for the device for avoiding honeysuckle from attacking that the embodiment of the present invention four provides, as shown in figure 5, institute Stating device includes:
Module 51 is obtained, for obtaining the corresponding operator list of alliance's chain.
Determining module 52, for determining network operation business to be turned from the operator list.
Sending module 53, for sending broadcast message according to the network operation business to be turned, the broadcast message includes described Network operation business mark, the corresponding mark of the user node and public key information to be turned, so that each operation in alliance's chain Quotient's node writes the digging mine node in alliance's chain by the broadcast message according to the broadcast information updating user list In the account book for entering alliance's chain.
The device provided in this embodiment for avoiding honeysuckle from attacking obtains the corresponding operator of alliance's chain by user node and arranges Table;User node determines network operation business to be turned from the operator list;User node is sent out according to the network operation business to be turned Broadcast message is sent, the broadcast message includes network operation business mark, the corresponding mark of the user node and the public affairs to be turned Key information so that each operator node in alliance's chain is according to the broadcast information updating user list, and makes described Digging mine node in alliance's chain the broadcast message is written in the account book of alliance's chain.So as to guarantee the safety of alliance's chain Property, and then can guarantee the safety of user account.
Optionally, described device further include:
Receiving module, the business information sent for receiving the network operation business to be turned;
Selecting module selects business datum from the business information for instructing according to the user's choice.
Optionally, described device further include:
Generation node determining module is created, for determining the wound generation node in alliance's chain;
Founder's node determining module, for determining founder's node in alliance's chain from the wound generation node;
Apply for request sending module, for sending application request to founder's node, includes in the application request Block chain mark, the operator information of public key information and the user node of the user node, so that the wound Beginning people's node judges whether the user node has a permission that alliance's chain is added according to application request, and according to sentencing Disconnected result takes respective handling.
Optionally, the wound generation node determining module includes:
Query unit, for inquiring the wound generation node of alliance's chain to its adjacent node;
Receiving unit, for receiving the wound generation node to be verified of the adjacent node feedback, and the frequency of occurrences is highest Wound generation node to be verified is as the wound generation node in alliance's chain.
Optionally, described device further include:
Module is signed, for signing the intelligent contract about the business datum with the operator node;And pass through institute The intelligent contract is sent to the operator node by the private key for stating user node;
Signature blocks are closed for receiving the operator node by the intelligence after operator's private key dual signature About, the signing of finishing service data.
Fig. 6 is the structural schematic diagram for the equipment for avoiding honeysuckle from attacking that the embodiment of the present invention five provides, as described in Figure 6, institute State the equipment for avoiding honeysuckle from attacking, comprising: memory 61, processor 62;
Memory 61;For storing the memory 61 of 62 executable instruction of processor;
Wherein, the processor 62 is configured as being executed by the processor 62 such as the above-mentioned side for avoiding honeysuckle from attacking Method.
Further embodiment of this invention provides a kind of computer readable storage medium, deposits in the computer readable storage medium Computer executed instructions are contained, avoid honeysuckle from attacking for realizing such as above-mentioned when the computer executed instructions are executed by processor The method hit.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description Specific work process, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unit Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention The part steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various It can store the medium of program code.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division progress for example, in practical application, can according to need and above-mentioned function distribution is complete by different functional modules At the internal structure of device being divided into different functional modules, to complete all or part of the functions described above.On The specific work process for stating the device of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of method for avoiding honeysuckle from attacking characterized by comprising
User node obtains the corresponding operator list of alliance's chain;
User node determines network operation business to be turned from the operator list;
User node sends broadcast message according to the network operation business to be turned, and the broadcast message includes the network operation business to be turned Mark, the corresponding mark of the user node and public key information, so that each operator node in alliance's chain is according to institute Broadcast information updating user list is stated, and makes the digging mine node in alliance's chain that alliance's chain is written in the broadcast message Account book in.
2. the method according to claim 1, wherein the user node is sent according to the network operation business to be turned After broadcast message, further includes:
User node receives the business information that the network operation business to be turned is sent;
User node instructs according to the user's choice selects business datum from the business information.
3. the method according to claim 1, wherein the user node obtains the corresponding operator's column of alliance's chain Before table, further includes:
User node determines the wound generation node in alliance's chain;
User node determines founder's node in alliance's chain from the wound generation node;
User node sends application request to founder's node, includes the block of the user node in the application request Chain mark, the operator information of public key information and the user node, so that founder's node is according to the Shen It please request to judge whether the user node has the permission that alliance's chain is added, and corresponding position is taken according to judging result Reason.
4. according to the method described in claim 3, it is characterized in that, the user node determines the wound generation section in alliance's chain Point, comprising:
User node inquires the wound generation node of alliance's chain to its adjacent node;
User node receives the wound generation node to be verified of adjacent node feedback, and by the highest wound generation to be verified of the frequency of occurrences Node is as the wound generation node in alliance's chain.
5. according to the method described in claim 2, it is characterized in that, the user node is instructed according to the user's choice from described In business information after selection business datum, further includes:
User node and the operator node sign the intelligent contract about the business datum;And pass through the user node Private key the intelligent contract is sent to the operator node;
User node receives the operator node and passes through the intelligent contract after operator's private key dual signature, finishing service The signing of data.
6. a kind of device for avoiding honeysuckle from attacking characterized by comprising
Module is obtained, for obtaining the corresponding operator list of alliance's chain;
Determining module, for determining network operation business to be turned from the operator list;
Sending module, for sending broadcast message according to the network operation business to be turned, the broadcast message includes the net to be turned Operator identifier, the corresponding mark of the user node and public key information, so that each operator node in alliance's chain According to the broadcast information updating user list, and make the digging mine node in alliance's chain will be described in broadcast message write-in In the account book of alliance's chain.
7. device according to claim 6, which is characterized in that described device further include:
Receiving module, the business information sent for receiving the network operation business to be turned;
Selecting module selects business datum from the business information for instructing according to the user's choice.
8. device according to claim 6, which is characterized in that described device further include:
Generation node determining module is created, for determining the wound generation node in alliance's chain;
Founder's node determining module, for determining founder's node in alliance's chain from the wound generation node;
Apply for request sending module, includes described in the application request for sending application request to founder's node Block chain mark, the operator information of public key information and the user node of user node, so that the founder Node judges whether the user node has the permission that alliance's chain is added according to application request, and is tied according to judgement Fruit takes respective handling.
9. a kind of equipment for avoiding honeysuckle from attacking characterized by comprising memory, processor;
Memory;For storing the memory of the processor-executable instruction;
Wherein, the processor is configured to by the processor execute it is as claimed in claims 1-5 avoid honeysuckle attack Method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium It executes instruction, is kept away when the computer executed instructions are executed by processor for realizing as described in any one in claim 1-5 Exempt from the method for honeysuckle attack.
CN201910006208.7A 2019-01-04 2019-01-04 Method, device and equipment for avoiding double-flower attack and computer readable storage medium Active CN109639715B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910006208.7A CN109639715B (en) 2019-01-04 2019-01-04 Method, device and equipment for avoiding double-flower attack and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910006208.7A CN109639715B (en) 2019-01-04 2019-01-04 Method, device and equipment for avoiding double-flower attack and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109639715A true CN109639715A (en) 2019-04-16
CN109639715B CN109639715B (en) 2021-05-18

Family

ID=66056705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910006208.7A Active CN109639715B (en) 2019-01-04 2019-01-04 Method, device and equipment for avoiding double-flower attack and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109639715B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111538791A (en) * 2020-05-07 2020-08-14 深圳创客区块链技术有限公司 Block chain multiple cross-chain mutual protection method, device and storage medium
CN113222590A (en) * 2020-01-21 2021-08-06 鸿富锦精密电子(天津)有限公司 Method and device for preventing double-flower attack and computer readable storage medium
CN114025345A (en) * 2020-07-16 2022-02-08 中国移动通信有限公司研究院 Number portability processing system, method, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995197A (en) * 2017-12-04 2018-05-04 中国电子科技集团公司第三十研究所 A kind of method for realizing across management domain identity and authority information is shared
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN108990048A (en) * 2017-05-31 2018-12-11 华为技术有限公司 The method and apparatus for determining the mark of terminal device
CN109005033A (en) * 2018-09-07 2018-12-14 全链通有限公司 The method for realizing the registration of block chain system of real name based on phone number
CN109041175A (en) * 2018-09-25 2018-12-18 全链通有限公司 Base station connection method, equipment, network and storage medium based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180183687A1 (en) * 2016-12-28 2018-06-28 Acronis International Gmbh System and Method for Managing Services and Licenses Using a Blockchain Network
CN108990048A (en) * 2017-05-31 2018-12-11 华为技术有限公司 The method and apparatus for determining the mark of terminal device
CN107995197A (en) * 2017-12-04 2018-05-04 中国电子科技集团公司第三十研究所 A kind of method for realizing across management domain identity and authority information is shared
CN109005033A (en) * 2018-09-07 2018-12-14 全链通有限公司 The method for realizing the registration of block chain system of real name based on phone number
CN109041175A (en) * 2018-09-25 2018-12-18 全链通有限公司 Base station connection method, equipment, network and storage medium based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
谢剑超: "区块链将改变运营商运作模式", 《通信企业管理》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113222590A (en) * 2020-01-21 2021-08-06 鸿富锦精密电子(天津)有限公司 Method and device for preventing double-flower attack and computer readable storage medium
CN113222590B (en) * 2020-01-21 2023-10-31 富联精密电子(天津)有限公司 Method, apparatus and computer readable storage medium for preventing double-flower attack
CN111538791A (en) * 2020-05-07 2020-08-14 深圳创客区块链技术有限公司 Block chain multiple cross-chain mutual protection method, device and storage medium
CN111538791B (en) * 2020-05-07 2023-09-22 深圳创客区块链技术有限公司 Block chain multiple-cross-chain mutual protection method, device and storage medium
CN114025345A (en) * 2020-07-16 2022-02-08 中国移动通信有限公司研究院 Number portability processing system, method, equipment and medium

Also Published As

Publication number Publication date
CN109639715B (en) 2021-05-18

Similar Documents

Publication Publication Date Title
CN108810119A (en) block chain processing method, device and block chain node
CN105578544B (en) A kind of method and terminal device of circuit domain exchange falling
CN108574969A (en) Connection processing method in multiple access scene and device
CN109640274A (en) Note transmission method, device and computer readable storage medium based on block chain
CN104581652B (en) Message treatment method, the method and apparatus for selecting MME
CN108712506B (en) Block chain node communication method and device and block chain node
CN109639715A (en) Method, apparatus, equipment and the computer readable storage medium for avoiding honeysuckle from attacking
CN109451446A (en) The number of taking turns network method, device and equipment
CN105340212A (en) Methods and apparatus for generating keys in device-to-device communications
CN105848255B (en) A kind of method and device selecting frequency point
CN108769142A (en) Exchange information processing method and block generate node
CN109087100A (en) Cryptographic key distribution method, device, equipment and storage medium
CN101772193A (en) Method, system and mobile access gateway for optimizing local routing
CN108683727B (en) Block processing method and main node
CN108566275A (en) Identity identifying method, device and block chain node
CN108123783A (en) Data transmission method, apparatus and system
CN109673010A (en) The number of taking based on block chain turns network method and device, storage medium
CN108876611A (en) Exchange information processing method, device and block chain node
CN104301106B (en) Wireless communication system and its authentication method
CN109087096B (en) Block chain account checking method, device, equipment and storage medium
CN108777712B (en) Block chain node communication method and device and block chain node
CN108777710B (en) Inter-node communication method and device of block chain and block chain node
CN108768961A (en) storage processing method and home gateway
CN112543484B (en) Method and equipment for maintaining service continuity
JP2019528603A (en) Data transmission method, first device and second device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant