CN110189124A - Anti-attack method, equipment and storage medium - Google Patents
Anti-attack method, equipment and storage medium Download PDFInfo
- Publication number
- CN110189124A CN110189124A CN201910442131.8A CN201910442131A CN110189124A CN 110189124 A CN110189124 A CN 110189124A CN 201910442131 A CN201910442131 A CN 201910442131A CN 110189124 A CN110189124 A CN 110189124A
- Authority
- CN
- China
- Prior art keywords
- transaction
- address
- memory pool
- signature address
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/403—Solvency checks
- G06Q20/4037—Remote solvency checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention provides a kind of anti-attack method, equipment and storage medium, this method comprises: the first transaction of memory pool to be deposited is parsed, to obtain the signature address of the first transaction;The remaining sum of proper account is obtained according to signature address;Judge whether remaining sum is not less than the service charge of the first transaction: it is no, then it generation error information and reports, deletes the first transaction;It is that the first transaction is then stored in memory pool.The application is by parsing address before the deposit memory pool that will trade to obtain account balance, judge whether remaining sum is enough payment procedure expense, to filter the insufficient transaction of account balance, ensure that memory pool will not be because caching account balance and being not enough to pay the transaction of service charge due to congestion.
Description
Technical field
This application involves block chain technical fields, and in particular to a kind of anti-attack method, equipment and storage medium.
Background technique
In current block catenary system, block chain node does not detect before executing transaction is to the account of the trading signature
It is no to have enough remaining sum payment procedure expenses, but service charge is deducted when executing transaction, if deducting failure, which is executed
Failure.
Based on above-mentioned mechanism, the attacker in network can generate a large amount of account balances by the account signature that Sorry, your ticket has not enough value
It is not enough to pay the transaction of service charge and is sent in block chain network to be attacked.These transaction can smoothly enter into interior
Pond is deposited, and is packaged into block, just detects service charge deficiency until being performed.When attacker largely sends this kind of transaction
When, it will cause memory pool congestion.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, it is intended to provide one kind and avoids memory pool because caching more than a large amount of accounts
Volume is not enough to pay anti-attack method, equipment and the storage medium of the transaction of service charge and congestion.
In a first aspect, the present invention provides a kind of anti-attack method, comprising:
The first transaction of memory pool to be deposited is parsed, to obtain the signature address of the first transaction;
The remaining sum of proper account is obtained according to signature address;
Judge whether remaining sum is not less than the service charge of the first transaction:
It is no, then it generation error information and reports, deletes the first transaction;
It is that the first transaction is then stored in memory pool.
Second aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory
Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention
The anti-attack method that embodiment provides.
The third aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count
Calculation machine executes the anti-attack method that each embodiment provides according to the present invention.
Anti-attack method, equipment and the storage medium that many embodiments of the present invention provide pass through in the deposit memory pool that will trade
It parses address before to obtain account balance, judges whether remaining sum is enough payment procedure expense, to filter account balance deficiency
Transaction, ensured that memory pool will not be not enough to pay the transaction of service charge due to congestion because caching account balance;
Anti-attack method, equipment and the storage medium that some embodiments of the invention provide are further by sending account for high frequency
Sorry, your ticket has not enough value at family to pay the address of the transaction of service charge and blacklist is added, and directly deletes the friendship that address is sent in blacklist
Easily, protection is further enhanced, the intrusion scene of attacker is promoted.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of flow chart for anti-attack method that one embodiment of the invention provides.
Fig. 2 is a kind of flow chart of embodiment of step S11 in method shown in Fig. 1.
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 3.
Fig. 5 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is a kind of flow chart for anti-attack method that one embodiment of the invention provides.
As shown in Figure 1, in the present embodiment, the present invention provides a kind of anti-attack method, comprising:
S11: parsing the first transaction of memory pool to be deposited, to obtain the signature address of the first transaction;
S14: the remaining sum of proper account is obtained according to signature address;
S15: judge whether remaining sum is not less than the service charge of the first transaction:
No, then follow the steps S16: generation error information simultaneously reports, and deletes the first transaction;
It is to then follow the steps S17: the first transaction is stored in memory pool.
With the private key p for the account A that attacker's first in network is 0 by account balanceASignature generates tx1, and tx1 is sent out
For being sent in block chain network:
In existing scheme, block chain node just judges that the account balance of account A is not enough to pay when executing tx1
The service charge of tx1, tx1 can smoothly enter into memory pool and be packaged into block;
And in scheme shown in Fig. 1, block chain node executes step S11 before tx1 enters memory pool, parses tx1
To obtain the signature address add of tx1A;
In step S14, according to the signature address add of step S11 acquisitionAObtain the remaining sum of proper account (account A)
(0);
In step S15, whether the remaining sum (0) that judgment step S14 is got is not less than the service charge (fee1) of tx1:
It is no, S16 is thened follow the steps, generation error information simultaneously reports, and deletes tx1.
Compared to the transaction tx1 of attacker's first malice construction, the private key label of the account B of remaining sum abundance are passed through for user's second
The transaction tx2 of name, the process of step S11-S14 is same as described above to be repeated no more, and in step S15, judges account B's
Remaining sum is greater than the service charge (fee2) of tx2, to trigger step S17, transaction tx2 is stored in memory pool.
Above-described embodiment judges remaining sum by parsing address before the deposit memory pool that will trade to obtain account balance
Whether it is enough payment procedure expense, to filter the insufficient transaction of account balance, has ensured that memory pool will not be because caching account balance
It is not enough to pay the transaction of service charge and congestion.
Fig. 2 is a kind of flow chart of embodiment of step S11 in method shown in Fig. 1.As shown in Fig. 2, preferred real one
It applies in example, step S11 includes:
S111: detection first transaction whether trading group:
No, then follow the steps S112: parsing first is traded to obtain the first of the first transaction the signature address;
It is to then follow the steps S113: according to the first transaction of trading group structure expansion, if obtaining the transaction of dry brush second;And
Step S114: parsing is located at second transaction on trading group head to obtain the second signature address.
Specifically, in the present embodiment, the transaction in block catenary system is also configured with other than configured with single transaction
The trading group of more transaction combination producings, and following rule is configured with to trading group: it is the friendship by the head transaction in trading group
Easy group pays service charge, and other transaction in the trading group are without paying service charge.
Tx3 is generated by the private key signature of account C with user third, and is given birth to user's fourth by the private key signature of account D
At tx4 form trading group tx5=(tx3, tx4), and for being sent in block chain network:
In step S111, the transaction tx5 of block chain nodal test memory pool to be deposited whether trading group: be then to execute
Step S113 is unfolded trading group tx5 according to trading group structure, obtains tx3 and tx4 and step S114, parses trading group tx5
Head transaction tx3 to obtain the second signature address addC。
In the present embodiment, the service charge of trading group is paid rule and is configured to by the head in trading group by block catenary system
Service charge is paid in transaction, other transaction are not necessarily to pay service charge, therefore the signature of head transaction need to be only parsed in step S114
Location;In more embodiments, step S114 can also pay regular solution according to the different trading group service charges that block catenary system configures
It analyses different transaction and obtains signature address, be configured to for example, paying rule when trading group service charge by every in trading group
When service charge is shared in transaction equally, then step S114 needs to parse each transaction of pen second to obtain multinomial second signature address, etc..
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.As shown in figure 3, in a preferred embodiment
In, the above method further include:
S181: whether the generation frequency for monitoring error message is more than first threshold:
It is to then follow the steps S183: detects whether that sending the frequency of illegal transaction there are the first address is more than second threshold:
It is to then follow the steps S185: blacklist is added in the first address.
Wherein, illegal transaction is the transaction that account balance is not enough to payment procedure expense.
Specifically, private key p is passed through with attacker's firstAA large amount of malice construction illegal transactions, and pass through address addAIt is sent to area
In block chain network;User's Ding Yin operation error passes through private key pDThree illegal transactions are constructed, and pass through address addDIt is sent to area
For in block chain network:
In step S181, the generation frequency of error message in monitoring step S16, when the generation frequency is more than the first threshold
Value, such as 100/minute (numerical value is merely illustrative, can according to actual needs arbitrary disposition):
If being more than first threshold, step S183 is triggered, to each illegal transaction for generating error message in the nearest period
Signature address is counted, and judging whether there is account and sending the frequency of illegal transaction is more than second threshold, such as 50/point
Clock (numerical value is equally merely illustrative, can arbitrary disposition according to actual needs, theoretically should be less than above-mentioned first threshold).
In step S183, add is detectedAThe frequency for sending illegal transaction reaches 127/minute, has been more than the second threshold
Value, and addDThe frequency for sending illegal transaction reaches 3/minute, is less than second threshold.It therefore, will in step S185
addABlacklist is added.
Specifically, in step S185, it is generally the case that in order to avoid causing bifurcated, which is configured in block chain
On, that is, by generating a transaction for addAThe blacklist on block chain is added.
For the address in blacklist, technological means commonly used in the art can be taken to be limited, for example, at one section
It is interior to freeze assets of the corresponding account in the address on current block chain, or, method, etc. shown in following figure 4.
In addition, since a large amount of maloperation causes the address of ordinary user to be added into blacklist, being used under extreme case
Family can pay on behalf the modes such as guarantee fund by another account and the address is removed blacklist.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 3.As shown in figure 4, on it is further preferred that
State method further include:
S12: judge to sign address whether in blacklist:
It is to then follow the steps S13: deletes the first transaction.
Specifically, when attacker's first passes through private key pAAfter largely maliciously constructing and send illegal transaction, it is based on step S181-
The method of S185, addAIt can be added into blacklist.
When attacker's first continues through private key pAIt, in step s 12 will be direct when malice constructs and sends illegal transaction
Judge the signature address add of the transactionAIn blacklist, the transaction is directly deleted, without executing step S14-S16.
When attacker's first replacement account, pass through private key pEWhen constructing to continue malice and send illegal transaction, as long as sending
Frequency is excessively high, that is, will lead to addEEqually it is added into blacklist;To force attacker's first that can only select through a large amount of accounts
The illegal transaction that low frequency sends malice construction is distinguished at family, to promote the intrusion scene of attacker, and is limited to attack strength
The account quantity that attacker can use simultaneously.
Above-described embodiment is further added by the address for the transaction for being not enough to pay service charge for high frequency transmission account balance
Enter blacklist, and directly delete the transaction that address is sent in blacklist, further enhance protection, promoted the attack of attacker at
This.
Fig. 5 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in figure 5, present invention also provides a kind of equipment 500, including one or more centres as on the other hand
Unit (CPU) 501 is managed, can be added according to the program being stored in read-only memory (ROM) 502 or from storage section 508
The program that is downloaded in random access storage device (RAM) 503 and execute various movements appropriate and processing.In RAM503, also deposit
It contains equipment 500 and operates required various programs and data.CPU501, ROM502 and RAM503 pass through the phase each other of bus 504
Even.Input/output (I/O) interface 505 is also connected to bus 504.
I/O interface 505 is connected to lower component: the importation 506 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 507 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 508 including hard disk etc.;
And the communications portion 509 of the network interface card including LAN card, modem etc..Communications portion 509 via such as because
The network of spy's net executes communication process.Driver 510 is also connected to I/O interface 505 as needed.Detachable media 511, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 510, in order to read from thereon
Computer program be mounted into storage section 508 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the anti-attack method of any of the above-described embodiment description may be implemented as
Computer software programs.For example, embodiment of the disclosure includes a kind of computer program product comprising be tangibly embodied in machine
Computer program on device readable medium, the computer program include the program code for executing anti-attack method.At this
In the embodiment of sample, which can be downloaded and installed from network by communications portion 509, and/or from removable
Medium 511 is unloaded to be mounted.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums
Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled
Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should
Program is used to execute the anti-attack method for being described in the application by one or more than one processor.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants
It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong
The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated
The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with
It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can
To be the software program being arranged in computer or intelligent movable equipment, it is also possible to the hardware device being separately configured.Wherein, this
The title of a little units or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature
Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions
Technical characteristic replaced mutually and the technical solution that is formed.
Claims (6)
1. a kind of anti-attack method characterized by comprising
The first transaction of memory pool to be deposited is parsed, to obtain the signature address of first transaction;
The remaining sum of proper account is obtained according to the signature address;
Judge whether the remaining sum is not less than the service charge of first transaction:
It is no, then it generation error information and reports, deletes first transaction;
It is, then by the first transaction deposit memory pool.
2. the method according to claim 1, wherein the first of the parsing memory pool to be deposited trades, to obtain
Take it is described first transaction signature address include:
Detect it is described first transaction whether trading group:
It is no, then first transaction is parsed to obtain the first signature address of first transaction;
It is, then according to trading group structure expansion first transaction, if obtaining the transaction of dry brush second;And parsing is located at transaction
Second transaction on group head is to obtain the second signature address.
3. method according to claim 1 or 2, which is characterized in that further include:
Whether the generation frequency for monitoring the error message is more than first threshold:
It is then to detect whether that it is more than second threshold that the frequency of illegal transaction is sent there are the first address:
It is that blacklist then is added in first address;
Wherein, the illegal transaction is the transaction that account balance is not enough to payment procedure expense.
4. according to the method described in claim 3, it is characterized in that, it is described according to the signature address obtain proper account more than
Before volume further include:
Judge the signature address whether in the blacklist: being then to delete first transaction.
5. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors
Execute such as method of any of claims 1-4.
6. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed
Benefit requires method described in any one of 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910442131.8A CN110189124A (en) | 2019-05-24 | 2019-05-24 | Anti-attack method, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910442131.8A CN110189124A (en) | 2019-05-24 | 2019-05-24 | Anti-attack method, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110189124A true CN110189124A (en) | 2019-08-30 |
Family
ID=67717792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910442131.8A Pending CN110189124A (en) | 2019-05-24 | 2019-05-24 | Anti-attack method, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110189124A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112653692A (en) * | 2020-12-21 | 2021-04-13 | 中山大学 | Adjustable dynamic defense mechanism for DDoS attack of bit currency memory pool |
WO2021179736A1 (en) * | 2020-03-13 | 2021-09-16 | 江苏复杂美科技有限公司 | Method for pre-storing and deducting service charge, device, and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107295017A (en) * | 2017-08-10 | 2017-10-24 | 四川长虹电器股份有限公司 | CC means of defences based on user authentication |
CN107977837A (en) * | 2017-11-10 | 2018-05-01 | 中国银行股份有限公司 | The remaining sum control method and device of hot spot account |
CN108053211A (en) * | 2017-12-27 | 2018-05-18 | 北京欧链科技有限公司 | Transaction processing method and device based on block chain |
CN108418689A (en) * | 2017-11-30 | 2018-08-17 | 矩阵元技术(深圳)有限公司 | A kind of the zero-knowledge proof method and medium of suitable block chain secret protection |
CN108764876A (en) * | 2018-05-29 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of transaction processing method and server |
WO2019003081A1 (en) * | 2017-06-30 | 2019-01-03 | nChain Holdings Limited | Probabilistic relay for efficient propagation in a blockchain network |
US20190156303A1 (en) * | 2014-03-17 | 2019-05-23 | Coinbase, Inc. | Cryptographic currency exchange |
-
2019
- 2019-05-24 CN CN201910442131.8A patent/CN110189124A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190156303A1 (en) * | 2014-03-17 | 2019-05-23 | Coinbase, Inc. | Cryptographic currency exchange |
WO2019003081A1 (en) * | 2017-06-30 | 2019-01-03 | nChain Holdings Limited | Probabilistic relay for efficient propagation in a blockchain network |
CN107295017A (en) * | 2017-08-10 | 2017-10-24 | 四川长虹电器股份有限公司 | CC means of defences based on user authentication |
CN107977837A (en) * | 2017-11-10 | 2018-05-01 | 中国银行股份有限公司 | The remaining sum control method and device of hot spot account |
CN108418689A (en) * | 2017-11-30 | 2018-08-17 | 矩阵元技术(深圳)有限公司 | A kind of the zero-knowledge proof method and medium of suitable block chain secret protection |
CN108053211A (en) * | 2017-12-27 | 2018-05-18 | 北京欧链科技有限公司 | Transaction processing method and device based on block chain |
CN108764876A (en) * | 2018-05-29 | 2018-11-06 | 深圳市元征科技股份有限公司 | A kind of transaction processing method and server |
Non-Patent Citations (1)
Title |
---|
吕坤: "基于区块链的数字资产交易系统的研究与设计", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021179736A1 (en) * | 2020-03-13 | 2021-09-16 | 江苏复杂美科技有限公司 | Method for pre-storing and deducting service charge, device, and storage medium |
CN112653692A (en) * | 2020-12-21 | 2021-04-13 | 中山大学 | Adjustable dynamic defense mechanism for DDoS attack of bit currency memory pool |
CN112653692B (en) * | 2020-12-21 | 2022-02-08 | 中山大学 | Adjustable dynamic defense mechanism for DDoS attack of bit currency memory pool |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101695923B1 (en) | Method, system and recording medium for notifying receipt of message | |
US11553039B2 (en) | Service meshes and smart contracts for zero-trust systems | |
CN108876380A (en) | A kind of method of commerce and system for depositing card based on centralization clearing and block chain | |
CN109242453A (en) | A kind of method of commerce and system for depositing card based on centralization clearing and block chain | |
US8954370B2 (en) | Policy processor for configuration management | |
CN108681964A (en) | A kind of business settlement system and settlement of transactions control method | |
US11316933B2 (en) | Service meshes and smart contracts for zero-trust systems | |
CN110458557A (en) | A kind of mode of payment, equipment and storage medium | |
CN111784341B (en) | Block chain transaction method and device, electronic equipment and storage medium | |
CN109376187A (en) | A kind of querying method and device based on block chain | |
CN111210345B (en) | Signature method and device based on block chain network transaction and terminal equipment | |
CN109669789A (en) | Transaction queuing strategy, trading pit storage method, equipment and storage medium | |
CN108846742A (en) | Block chain user credit stage division and system, equipment and storage medium | |
CN110445755A (en) | Hand over pregnable defence method, equipment and storage medium | |
CN110473036A (en) | A kind of method and apparatus generating order number | |
CN113205402A (en) | Account checking method and device, electronic equipment and computer readable medium | |
CN105321065A (en) | Multi-destination routing of transactions | |
CN110189124A (en) | Anti-attack method, equipment and storage medium | |
CN109102268A (en) | It is a kind of for polymerize payment reconciliation method and apparatus | |
CN109948960A (en) | Remove storehouse outbound, storage method and device and electronic equipment and storage medium | |
CN110264175A (en) | Fund management system and method | |
CN112511651B (en) | Service access method and device based on block chain | |
CN109934566A (en) | Red packet processing method, equipment and storage medium | |
CN110197372A (en) | Means of defence, equipment and the storage medium of trading group attack | |
US20230021606A1 (en) | Liquidity engine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |