CN110502898A - Method, system, device, storage medium and the electronic equipment of the intelligent contract of audit - Google Patents

Method, system, device, storage medium and the electronic equipment of the intelligent contract of audit Download PDF

Info

Publication number
CN110502898A
CN110502898A CN201910703437.4A CN201910703437A CN110502898A CN 110502898 A CN110502898 A CN 110502898A CN 201910703437 A CN201910703437 A CN 201910703437A CN 110502898 A CN110502898 A CN 110502898A
Authority
CN
China
Prior art keywords
intelligent contract
audit
contract
bytecode
input matrix
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910703437.4A
Other languages
Chinese (zh)
Other versions
CN110502898B (en
Inventor
罗进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Robotics Co Ltd
Original Assignee
Cloudminds Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Inc filed Critical Cloudminds Inc
Priority to CN201910703437.4A priority Critical patent/CN110502898B/en
Publication of CN110502898A publication Critical patent/CN110502898A/en
Application granted granted Critical
Publication of CN110502898B publication Critical patent/CN110502898B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

This disclosure relates to a kind of method, system, device, storage medium and the electronic equipment of intelligent contract of auditing, this method comprises: obtaining the bytecode of the intelligent contract;The bytecode is mapped based on word2vec algorithm to obtain target input matrix;By in the trained intelligent contract audit model of target input matrix input, the auditing result of the safety height for characterizing the intelligent contract is obtained.For solving in the related technology, by setting specific algorithm according to the bytecode of certain pattern match intelligence contract, come the lower technical problem of the accuracy rate audited to intelligent contract.

Description

Method, system, device, storage medium and the electronic equipment of the intelligent contract of audit
Technical field
This disclosure relates to intelligent contract technical field, and in particular, to a kind of method, the system, dress of intelligent contract of auditing It sets, storage medium and electronic equipment.
Background technique
Intelligent contract is a kind of computer protocol established based on block chain technology, and with the development of block chain technology, It is widely applied in the scenes such as wallet technology, the storage of persistence information, automated transaction execution.However, due to intelligent contract sheet The design defect of body causes it more safety problem occur, such as contract reentries problem, overflow problem, malice contract etc..And In order to judge whether intelligent contract is safe, and the code to intelligent contract is needed to audit.
In the related technology, by setting specific algorithm according to the bytecode of certain pattern match intelligence contract, with right Intelligent contract carries out its safety of audit judgement height, and still, in practical applications, this kind of mode is audited the accurate of intelligent contract Rate is lower.
Summary of the invention
Purpose of this disclosure is to provide a kind of method, system, device, storage medium and electronics for auditing intelligent contract to set It is standby, for solving by setting specific algorithm according to the bytecode of certain pattern match intelligence contract, to come in the related technology The lower technical problem of the accuracy rate audited to intelligent contract.
To achieve the goals above, the embodiment of the present disclosure in a first aspect, providing a kind of method of intelligent contract of auditing, institute The method of stating includes:
Obtain the bytecode of the intelligent contract;
The bytecode is mapped based on word2vec algorithm to obtain target input matrix;
By in the trained intelligent contract audit model of target input matrix input, obtain for characterizing the intelligence The auditing result of the safety height of contract.
Optionally, the intelligent contract audit model is convolutional neural networks CNN model, the training sample of the CNN model It originally include the input matrix mapped based on bytecode of the word2vec algorithm to intelligent contract, and for characterizing the intelligence The sample data pair of the probability composition of the safety height of contract.
Optionally, the width of the convolution kernel of the CNN model and the target input matrix is of same size, and/or, institute State the size phase of characteristic pattern of the size of the filter of the pond layer of CNN model with the target input matrix after convolution Together.
Optionally, the value range of the width of the width and convolution kernel of the target input matrix is 50~100, The value range of the quantity of the convolution kernel is 50~200, and the stride of the CNN model is 1.
Optionally, the method also includes:
The auditing result is stored to the block chain where the intelligent contract, and/or, the auditing result is sent To terminal, the auditing result is stored in the caching of the terminal.
Optionally, the auditing result is used for before the transaction event in corresponding intelligent contract is performed, and is examined based on this Meter result determines whether the safety of the intelligent contract meets the execution condition of the transaction event.
The second aspect of the embodiment of the present disclosure provides a kind of system of intelligent contract of auditing, comprising:
Console, the intelligent contract monitoring device being connect with the console, and with the intelligent contract monitoring device The intelligent contract audit device of connection;
The console is used for, and generates audit order, and audit order is sent to the intelligent contract monitoring dress It sets;
The intelligence contract monitoring device is used for, and intelligence to be audited is obtained from block catenary system according to audit order The bytecode of energy contract, and the bytecode of the intelligence contract is sent to the intelligent contract audit device;
The intelligence contract audit device is for method described in perform claim requirement 1.
Optionally, the console is used for, and when detecting that terminal disposes transaction event to intelligent contract, is generated for referring to Show the audit order audited to the intelligent contract.
Optionally, the intelligent contract audit device is also used to, and the auditing result is sent to the intelligent contract prison Control device;
The intelligence contract monitoring device is also used to, and the safety of the intelligent contract is determined based on the auditing result received Property whether meet the execution condition of transaction event on the intelligent contract;
If the safety of the intelligence contract is unsatisfactory for the execution condition of the transaction event, refuse the transaction event Execution.
The third aspect of the embodiment of the present disclosure provides a kind of device of intelligent contract of auditing, comprising:
Module is obtained, is configured as obtaining the bytecode of the intelligent contract;
Mapping block is configured as mapping the bytecode to obtain target input matrix based on word2vec algorithm;
Audit Module is configured as inputting the target input matrix in trained intelligent contract audit model, obtain To the auditing result of the safety height for characterizing the intelligent contract.
The fourth aspect of the embodiment of the present disclosure provides a kind of computer readable storage medium, is stored thereon with computer journey The step of sequence, which realizes any one of above-mentioned first aspect the method when being executed by processor.
5th aspect of the embodiment of the present disclosure, provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, it is any in above-mentioned first aspect to realize for executing the computer program in the memory The step of item the method.
Through the above technical solutions, obtaining the bytecode of the intelligent contract;Based on word2vec algorithm to the byte Code mapping obtains target input matrix;By in the trained intelligent contract audit model of target input matrix input, obtain For characterizing the auditing result of the safety height of the intelligent contract.Wherein, intelligent contract audit model is based on machine learning Algorithm is established, and machine learning algorithm has preferable working efficiency in pattern-recognition, is audited by trained intelligent contract Model identifies the target input matrix that the bytecode of intelligent contract maps, and improves for the audit of intelligent contract Accuracy rate.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following tool Body embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is a kind of block diagram of the system of intelligent contract of auditing shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the method for intelligent contract of auditing shown according to an exemplary embodiment.
Fig. 3 is a kind of block diagram of the device of intelligent contract of auditing shown according to an exemplary embodiment.
Fig. 4 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouched The specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
Fig. 1 is a kind of block diagram of the system of intelligent contract of auditing shown according to an exemplary embodiment, as shown in Figure 1, The system 10 includes:
Console 101, the intelligent contract monitoring device 102 being connect with the console 101, and with the intelligent contract The intelligent contract audit device 103 that monitoring device 102 connects;
The console 101 is used for, and generates audit order, and audit order is sent to the intelligent contract monitoring Device 102;
The intelligence contract monitoring device 102 is used for, and is obtained from block catenary system wait audit according to audit order Intelligent contract bytecode, and the bytecode of the intelligence contract is sent to the intelligent contract audit device 103;
The intelligence contract audit device 103 is used to execute method as shown in Figure 2, specifically includes:
S11 obtains the bytecode of the intelligent contract.
In the disclosure, console 101, intelligent contract monitoring device 102 and intelligent contract audit device 103 can both be adopted With formal implementation of hardware, can also realize in the form of software functional units.SFU software functional unit is stored in a storage In medium, including several power functions.Specifically, above-mentioned SFU software functional unit is stored in a computer readable storage medium In, including some instructions use is so that a computer equipment (can be personal computer, server or the network equipment etc.) It executes.And storage medium above-mentioned includes: read-only memory (Read-Only Memory, abbreviation ROM), random access memory The various media that can store program code such as (Random Access Memory, abbreviation RAM).Such as in a kind of possible reality It applies in mode, console 101 is deployed in local computer, intelligent contract monitoring device 102 and intelligent contract audit dress 103 are set to be deployed in Cloud Server.
Intelligent contract is deployed in block catenary system as shown in Figure 1, and intelligent contract monitoring device 102 is receiving control After the audit order that platform 101 is sent, intelligence specifically to be audited is obtained from the block catenary system according to the audit order and is closed It may include the address information for the intelligent contract to be obtained in bytecode about, such as audit order, and then according to address information Obtain the bytecode of intelligent contract to be audited.Intelligent contract monitoring device 102 sends the bytecode of the intelligence contract later To the intelligent contract audit device 103.
Optionally, the console 101 is used for, and when detecting that terminal disposes transaction event to intelligent contract, is generated and is used In the audit order that instruction audits to the intelligent contract.
Specifically, the safety of the intelligent contract as where the safety of transaction event execution by the transaction event Influence, and the transaction event being deployed on intelligent contract meeting certain condition, or while reaching the time of setting can hold automatically Row, in order to guarantee the safety of transaction event execution, console 101 is detecting terminal to intelligent contract deployment transaction event When, above-mentioned audit order is generated, so that intelligent contract audit device 103 examines the intelligent contract where transaction event Meter allows system 10 itself or user to determine whether the transaction event executes according to auditing result, ensures to a certain extent The safety that transaction event executes.
Certainly, in other possible embodiments, console 101 also can receive being used to indicate from user's triggering To the audit order that the intelligent contract is audited, and then user can be decided whether according to actual needs to intelligent conjunction About audit.
In a kind of possible embodiment, in order to examine multiple intelligent contracts simultaneously, multiple intelligent contracts can be disposed Audit device 103, and the bytecode of different intelligent contract is distributed to specific intelligent contract and examined by one reverse proxy device of deployment In counter device 103, to increase audit efficiency.
S12 maps the bytecode based on word2vec algorithm to obtain target input matrix.
Due to not of uniform size, byte of the intelligent contract audit device 103 in the intelligent contract of acquisition of different bytecodes After code, target input matrix is converted for the bytecode by word2vec algorithm, on the one hand can input square with unified goal The size of battle array is convenient for subsequent calculating, on the other hand by word2vec algorithm, can be simplified to bytecode to reject redundancy Information reduces subsequent calculation amount.It should be noted that word2vec algorithm belongs to the prior art, the disclosure is not made to have to it Body illustrates.
S13 is obtained in the trained intelligent contract audit model of target input matrix input described for characterizing The auditing result of the safety height of intelligent contract.
Specifically, in a kind of possible embodiment, the intelligence contract audit model is convolutional neural networks CNN (Convolutional Neural Networks) model, the training sample of the CNN model include being based on word2vec algorithm To the input matrix that the bytecode of intelligent contract maps, and the probability of the safety height for characterizing the intelligence contract The sample data pair of composition, the corresponding intelligent contract of the input matrix of sample data centering can be chosen known to existing safety Intelligent contract, or voluntarily write as needed, the probability of corresponding input matrix can be by manually being evaluated to obtain.CNN Model accuracy rate with higher in pattern-recognition, carrying out audit to intelligent contract by trained CNN model can improve The accuracy of obtained auditing result.
In addition, it should be noted that, for the method for intelligent contract shown in Fig. 2 of auditing, application is not limited to Intelligence contract audit device 103 shown in FIG. 1, the disclosure is not specifically limited the effective object of this method.
Optionally, the intelligent contract audit device 103 is also used to, and the auditing result is sent to the intelligent contract Monitoring device 102;
The intelligence contract monitoring device 102 is also used to, and determines the intelligent contract based on the auditing result received Whether safety meets the execution condition of the transaction event on the intelligent contract;
If the safety of the intelligence contract is unsatisfactory for the execution condition of the transaction event, refuse the transaction event Execution.
For example, there is the corresponding characterization intelligence contract of intelligent contract of the execution condition of a transaction event where it The probability of the auditing result of safety needs to be greater than or equal to 70%, if the transaction that intelligent contract monitoring device 102 receives The probability of the auditing result of intelligent contract where event is 60%, i.e., the safety of intelligent contract is unsatisfactory for holding for transaction event Row condition then refuses the execution of the transaction event, and then even if reaching the predetermined time that transaction event executes, does not also execute the friendship Easy event.If the probability of the auditing result of the intelligent contract where the transaction event that intelligent contract monitoring device 102 receives It is 80%, i.e., the safety of intelligent contract meets the execution condition of transaction event, when the predetermined time for reaching transaction event execution When, allow the execution of the transaction event.Such system 10 voluntarily can refuse the lower transaction thing of safety according to auditing result The execution of part has ensured the safety of transaction event.
In other words, in the disclosure, the auditing result is used for before the transaction event in corresponding intelligent contract is performed, Determine whether the safety of the intelligent contract meets the execution condition of the transaction event based on the auditing result.
Through the above technical solutions, obtaining the bytecode of the intelligent contract;Based on word2vec algorithm to the byte Code mapping obtains target input matrix;By in the trained intelligent contract audit model of target input matrix input, obtain For characterizing the auditing result of the safety height of the intelligent contract.Wherein, intelligent contract audit model is based on machine learning Algorithm is established, and machine learning algorithm has preferable working efficiency in pattern-recognition, is audited by trained intelligent contract Model identifies the target input matrix that the bytecode of intelligent contract maps, and improves for the audit of intelligent contract Accuracy rate.
Optionally, in the disclosure, the width phase of the width of the convolution kernel of the CNN model and the target input matrix Together, and/or, the size of the filter of the pond layer of the CNN model and feature of the target input matrix after convolution The size of figure is identical.
Specifically, it is contemplated that a line of the bytecode of intelligent peace treaty includes a complete information, cannot be split, Therefore width and the target input matrix of the convolution kernel of setting CNN model is of same size, the characteristic pattern that convolution obtains Width is 1, for characterizing the feature of a line bytecode.And in order to be further simplified the information that bytecode includes, CNN model is set Pond layer filter size it is identical as the size of characteristic pattern of the target input matrix after convolution, and then convolution Any feature figure afterwards passes through filter Chi Huahou, and the size of obtained characteristic pattern is 1*1, and the information content for including reduces, adds Fast calculating speed.
For example, the size of target input matrix is n*k1*1, wherein n is the height of target input matrix, size It can be as unit of operation code, i.e., when being mapped by word2vec algorithm, as a unit with 32 bytes, in turn 1 unit height of target input matrix corresponds to 32 bytes of bytecode, and k1 indicates the width of target input matrix, and target is defeated Entering 1 in matrix size indicates that target input matrix is single channel.The size of convolution kernel is h*k2*w, wherein h is that convolution kernel is high Degree, k2 is convolution kernel width, and k2=k1, w indicate the quantity of convolution kernel.The size of the characteristic pattern obtained after convolution is c* 1*w, the i.e. height of characteristic pattern after convolution are c, width 1, quantity w, wherein c=(n-h)/stride+1, stride are The stride of CNN model.The size of the filter of pond layer be c*1*w, i.e., the height of filter be c, width 1, quantity w, Size obtained from by every characteristic pattern of filter Chi Huahou is 1*1.It can choose effect pair when filter pond Characteristic pattern of the maximum value as Chi Huahou as in.Chi Huahou, can full articulamentum by the characteristic pattern of Chi Huahou through CNN model Classified by softmax and exports auditing result.
Optionally, the value range of the width of the width and convolution kernel of the target input matrix is 50~100, The value range of the quantity of the convolution kernel is 50~200, and the stride of the CNN model is 1.
Above-mentioned example is continued to use, in a kind of possible embodiment, k1=k2=100, w=200, stride=1, h= 2, it should be noted that for different convolution kernels, the value of convolution kernel height h can be different, such as have 3 convolution kernels, the The height h=1 of one convolution kernel, the height h=2 of second convolution kernel, the height h=5 of third convolution kernel are so wrapped Characteristic pattern containing different information.It can be avoided using Dropout (random inactivation) algorithm when the full articulamentum training of CNN model The activation primitive of fitting, CNN model uses ReLu (Rectified Linear Unit, line rectification function).
Optionally, in the disclosure, the method for auditing intelligent contract can also include:
The auditing result is stored to the block chain where the intelligent contract, and/or, the auditing result is sent To terminal, the auditing result is stored in the caching of the terminal.
Specifically, above-mentioned steps S13 execution after, obtained auditing result is stored, for example, simultaneously store to In block chain and in the caching of terminal, and then when user needs to inquire auditing result, can first in the caching of terminal into Row search, if search in block chain less than scanning for.It is of course also possible to which auditing result is led to according to user instructions Terminal output is crossed, such as is shown by the display screen of terminal.
The another aspect of the embodiment of the present disclosure also provides a kind of device of intelligent contract of auditing, as shown in figure 3, the device 200 include:
Module 210 is obtained, is configured as obtaining the bytecode of the intelligent contract;
Mapping block 220 is configured as mapping the bytecode to obtain target input matrix based on word2vec algorithm;
Audit Module 230 is configured as inputting the target input matrix in trained intelligent contract audit model, Obtain the auditing result of the safety height for characterizing the intelligent contract.
Through the above technical solutions, obtaining the bytecode of the intelligent contract;Based on word2vec algorithm to the byte Code mapping obtains target input matrix;By in the trained intelligent contract audit model of target input matrix input, obtain For characterizing the auditing result of the safety height of the intelligent contract.Wherein, intelligent contract audit model is based on machine learning Algorithm is established, and machine learning algorithm has preferable working efficiency in pattern-recognition, is audited by trained intelligent contract Model identifies the target input matrix that the bytecode of intelligent contract maps, and improves for the audit of intelligent contract Accuracy rate.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 4 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.For example, electronic equipment 1900 can be with It is provided as a server.Referring to Fig. 4, electronic equipment 1900 includes processor 1922, and quantity can be one or more, with And memory 1932, for storing the computer program that can be executed by processor 1922.The computer stored in memory 1932 Program may include it is one or more each correspond to one group of instruction module.In addition, processor 1922 can be by It is configured to execute the computer program, the method to execute the intelligent contract of above-mentioned audit.
In addition, electronic equipment 1900 can also include power supply module 1926 and communication component 1950, the power supply module 1926 It can be configured as the power management for executing electronic equipment 1900, which can be configured as realization electronic equipment 1900 communication, for example, wired or wireless communication.In addition, the electronic equipment 1900 can also include that input/output (I/O) connects Mouth 1958.Electronic equipment 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM etc..
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it should The step of method of the intelligent contract of above-mentioned audit is realized when program instruction is executed by processor.For example, this computer-readable is deposited Storage media can be the above-mentioned memory 1932 including program instruction, and above procedure instruction can be by the processor of electronic equipment 1900 1922 methods executed to complete the intelligent contract of above-mentioned audit.
In a further exemplary embodiment, a kind of computer program product is also provided, which includes energy Enough computer programs executed by programmable device, which has is used for when being executed by the programmable device Execute the code section of the method for the intelligent contract of above-mentioned audit.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned reality The detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosure Monotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lance In the case where shield, can be combined in any appropriate way, in order to avoid unnecessary repetition, the disclosure to it is various can No further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originally Disclosed thought equally should be considered as disclosure disclosure of that.

Claims (12)

1. a kind of method for intelligent contract of auditing, which is characterized in that the described method includes:
Obtain the bytecode of the intelligent contract;
The bytecode is mapped based on word2vec algorithm to obtain target input matrix;
By in the trained intelligent contract audit model of target input matrix input, obtain for characterizing the intelligent contract Safety height auditing result.
2. the method according to claim 1, wherein the intelligence contract audit model is convolutional neural networks CNN model, the training sample of the CNN model include being mapped based on bytecode of the word2vec algorithm to intelligent contract Input matrix, and safety height for characterizing the intelligence contract probability composition sample data pair.
3. according to the method described in claim 2, it is characterized in that, the width of the convolution kernel of the CNN model and the target Input matrix it is of same size, and/or, the size of the filter of the pond layer of the CNN model and the target input matrix The size of characteristic pattern after convolution is identical.
4. according to the method described in claim 3, it is characterized in that, the width and the convolution kernel of the target input matrix The value range of width is 50~100, and the value range of the quantity of the convolution kernel is 50~200, the step of the CNN model Width is 1.
5. the method according to claim 1, wherein the method also includes:
The auditing result is stored to the block chain where the intelligent contract, and/or, the auditing result is sent to end End, the auditing result is stored in the caching of the terminal.
6. the method according to claim 1, wherein the auditing result is used in corresponding intelligent contract Before transaction event is performed, determine whether the safety of the intelligent contract meets the transaction event based on the auditing result Execution condition.
7. a kind of system for intelligent contract of auditing characterized by comprising
Console, the intelligent contract monitoring device being connect with the console, and connect with the intelligent contract monitoring device Intelligent contract audit device;
The console is used for, and generates audit order, and audit order is sent to the intelligent contract monitoring device;
The intelligence contract monitoring device is used for, and is obtained intelligence to be audited from block catenary system according to the audit order and is closed Bytecode about, and the bytecode of the intelligence contract is sent to the intelligent contract audit device;
The intelligence contract audit device is for method described in perform claim requirement 1.
8. system according to claim 7, which is characterized in that the console is used for, and is detecting terminal to intelligent conjunction When about disposing transaction event, the audit order for being used to indicate and auditing to the intelligent contract is generated.
9. system according to claim 7, which is characterized in that the intelligence contract audit device is also used to, and is examined described Meter result is sent to the intelligent contract monitoring device;
The intelligence contract monitoring device is also used to, and the safety for determining the intelligent contract based on the auditing result received is The no execution condition for meeting the transaction event on the intelligent contract;
If the safety of the intelligence contract is unsatisfactory for the execution condition of the transaction event, refuse holding for the transaction event Row.
10. a kind of device for intelligent contract of auditing characterized by comprising
Module is obtained, is configured as obtaining the bytecode of the intelligent contract;
Mapping block is configured as mapping the bytecode to obtain target input matrix based on word2vec algorithm;
Audit Module is configured as inputting the target input matrix in trained intelligent contract audit model, be used In the auditing result for the safety height for characterizing the intelligent contract.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of any one of claims 1 to 6 the method is realized when execution.
12. a kind of electronic equipment characterized by comprising
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize any one of claims 1 to 6 institute The step of stating method.
CN201910703437.4A 2019-07-31 2019-07-31 Method, system, device, storage medium and electronic equipment for auditing intelligent contracts Active CN110502898B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910703437.4A CN110502898B (en) 2019-07-31 2019-07-31 Method, system, device, storage medium and electronic equipment for auditing intelligent contracts

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910703437.4A CN110502898B (en) 2019-07-31 2019-07-31 Method, system, device, storage medium and electronic equipment for auditing intelligent contracts

Publications (2)

Publication Number Publication Date
CN110502898A true CN110502898A (en) 2019-11-26
CN110502898B CN110502898B (en) 2022-07-05

Family

ID=68586837

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910703437.4A Active CN110502898B (en) 2019-07-31 2019-07-31 Method, system, device, storage medium and electronic equipment for auditing intelligent contracts

Country Status (1)

Country Link
CN (1) CN110502898B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112465117A (en) * 2020-11-25 2021-03-09 平安科技(深圳)有限公司 Contract generation model construction method, device, equipment and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105891215A (en) * 2016-03-31 2016-08-24 浙江工业大学 Welding visual detection method and device based on convolutional neural network
CN106776580A (en) * 2017-01-20 2017-05-31 中山大学 The theme line recognition methods of the deep neural network CNN and RNN of mixing
CN107679250A (en) * 2017-11-01 2018-02-09 浙江工业大学 A kind of multitask layered image search method based on depth own coding convolutional neural networks
CN107707410A (en) * 2017-10-26 2018-02-16 上海点融信息科技有限责任公司 Configure method, information processor and the readable storage medium storing program for executing of system audit service
CN108280511A (en) * 2018-01-10 2018-07-13 北京掌阔移动传媒科技有限公司 A method of network access data is carried out based on convolutional network and is handled
US20180285740A1 (en) * 2017-04-03 2018-10-04 Royal Bank Of Canada Systems and methods for malicious code detection
CN108985066A (en) * 2018-05-25 2018-12-11 北京金山安全软件有限公司 Intelligent contract security vulnerability detection method, device, terminal and storage medium
CN108985936A (en) * 2018-07-09 2018-12-11 北京中电普华信息技术有限公司 A kind of auditing method and system based on intelligent contract
US20180373880A1 (en) * 2015-09-24 2018-12-27 International Business Machines Corporation Machine Learning Statistical Methods Estimating Software System's Security Analysis Assessment or Audit Effort, Cost and Processing Decisions
CN109460663A (en) * 2018-11-12 2019-03-12 北京知道创宇信息技术有限公司 A kind of intelligence contract auditing method, device and its storage medium
CN109933991A (en) * 2019-03-20 2019-06-25 杭州拜思科技有限公司 A kind of method, apparatus of intelligence contract Hole Detection
CN109948345A (en) * 2019-03-20 2019-06-28 杭州拜思科技有限公司 A kind of method, the system of intelligence contract Hole Detection
CN109977682A (en) * 2019-04-01 2019-07-05 中山大学 A kind of block chain intelligence contract leak detection method and device based on deep learning
CN110008699A (en) * 2019-03-19 2019-07-12 南瑞集团有限公司 A kind of software vulnerability detection method neural network based and device

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180373880A1 (en) * 2015-09-24 2018-12-27 International Business Machines Corporation Machine Learning Statistical Methods Estimating Software System's Security Analysis Assessment or Audit Effort, Cost and Processing Decisions
CN105891215A (en) * 2016-03-31 2016-08-24 浙江工业大学 Welding visual detection method and device based on convolutional neural network
CN106776580A (en) * 2017-01-20 2017-05-31 中山大学 The theme line recognition methods of the deep neural network CNN and RNN of mixing
US20180285740A1 (en) * 2017-04-03 2018-10-04 Royal Bank Of Canada Systems and methods for malicious code detection
CN107707410A (en) * 2017-10-26 2018-02-16 上海点融信息科技有限责任公司 Configure method, information processor and the readable storage medium storing program for executing of system audit service
CN107679250A (en) * 2017-11-01 2018-02-09 浙江工业大学 A kind of multitask layered image search method based on depth own coding convolutional neural networks
CN108280511A (en) * 2018-01-10 2018-07-13 北京掌阔移动传媒科技有限公司 A method of network access data is carried out based on convolutional network and is handled
CN108985066A (en) * 2018-05-25 2018-12-11 北京金山安全软件有限公司 Intelligent contract security vulnerability detection method, device, terminal and storage medium
CN108985936A (en) * 2018-07-09 2018-12-11 北京中电普华信息技术有限公司 A kind of auditing method and system based on intelligent contract
CN109460663A (en) * 2018-11-12 2019-03-12 北京知道创宇信息技术有限公司 A kind of intelligence contract auditing method, device and its storage medium
CN110008699A (en) * 2019-03-19 2019-07-12 南瑞集团有限公司 A kind of software vulnerability detection method neural network based and device
CN109933991A (en) * 2019-03-20 2019-06-25 杭州拜思科技有限公司 A kind of method, apparatus of intelligence contract Hole Detection
CN109948345A (en) * 2019-03-20 2019-06-28 杭州拜思科技有限公司 A kind of method, the system of intelligence contract Hole Detection
CN109977682A (en) * 2019-04-01 2019-07-05 中山大学 A kind of block chain intelligence contract leak detection method and device based on deep learning

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
X.SHE 等: ""Text Classification Based on Hybrid CNN-LSTM Hybrid Model"", 《2018 11TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID)》 *
张慧 等: ""深度学习在目标视觉检测中的应用进展与展望"", 《自动化学报》 *
柳振东: ""卷积神经网络在图像分类中的研究与应用"", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112465117A (en) * 2020-11-25 2021-03-09 平安科技(深圳)有限公司 Contract generation model construction method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110502898B (en) 2022-07-05

Similar Documents

Publication Publication Date Title
CN104346148B (en) Obtain method, the apparatus and system of program feature consumption information
CN107819783A (en) A kind of network security detection method and system based on threat information
CN106557747B (en) The method and device of identification insurance single numbers
CN104506538B (en) Machine learning type domain name system security defence method and device
CN106686020A (en) Detection method, device and system for safety of domain names
CN106878262A (en) Message detecting method and device, the method and device for setting up high in the clouds threat information bank
CN109246027B (en) Network maintenance method and device and terminal equipment
CN108008350A (en) Localization method, device and storage medium based on Random Forest model
CN108647145A (en) software memory safety detection method and system
CN104992348B (en) A kind of method and apparatus of information displaying
CN109344258A (en) A kind of intelligent self-adaptive sensitive data identifying system and method
CN109818961A (en) A kind of network inbreak detection method, device and equipment
CN110399720A (en) A kind of method and relevant apparatus of file detection
CN109194684A (en) A kind of method, apparatus and calculating equipment of simulation Denial of Service attack
CN107370804A (en) Software application treating method and apparatus
CN109951846A (en) Wireless network recognition methods, device, storage medium and computer equipment
CN107807935B (en) Using recommended method and device
CN104270362B (en) request processing method and device
CN108108436A (en) Date storage method, device, storage medium and electronic equipment
CN110380925A (en) A kind of network equipment detection middle port selection method and system
CN107800670A (en) Method and apparatus for early warning web portal security
CN110502898A (en) Method, system, device, storage medium and the electronic equipment of the intelligent contract of audit
CN104077524B (en) Training method and viruses indentification method and device for viruses indentification
CN113872788A (en) Database configuration parameter adjusting method, device and storage medium
CN106919576A (en) Using the method and device of two grades of classes keywords database search for application now

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210303

Address after: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Applicant after: Dalu Robot Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: Shenzhen Qianhaida Yunyun Intelligent Technology Co.,Ltd.

TA01 Transfer of patent application right
CB02 Change of applicant information

Address after: 201111 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant after: Dayu robot Co.,Ltd.

Address before: 201111 2nd floor, building 2, no.1508, Kunyang Road, Minhang District, Shanghai

Applicant before: Dalu Robot Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant