CN112153040A - Intelligent contract installation, deployment and management method for block chain system application - Google Patents
Intelligent contract installation, deployment and management method for block chain system application Download PDFInfo
- Publication number
- CN112153040A CN112153040A CN202010994977.5A CN202010994977A CN112153040A CN 112153040 A CN112153040 A CN 112153040A CN 202010994977 A CN202010994977 A CN 202010994977A CN 112153040 A CN112153040 A CN 112153040A
- Authority
- CN
- China
- Prior art keywords
- organization
- intelligent contract
- blockchain
- block chain
- deployment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
The invention discloses a block chain system application intelligent contract installation and deployment management method. The block chain application management system analyzes and controls the security of the intelligent contract codes, and block chain network organization nodes in the same channel can acquire the secure intelligent contract from the block chain application management system to be installed and deployed. The invention uniformly issues safe and credible intelligent contracts through the blockchain application management system, installs the deployment command to each organization node of the blockchain network, ensures that the organization nodes of the blockchain network all execute a uniform consensus protocol, and can prevent the blockchain nodes from doing harm through private deployment intelligent contracts.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain system application intelligent contract installation and deployment management method.
Background
After the intelligent contract code is compiled, the intelligent contract code needs to be installed and deployed on a block chain network, the source of the intelligent contract installed on the nodes on the block chain network is legal, the safety of the intelligent contract code is generally not guaranteed, the whole life cycle of the intelligent contract is not effectively managed, and whether the nodes are correctly installed and the rights and interests of the nodes cannot be known, so that the result recorded to the block chain through the intelligent contract is not credible, and the value of the block chain system is lost. The design ensures the safety and effective management of the whole intelligent contract installation and deployment by the source of the intelligent contract, the safety detection and the formalization verification of the intelligent contract code and the installation and deployment authority control of the contract.
Disclosure of Invention
Aiming at the defects in the prior art, the method for installing, deploying and managing the intelligent contracts applied to the block chain system solves the problems of source legality, contract code safety guarantee and intelligent contract life cycle management of the intelligent contracts.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a method for installing, deploying and managing an intelligent contract applied to a blockchain system comprises the following steps:
s1, establishing a trusted environment for intelligent contract installation and deployment;
s2, creating a channel according to the trusted environment and inviting an organization to join the channel;
s3, carrying out security analysis, vulnerability detection and security report output on the intelligent contract;
and S4, managing the life cycle of the intelligent contract according to the channel and the security analysis result of the intelligent contract.
Further: the specific steps of step S1 are:
s11, generating a key and a certificate for each organization node of the blockchain network by using a certificate generation tool;
s12, a node administrator is organized through a block chain network to register and log in the block chain application management system, the domain name, the port number and the anchor node information of the block chain organization are submitted, and the lower content of the organized msp folder is packaged and uploaded to the block chain application management system;
s13, verifying and verifying the authenticity and network connectivity of domain names, port numbers, anchor node information submitted by the blockchain organization through a blockchain application management system, checking the integrity of the contents of msp packed files, and verifying whether the organization certificates of the msp packed files are complete and whether public key information is missing;
s14, publishing the organization information passing the examination to the block chain application management system;
and S15, generating a corresponding and unique communication certificate for the organization information which passes the verification through the blockchain application management system.
Further: the specific steps of step S2 are:
s21, creating a channel only containing the designated organization information, and storing the created blocks;
s22, generating channel configuration update transaction and executing according to the collected communication certificate, domain name and anchor node information of the organization confirming to join in the channel;
and S23, sending the creating block to each organization according to the domain name information, waiting for confirmation reply of each organization, and inviting the organization nodes to join the channel.
Further: the specific steps of step S3 are:
s31, using modal logic, model detection and theorem to prove a formal analysis method and a bottom-layer algorithm and principle of an automatic analysis tool, and designing a formal model according to the security requirements of the intelligent contract;
and S32, automatically analyzing the confidentiality, the authentication, the non-repudiation, the anonymity, the non-linkability and the zero-knowledge of the intelligent block chain contract protocol according to the formalized model, and giving attack routes and corresponding repair suggestions to unsafe items in the intelligent contract.
Further: the formal model in the step S31 includes a normalized input module, a comprehensive configurable analysis module, a normalized output module, a protocol vulnerability repair module, and a code vulnerability detection module;
the standardized input module is used for being responsible for basic interaction processes of protocols, modeling of attacker capability and security targets and translation of intermediate languages;
the comprehensive configurable analysis module is used for analyzing the modeled protocol;
the normalized output module is used for translating and converting the output data of the comprehensive configurable analysis module and giving out table and graphical output;
the protocol vulnerability repair module is used for giving corresponding vulnerability repair suggestions according to the analysis result;
and the code vulnerability detection module is used for carrying out security detection on the intelligent contract implementation codes.
Further: the authentications in the step S32 include existence, weak consistency, non-single-shot consistency, and single-shot consistency.
Further: the life cycle of the smart contract in the step S4 includes installation, deployment, upgrade, and rights control processes.
Further: the installation process comprises the following steps: the security analysis and detection of the intelligent contracts are completed through the block chain application management system, the intelligent contracts are packaged, the signatures are added, and then the intelligent contracts are distributed to all organizations on the block chain network and wait for the organizations to return confirmation results;
the deployment process comprises the following steps: after intelligent contract installation information of an organization node is collected through a block chain application management system, whether the collected installation success information is consistent with an endorsement strategy or not is checked, if so, a deployment process is entered, intelligent contract initialization parameters are input, an intelligent contract instantiation command is started to be issued to the block chain application management system, and the feedback of an instantiation result is waited;
the contract upgrading process comprises the following steps: carrying out security analysis on the upgraded intelligent contract, executing an installation and deployment process, and enabling a transaction interface provided by the upgraded historical contract information to be invalid so as to ensure the consistency of the block chain network node transaction;
the authority control process comprises user access channel authority control and contract method invoking authority control, and specifically comprises the following steps: and the system automatically distributes a unique access right control key value pair to the successfully established channel, distributes the access right control key value pair to the blockchain organization management system, and verifies whether the access right exists in the blockchain organization management system through the access right control key value pair for the access channel and the user of the intelligent contract.
The invention has the beneficial effects that:
(1) the block chain application management system analyzes and controls the security of the intelligent contract code, the security of the intelligent contract does not need to be calculated by each block chain link point, and each node of the block chain can better improve the node service capability of the block chain;
(2) the invention uniformly issues safe and credible intelligent contracts through the blockchain application management system, installs the deployment command to each node of the blockchain network, ensures that the blockchain network nodes all execute a uniform consensus protocol, and can prevent the blockchain nodes from doing harm through the private deployment intelligent contracts.
Drawings
FIG. 1 is a flow chart of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
As shown in fig. 1, a method for managing the installation and deployment of a blockchain system application intelligent contract includes the following steps:
s1, establishing a trusted environment for intelligent contract installation and deployment; the method comprises the following specific steps:
and S11, generating a key and a certificate according to crypto-configuration.yaml by using a certificate generation tool for each organization node of the block chain network, wherein the catalog of the key and the certificate is as follows:
s12, organization nodes are distributed in the Internet, communication between a block chain application management system and the block chain organization node management system is accessed through a domain name, an organization node administrator registers in the block chain application management system, logs in the block chain application management system through a userID and a PW, submits the domain name, the port number and the anchor node information of the organization, and packages and uploads files under an msp directory of the organization to the block chain application management system;
s13, verifying and verifying the authenticity and network connectivity of domain names, port numbers, anchor node information submitted by an organization through a block chain application management system, checking the integrity of the contents of the msp packed files, and verifying whether the organization certificates of the msp packed files are complete and whether public key information is lost;
s14, publishing the organization information passing the examination to the block chain application management system, wherein all the organization information participating in the establishment of the union chain is disclosed and transparent on the platform;
and S15, generating a corresponding and unique communication certificate for the organization information which passes the verification through the blockchain application management system. The organizer can download the certificate and the pk information to the blockchain application management system. The block chain application management system and the block chain organization node management system express the identity of each party and the authenticity of the message to the other party by exchanging certificates and signing the sent message during communication.
S2, creating a channel according to the trusted environment and inviting an organization to join the channel; the method comprises the following specific steps:
s21, creating a channel only containing the designated organization information, and storing the created blocks;
s22, generating channel configuration update transaction and executing according to the collected communication certificate, domain name and anchor node information of the organization confirming to join in the channel;
and S23, sending the creating block to each organization according to the domain name information, and waiting for confirmation reply of each organization to enable the organization node to join the channel.
S3, carrying out security analysis, vulnerability detection and security report output on the intelligent contract; the method comprises the following specific steps:
s31, using modal logic, model detection and theorem to prove a formal analysis method and a stratum algorithm and a principle of an automatic analysis tool, and designing a formal model according to the safety requirements of the intelligent contracts;
the formalized model comprises a normalized input module, a comprehensive configurable analysis module, a normalized output module, a protocol vulnerability repair module and a code vulnerability detection module;
the standardized input module is used for being responsible for basic interaction processes of protocols, modeling of attacker capability and security targets and translation of intermediate languages;
the comprehensive configurable analysis module is used for analyzing the modeled protocol;
the normalized output module is used for translating and converting the output data of the comprehensive configurable analysis module and giving out table and graphical output;
the protocol vulnerability repair module is used for giving corresponding vulnerability repair suggestions according to the analysis result;
and the code vulnerability detection module is used for carrying out security detection on the intelligent contract implementation codes.
And S32, automatically analyzing confidentiality, authentication (including existence, weak consistency, non-single-shot consistency and single-shot consistency), non-repudiation, anonymity, non-linkability and zero knowledge of the intelligent contract agreement according to the formalized model, and giving attack routes and corresponding repair suggestions to unsafe items in the intelligent contract.
And S4, managing the life cycle of the intelligent contract according to the channel and the security analysis result of the intelligent contract.
The life cycle of the intelligent contract comprises installation, deployment, upgrading and authority control processes.
In the installation, deployment and upgrade of the intelligent contract, the information interaction is carried out between the block chain organization node and the block chain application management system through a safe and credible communication network, a generator of the message adds a signature to the generated message, a message consumer firstly verifies the identity of a message initiator after receiving the message, and verifies the signature of the received message after passing the verification, so that the source of the message is ensured to be legal, and the message is not tampered.
The installation process comprises the following steps: the security analysis and detection of the intelligent contracts are completed through the block chain application management system, the intelligent contracts are packaged, the signatures are added, and then the intelligent contracts are distributed to all organizations on the block chain network and wait for the organizations to return confirmation results;
the deployment process comprises the following steps: after intelligent contract installation information of an organization node is collected through a block chain application management system, whether the collected installation success information is consistent with an endorsement strategy or not is checked, if so, a deployment process is entered, intelligent contract initialization parameters are input, an intelligent contract instantiation command is started to be issued to the block chain application management system, and the feedback of an instantiation result is waited;
the contract upgrading process comprises the following steps: carrying out security analysis on the upgraded intelligent contract, executing an installation and deployment process, and enabling a transaction interface provided by the upgraded historical contract information to be invalid so as to ensure the consistency of the block chain network organization node transaction;
the user access channel and contract calling method authority control flow is as follows: and the system automatically distributes a unique access right control key value pair to the successfully established channel, distributes the access right control key value pair to the blockchain organization management system, and verifies whether the access right exists in the blockchain organization management system through the access right control key value pair for the access channel and the user of the intelligent contract.
Claims (8)
1. A method for installing, deploying and managing an intelligent contract applied to a block chain system is characterized by comprising the following steps:
s1, establishing a trusted environment for intelligent contract installation and deployment;
s2, creating a channel according to the trusted environment and inviting an organization to join the channel;
s3, carrying out security analysis, vulnerability detection and security report output on the intelligent contract;
and S4, managing the life cycle of the intelligent contract according to the channel and the security analysis result of the intelligent contract.
2. The method for managing application-intelligent contract installation and deployment of a blockchain system according to claim 1, wherein the step S1 specifically comprises the steps of:
s11, generating a key and a certificate for each organization node of the blockchain network by using a certificate generation tool;
s12, registering and logging in the blockchain application management system through a blockchain network organization node administrator, submitting the domain name, the port number and the anchor node information of the organization node, and packaging and uploading the contents of the organized msp folder to the blockchain application management system;
s13, verifying and verifying the authenticity and network connectivity of domain names, port numbers, anchor node information submitted by the blockchain organization through a blockchain application management system, checking the integrity of the contents of msp packed files, and verifying whether the organization certificates of the msp packed files are complete and whether public key information is missing;
s14, publishing the approved blockchain organization information to the blockchain application management system;
and S15, generating a corresponding and unique communication certificate for the organization information which passes the verification through the blockchain application management system.
3. The method for managing application-intelligent contract installation and deployment of a blockchain system according to claim 1, wherein the step S2 specifically comprises the steps of:
s21, creating a channel only containing the designated organization information, and storing the created blocks;
s22, generating channel configuration update transaction and executing according to the collected communication certificate, domain name and anchor node information of the organization confirming to join in the channel;
and S23, sending the creating block to each organization according to the domain name information of the block chain organization, waiting for confirmation reply of each organization, and inviting the organization nodes to join the channel.
4. The method for managing application-intelligent contract installation and deployment of a blockchain system according to claim 1, wherein the step S3 specifically comprises the steps of:
s31, using modal logic, model detection and theorem to prove a formal analysis method and a bottom-layer algorithm and principle of an automatic analysis tool, and designing a formal model according to the security requirements of the intelligent contract;
and S32, automatically analyzing the confidentiality, the authentication, the non-repudiation, the anonymity, the non-linkability and the zero-knowledge of the intelligent block chain contract protocol according to the formalized model, and giving attack routes and corresponding repair suggestions to unsafe items in the intelligent contract.
5. The method for managing the installation and deployment of the intelligent contracts applied to the blockchain system according to claim 4, wherein the formal model in the step S31 comprises a normalized input module, a comprehensive configurable analysis module, a normalized output module, a protocol bug fixing module and a code bug detecting module;
the standardized input module is used for being responsible for basic interaction processes of protocols, modeling of attacker capability and security targets and translation of intermediate languages;
the comprehensive configurable analysis module is used for analyzing the modeled protocol;
the normalized output module is used for translating and converting the output data of the comprehensive configurable analysis module and giving out table and graphical output;
the protocol vulnerability repair module is used for giving corresponding vulnerability repair suggestions according to the analysis result;
and the code vulnerability detection module is used for carrying out security detection on the intelligent contract implementation codes.
6. The blockchain system application intelligent contract installation deployment management method according to claim 4, wherein the authentications in the step S32 include existence, weak consistency, non-single-shot consistency and single-shot consistency.
7. The method for managing installation and deployment of intelligent contracts according to block chain system application of claim 1, wherein the life cycle of the intelligent contracts in the step S4 includes installation, deployment, upgrade and authority control processes.
8. The method for managing the installation and deployment of the blockchain system application intelligent contracts according to claim 7, wherein the installation process is as follows: the security analysis and detection of the intelligent contracts are completed through the block chain application management system, the intelligent contracts are packaged, the signatures are added, and then the intelligent contracts are distributed to all organizations on the block chain network and wait for the organizations to return confirmation results;
the deployment process comprises the following steps: after intelligent contract installation information of an organization node is collected through a block chain application management system, whether the collected installation success information is consistent with an endorsement strategy or not is checked, if so, a deployment process is entered, intelligent contract initialization parameters are input, an intelligent contract instantiation command is started to be issued to the block chain application management system, and the feedback of an instantiation result is waited;
the contract upgrading process comprises the following steps: carrying out security analysis on the upgraded intelligent contract, executing an installation and deployment process, and enabling a transaction interface provided by the upgraded historical contract information to be invalid so as to ensure the consistency of the block chain network node transaction;
the authority control process comprises user access channel authority control and contract method invoking authority control, and specifically comprises the following steps: and the system automatically distributes a unique access right control key value pair to the successfully established channel, distributes the access right control key value pair to the blockchain organization management system, and verifies whether the access right exists in the blockchain organization management system through the access right control key value pair for the access channel and the user of the intelligent contract.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010994977.5A CN112153040B (en) | 2020-09-21 | 2020-09-21 | Intelligent contract installation, deployment and management method for block chain system application |
PCT/CN2021/116850 WO2022057679A1 (en) | 2020-09-21 | 2021-09-07 | Method for installing and deploying smart contract used in blockchain system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010994977.5A CN112153040B (en) | 2020-09-21 | 2020-09-21 | Intelligent contract installation, deployment and management method for block chain system application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112153040A true CN112153040A (en) | 2020-12-29 |
CN112153040B CN112153040B (en) | 2021-12-21 |
Family
ID=73894120
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010994977.5A Active CN112153040B (en) | 2020-09-21 | 2020-09-21 | Intelligent contract installation, deployment and management method for block chain system application |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112153040B (en) |
WO (1) | WO2022057679A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113010905A (en) * | 2021-03-29 | 2021-06-22 | 明链科技(深圳)有限公司 | SDK deployment architecture and packaging mode for solving block link environment security management problem |
CN113112140A (en) * | 2021-04-07 | 2021-07-13 | 中国电子科技网络信息安全有限公司 | Chain code application intelligent contract ID management method suitable for block chain infrastructure service |
CN113132384A (en) * | 2021-04-20 | 2021-07-16 | 哈尔滨工业大学 | Decentralized DNS root zone management system |
WO2022057679A1 (en) * | 2020-09-21 | 2022-03-24 | 中国电子科技网络信息安全有限公司 | Method for installing and deploying smart contract used in blockchain system |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114785602B (en) * | 2022-04-26 | 2023-08-25 | 国网四川省电力公司经济技术研究院 | Electricity data safety sharing model, method and system |
CN115225647B (en) * | 2022-07-15 | 2024-03-22 | 中国科学院信息工程研究所 | Intelligent contract-based safety interaction method between manufacturing industry data evolution entity departments |
CN115860696B (en) * | 2023-02-09 | 2023-06-06 | 广东远景信息科技有限公司 | Electronic job ticket management method and system based on block chain |
CN116743729A (en) * | 2023-08-14 | 2023-09-12 | 四川万流数据服务有限责任公司 | Intelligent contract calling device, system and method |
CN117335960B (en) * | 2023-11-02 | 2024-04-02 | 北京邮电大学 | Block chain-based carbon data sharing access method and device in zero trust network |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
US20180131723A1 (en) * | 2016-11-10 | 2018-05-10 | International Business Machines Corporation | Security Policy Inclusion with Container Deployment |
WO2019120325A2 (en) * | 2019-03-29 | 2019-06-27 | Alibaba Group Holding Limited | Retrieving access data for blockchain networks using highly available trusted execution environments |
US20190303541A1 (en) * | 2018-04-02 | 2019-10-03 | Ca, Inc. | Auditing smart contracts configured to manage and document software audits |
EP3564881A1 (en) * | 2018-05-02 | 2019-11-06 | Rockwell Automation Technologies, Inc. | Blockchain-enabled industrial devices |
US20200045019A1 (en) * | 2018-07-31 | 2020-02-06 | Ezblock Ltd. | Blockchain joining for a limited processing capability device and device access security |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107426157B (en) * | 2017-04-21 | 2020-04-17 | 杭州趣链科技有限公司 | Alliance chain authority control method based on digital certificate and CA authentication system |
CN108664787A (en) * | 2018-05-15 | 2018-10-16 | 深圳市网心科技有限公司 | Contract deployment, call method, contract audit equipment, storage medium and system |
CN112153040B (en) * | 2020-09-21 | 2021-12-21 | 中国电子科技网络信息安全有限公司 | Intelligent contract installation, deployment and management method for block chain system application |
-
2020
- 2020-09-21 CN CN202010994977.5A patent/CN112153040B/en active Active
-
2021
- 2021-09-07 WO PCT/CN2021/116850 patent/WO2022057679A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180131723A1 (en) * | 2016-11-10 | 2018-05-10 | International Business Machines Corporation | Security Policy Inclusion with Container Deployment |
CN107342858A (en) * | 2017-07-05 | 2017-11-10 | 武汉凤链科技有限公司 | A kind of intelligent contract guard method and system based on trusted context |
US20190303541A1 (en) * | 2018-04-02 | 2019-10-03 | Ca, Inc. | Auditing smart contracts configured to manage and document software audits |
EP3564881A1 (en) * | 2018-05-02 | 2019-11-06 | Rockwell Automation Technologies, Inc. | Blockchain-enabled industrial devices |
US20200045019A1 (en) * | 2018-07-31 | 2020-02-06 | Ezblock Ltd. | Blockchain joining for a limited processing capability device and device access security |
WO2019120325A2 (en) * | 2019-03-29 | 2019-06-27 | Alibaba Group Holding Limited | Retrieving access data for blockchain networks using highly available trusted execution environments |
CN110999255A (en) * | 2019-03-29 | 2020-04-10 | 阿里巴巴集团控股有限公司 | Retrieving access data for blockchain networks using high availability trusted execution environments |
Non-Patent Citations (2)
Title |
---|
CAROLINE PLAZA 等: "Distributed Solar Self-Consumption and Blockchain Solar Energy Exchanges on the Public Grid Within an Energy Community", 《IEEE》 * |
邱欣欣 等: "以太坊智能合约安全漏洞分析及对策", 《信息安全与通信保密》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022057679A1 (en) * | 2020-09-21 | 2022-03-24 | 中国电子科技网络信息安全有限公司 | Method for installing and deploying smart contract used in blockchain system |
CN113010905A (en) * | 2021-03-29 | 2021-06-22 | 明链科技(深圳)有限公司 | SDK deployment architecture and packaging mode for solving block link environment security management problem |
CN113112140A (en) * | 2021-04-07 | 2021-07-13 | 中国电子科技网络信息安全有限公司 | Chain code application intelligent contract ID management method suitable for block chain infrastructure service |
CN113132384A (en) * | 2021-04-20 | 2021-07-16 | 哈尔滨工业大学 | Decentralized DNS root zone management system |
CN113132384B (en) * | 2021-04-20 | 2022-04-19 | 哈尔滨工业大学 | Decentralized DNS root zone management system |
Also Published As
Publication number | Publication date |
---|---|
CN112153040B (en) | 2021-12-21 |
WO2022057679A1 (en) | 2022-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112153040B (en) | Intelligent contract installation, deployment and management method for block chain system application | |
CN102830992B (en) | Plug-in loading method and system | |
CN102880456B (en) | Plug-in loading method and system | |
Bellissimo et al. | Secure Software Updates: Disappointments and New Challenges. | |
Vigano | Automated security protocol analysis with the AVISPA tool | |
EP3564884A1 (en) | Method and system for verifying policy compliance of transactions in a blockchain executing smart contracts | |
CN110599095B (en) | Block chain network-based hazardous waste treatment method and node of block chain network | |
US20050166041A1 (en) | Authentication in a distributed computing environment | |
CN101226569A (en) | Method and device for checking code module in virtual machine | |
CN102523095B (en) | User digital certificate remote update method with intelligent card protection function | |
KR102151746B1 (en) | Data storage method using block chain based IoT platform | |
CN105447390A (en) | Digital certificate system based software version trusted management method | |
JP2022028632A (en) | Device and method | |
CN103034789B (en) | Bundle deployment method and device and security framework | |
CN101344903A (en) | Multi-case dynamic remote certification method based on TPM | |
US11522723B2 (en) | Secure provisiong of baseboard management controller identity of a platform | |
CN111492355A (en) | Method and control system for controlling and/or monitoring a device | |
CN107994993B (en) | Application program detection method and device | |
CN106559223A (en) | Application signature method and device | |
CN111177265A (en) | Block chain domain division method | |
GB2432433A (en) | A validatable data structure having both changeable and unchangeable sections | |
CN116896463A (en) | Trusted environment authentication method and device based on blockchain | |
CN115378605A (en) | Data processing method and device based on block chain | |
CN112333208B (en) | Block chain credibility verification method and device and block chain all-in-one machine | |
EP3575953B1 (en) | A blockchain network agent for verifying and accepting patch requests from a patch initiator and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |