CN112182601A - Domain name data storage method and system based on block chain - Google Patents

Domain name data storage method and system based on block chain Download PDF

Info

Publication number
CN112182601A
CN112182601A CN202010992834.0A CN202010992834A CN112182601A CN 112182601 A CN112182601 A CN 112182601A CN 202010992834 A CN202010992834 A CN 202010992834A CN 112182601 A CN112182601 A CN 112182601A
Authority
CN
China
Prior art keywords
data
recursive
domain name
retrieval
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010992834.0A
Other languages
Chinese (zh)
Inventor
李晓东
张玉军
苏越
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Computing Technology of CAS
Original Assignee
Institute of Computing Technology of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Computing Technology of CAS filed Critical Institute of Computing Technology of CAS
Priority to CN202010992834.0A priority Critical patent/CN112182601A/en
Publication of CN112182601A publication Critical patent/CN112182601A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a domain name data storage method based on a block chain, which comprises the following steps: performing recursive retrieval through a DNS recursive server according to the query information of the user; after the intermediate data of the recursive retrieval are obtained, carrying out security detection on the intermediate data; sending the target data obtained by recursive retrieval to the user; and encrypting the target data, the intermediate data, the detection result of the intermediate data and the process information of the recursive retrieval to generate blocks and link the blocks into a block chain.

Description

Domain name data storage method and system based on block chain
Technical Field
The invention relates to the technical field of computer security, in particular to a fusion monitoring method of recursive block chain stored data based on domain name security.
Background
From a technology level, a Blockchain (Blockchain) is an important concept related to many scientific and technical problems such as mathematics, cryptography, internet, computer programming and the like. From the application perspective, the blockchain is a distributed shared account book and a database, and has the characteristics of decentralization, no tampering, trace leaving in the whole process, traceability, collective maintenance, public transparency and the like. The characteristics ensure the honesty and the transparency of the block chain and lay a foundation for creating trust for the block chain. And the rich application scenes of the block chains basically solve the problem of information asymmetry based on the block chains, and realize the cooperative trust and consistent action among a plurality of main bodies. The blockchain ledger can be used as a decentralized database for maintaining detailed information for each transaction. These transactions are added to the ledger in chronological order and stored as a series of blocks. Each block references a previous block to form an interconnect chain. Such ledgers are distributed across multiple nodes, each node maintaining a complete copy. The blockchain will automatically synchronize and validate transactions for all nodes. The ledger is transparent and verifiable to all participating members, without the need for central authorization or third party verification services.
The process of storing data into a blockchain is divided into six steps: first, data slices are created. The storage system divides the data into smaller segments, a process called striping. Fragmentation involves breaking up data into manageable chunks, which may be distributed across multiple nodes. The exact fragmentation method depends on the data type and the application performing the fragmentation. Second, each slice is encrypted. After the first step is completed, the storage system encrypts each data fragment on the local system. The content owner has full control over this process. The goal is to ensure that anyone other than the content owner cannot view or access the data in the shard, regardless of where the data is located and whether the data is static or dynamic. Third, a hash is generated for each slice. The blockchain storage system generates a unique hash value, i.e., a fixed-length encrypted output string, from the fragmented data or encryption key. A hash is added to the ledger and shard metadata to link the transaction to the stored shard. The exact method of generating the hash varies from system to system. Fourth, each slice is replicated. The storage system replicates each shard so there are enough redundant copies to ensure availability and performance to prevent performance degradation and data loss situations. The content owner will determine how many copies to make for each fragment and where the fragments are located. As part of this process, the content owner should determine a minimum copy number threshold to ensure that data is not lost. Fifth, the replicated shards are distributed. The P2P network distributes replicated shards to geographically dispersed storage nodes, whether geographically or globally. Multiple businesses or individuals (sometimes called farmers) own a storage node while renting additional storage space in exchange for some type of compensation, usually cryptocurrency. No one entity owns all the storage resources or controls the storage infrastructure. Only the content owner has full access to all of its data, no matter where these nodes are located. Sixth, the transaction is recorded to a ledger. The storage system records all transactions in the blockchain ledger and synchronizes information between all nodes. The ledger will store detailed information about the transaction such as the shard location, shard hash, and lease cost. Because the ledger is based on blockchain technology, it has transparency, verifiability, traceability and tamper resistance.
The Domain Name System, often abbreviated by the user as DNS, is a service provided to people on the internet. The DNS is actually a special distributed database, and can map domain names and IP addresses with each other, and its value provides convenience and quickness to users, so that users can easily perform network query without knowing the principle behind them. Domain name resolution refers to pointing a domain name to the corresponding website space IP address, so that a user of a network can achieve a desire to access a specific webpage only through the registered domain name.
The DNS analysis process comprises the following steps: domain name-DNS (i.e., domain name resolution server) -IP address. When the user intends to complete the above mapping process, the role of the domain name resolution function is highlighted, and the role is to package and send the domain name whose IP address is desired to be found later in the format of DNS request, and if the server does not cache its corresponding information in advance, then continue to transfer to the local using the concept of message. If the relevant information is obtained in the local domain name server, the host address corresponding to the domain name is returned to the calling function, and the format is a response message. The domain name server needs to have the further feature of being able to forward requests to other machines to prevent that one's own machine cannot "answer" the question of the presenter. If the domain name server cannot respond to the request, it will send a new "question" to a new "root" (root server) to solve the analytic response, and then query downward from the new "root", and continuously research into underlying machines by using such a recursive query manner until the result desired by the querier is obtained. Once the domain name resolver obtains the specific result, the mapping result is stored in the cache, and the cache can tell the problem sender the response desired when inquiring next time, so that a plurality of inquiries are saved.
Fig. 1 specifically illustrates a specific resolution process of a domain name girigi. The user wants to obtain the IP address of the domain name and ask for help from the resolver, but if the answer expected by the user cannot be found in the cache, the user can only send a request to the local server from the local server, and if the answer to the question is not obtained, the local server sends the same query request to the root direction, and then the local server is made to access the au name server after getting the return notification, so the local name server does the operation again. The query is iterated layer by layer in a tree form, the IP address corresponding to the original complete domain name is finally queried, the local name server obtains the IP address result and informs the questioner of the answer, and the user finally obtains the desired answer. Meanwhile, the IP address corresponding to the domain name is cached in a local name server, so that time and labor are saved for the next query.
The malicious domain name monitoring means that safety monitoring is performed on data returned by a domain name server through a certain algorithm, the monitored safe data is written into a white list, and unsafe data is written into a black list, so that the safety of the data is ensured, and the network safety of a user is further ensured. Such data includes, but is not limited to, domain name text, domain name resource records, and the like.
Therefore, researchers in the security field are dedicated to data query or storage on the basis of ensuring data security, and the same thinking can be applied to block chain data storage.
The technical scheme of malicious domain name detection in the prior art comprises the following steps:
the method comprises the specific operation of adding a data monitoring module, and monitoring data to a certain extent through the monitoring module before inputting the data into a block chain for storage. The specific operation flow is shown in figure 2. The technical scheme has the following defects:
1. the method has no pertinence, and although the method proposes to monitor the data of the block chain, a targeted monitoring algorithm for different data is not proposed;
2. the safety is not enough, although the method ensures the safety of the data center, the input data is not monitored, and the data high risk still exists;
3. the accuracy is not enough, the design of the data acquisition module is not reasonable enough, the block chain has a self storage mechanism, and some snakes are added after the data acquisition module is added.
(II) malicious domain name monitoring algorithm: the monitoring method for distinguishing whether a domain name is malicious or not is various, including but not limited to: analyzing network traffic, detecting web page content, detecting DNS data, establishing a blacklist and a whitelist, and the like. The most common method is to analyze DNS data in conjunction with machine learning algorithms. The common input of the algorithm is the DNS and related data, and the output is whether the domain name is secure or not. The technical scheme has the following defects:
1. the pertinence is too strong, each monitoring method is directed to a specific type of data set, but the data to be written into the block chain is insufficient, the data written into the block chain is manifold, and the monitoring of the data by only one method is inaccurate.
2. Different malicious domain name monitoring algorithms have different test results for the same data, so that a certain problem exists in selecting which monitoring method under the condition of given input data.
Disclosure of Invention
In order to solve the above problems, the present invention provides a domain name data storage method based on a block chain, including: performing recursive retrieval through a DNS recursive server according to the query information of the user; after the intermediate data of the recursive retrieval are obtained, carrying out security detection on the intermediate data; sending the target data obtained by recursive retrieval to the user; and encrypting the target data, the intermediate data, the detection result of the intermediate data and the process information of the recursive retrieval to generate blocks and link the blocks into a block chain.
When the intermediate data obtained by the current round of recursive retrieval is subjected to security detection, if the detection result is safe, the next round of recursive retrieval is carried out, otherwise, the detection result is sent to the user, and the recursive retrieval is terminated or the next round of recursive retrieval is carried out according to the indication of the user.
The domain name data storage method of the invention sends the query information to the DNS recursive server through the domain name server to carry out recursive retrieval; and the intermediate data with the detection result of safety and the target data are stored in the domain name server.
According to the domain name data storage method, if all the detection results are safe, the DNS recursive server is added into the block chain network to become the accounting node.
The invention also provides a domain name data storage system based on the block chain, which comprises: the retrieval module is used for carrying out recursive retrieval through the DNS recursive server according to the query information of the user; after the intermediate data of the recursive retrieval are obtained, carrying out security detection on the intermediate data; the interactive module is used for sending the target data obtained by the recursive retrieval to the user; and the storage module is used for encrypting the target data, the intermediate data, the detection result of the intermediate data and the process information of the recursive retrieval to generate a block and linking the block into a block chain.
When the retrieval module carries out security detection on the intermediate data obtained by the current round of recursive retrieval, if the detection result is safe, the next round of recursive retrieval is carried out, otherwise, the feedback module is called to send the detection result to the user, and the recursive retrieval is terminated or the next round of recursive retrieval is carried out according to the indication of the user.
The domain name data storage system of the invention, wherein the interactive module sends the query information to the DNS recursive server through the domain name server; the storage module is also used for storing the intermediate data with the detection result of safety and the target data to the domain name server.
In the domain name data storage system, if all the detection results are safe, the DNS recursive server is added into the block chain network to become an accounting node.
The present invention also provides a computer-readable storage medium storing computer-executable instructions for performing the above-mentioned domain name data storage method based on block chains.
The present invention also proposes a data processing apparatus comprising the computer-readable storage medium as described above, and a processor of the data processing apparatus retrieves and executes computer-executable instructions in the computer-readable storage medium to perform domain name data storage based on a block chain.
Drawings
FIG. 1 is a schematic diagram of a prior art DNS recursive query.
Fig. 2 is a block chain-based data center monitoring management system architecture diagram in the prior art.
Fig. 3 is a schematic diagram of domain name data storage based on block chains according to the present invention.
Fig. 4 is a schematic diagram of domain name data security detection based on the blockchain according to the present invention.
Fig. 5 is a flowchart of a domain name data storage method based on a block chain according to the present invention.
FIG. 6 is a schematic diagram of a data processing apparatus of the present invention.
Detailed Description
The invention aims to solve the problems that the prior art is low in robustness, the query result cannot be stored and updated and the like, and provides a domain name data storage method and system based on a block chain.
The inventor finds that the defects in the prior art are caused by low innovation, unsafe DNS query result and low algorithm robustness when carrying out domain name safety research, and the inventor finds that the defects can be solved by carrying out malicious domain name detection on a block chain and intermediate data of domain name recursive retrieval through DNS safety and block chain research. The core content of the invention comprises: the method comprises the steps that firstly, DNS data query and block chain data storage are combined, and the problems of storage of DNS query results and rationality of block chain storage contents are solved; secondly, recursively chaining DNS data to solve the safety problem of a DNS query result storage position, and a block chain ensures the safety of the stored data through characteristics such as an intelligent contract and a consensus algorithm to prevent DNS data from being leaked; thirdly, the malicious domain name monitoring algorithm is fused to monitor the data input into the DNS, so that the problem that the existing malicious domain name monitoring algorithm is too strong in pertinence is solved, and the absolute safety of the input block chain data is ensured;
first, the basic solution of the present invention is a service architecture for domain name data recursive uplink (blockchain), which is divided into three parts as shown in fig. 3: a domain name service platform, a data exchange platform and a block chain.
The user (user) queries data through a domain name service platform (domain name server), and performs DNS query through a recursive server aiming at domain name basic information (such as DNS or URL link) provided by the user, and the query is a recursive process, so that a return result of the recursive server is returned to the domain name server on one hand, and subsequent query is facilitated; and on the other hand, data returned by the recursive server is interacted with the block chain through the data interaction platform, the safe query data is encrypted and then written into the account book, and the encrypted query data is stored in the block chain.
The data exchange platform is a middle 'springboard', and is convenient for the domain name service platform to interact with the block chain so as to write and query data, and the data exchange platform plays roles in analyzing the security of the data, writing DNS data into the block chain through an API to form a block and the like.
The block chain plays a role in storing DNS data, keeps the original characteristics and advantages of the block chain, ensures safety through the original supervision mechanism of the block chain, encrypts and decrypts the data through an intelligent contract and a consensus algorithm, meanwhile, keeps the original data structure of the block chain for data storage, and also supports other applications of a common block chain.
On the basis of recursive chaining of domain name data, the invention also provides a fused domain name security monitoring model, which ensures the security of data input into the block chain through the data exchange platform and solves the problem that the common algorithm has over-strong pertinence, namely, the model fuses a plurality of malicious domain name data monitoring algorithms, a user can select the needed algorithm by himself or directly use the fused model to monitor the data generated by the recursive server, and on the basis of ensuring the data security, the safe data is written into the blocks of the block chain through the data exchange platform. Fig. 4 depicts the complete architecture of the present invention.
Fig. 5 is a flowchart of a domain name data storage method based on a block chain according to the present invention. As shown in fig. 5, the domain name data storage method of the present invention specifically includes:
step S1, the user/initiator interacts with the domain name service platform (domain name server) through the stub client, the design of the domain name service platform is similar to bind, and submits to the domain name service platform to inquire information, including the content to be inquired (such as domain name text www.baidu.com, etc.), the domain name service platform completes the caching mechanism, supports the protocols of DoH, DNSSEC, etc., and can inquire the authoritative server, and can interact with the block chain;
step S2, the domain name service platform carries out recursion retrieval through a DNS recursion server according to the query information of the user; the recursion servers carry out query layer by layer in a recursion manner, return results (intermediate data) of each layer of recursion servers are subjected to security detection, security detection operation can be carried out by transmitting the return results to a malicious domain name data detection algorithm platform, in the malicious domain name data detection algorithm platform, a targeted monitoring algorithm is selected or a fusion model is adopted to monitor the return results aiming at an optional monitoring method provided by the malicious domain name data detection algorithm platform, and if the return results of the recursion servers of the current layer are safe, namely the detection results of the recursion retrieval of the current round are safe, the recursion servers of the next layer are entered for query; if the detection result is unsafe, returning the intermediate data to the stub client, and consulting how the user handles the unsafe intermediate data, such as terminating the recursive retrieval or entering a next-layer recursive server for query;
step S3, if the detection results of all returned results are safe, then the recursive query of all layers of recursive servers can be completed to obtain the target data required by the user, and the target data is fed back to the stub client through the domain name service platform to be provided for the user;
step S4, if all the returned results are safe, adding the recursive service node into the network to become an accounting node, encrypting all the returned results, the safe results of the returned results, the obtained target data and the process information of the recursive retrieval, generating blocks from the encrypted data, and linking the blocks into a block chain after authentication according to a consensus mechanism; all returned results and target data are stored on a domain name service platform so as to be convenient for a subsequent user to inquire;
in step S5, the user may also interact with the blockchain through the stub client via the domain name service platform to perform data query and write operations.
FIG. 6 is a schematic diagram of a data processing apparatus of the present invention. As shown in fig. 6, an embodiment of the present invention also provides a computer-readable storage medium and a data processing apparatus. The data processing device is a node of a block chain network and is respectively connected with a stub client, a domain name server and a recursion server network, or is used as the stub client and/or the domain name server and is connected with the recursion server network. It will be understood by those skilled in the art that all or part of the steps of the above method may be implemented by instructing relevant hardware (e.g., processor, FPGA, ASIC, etc.) through a program, and the program may be stored in a readable storage medium, such as a read-only memory, a magnetic or optical disk, etc. All or some of the steps of the above embodiments may also be implemented using one or more integrated circuits. Accordingly, the modules in the above embodiments may be implemented in hardware, for example, by an integrated circuit, or in software, for example, by a processor executing programs/instructions stored in a memory. Embodiments of the invention are not limited to any specific form of hardware or software combination.
The invention provides a fusion monitoring method of recursive block chain stored data based on domain name safety, which can bring the following beneficial effects:
firstly, the invention provides the combination of DNS data query and block chain data storage, has strong innovation, solves the problem that the queried DNS data is not well known where to be placed, has higher safety degree when stored on the block chain, and is novel;
secondly, the invention provides a DNS data recursion chaining scheme, a block chain ensures the safety of stored data through characteristics such as an intelligent contract and a consensus algorithm, the DNS data leakage is prevented, the integrity of the data can be ensured to a certain extent, the whole recursion process is added into the bookkeeping, and the completeness of the data is ensured;
thirdly, the invention provides a method for monitoring the data input into the DNS by fusing the malicious domain name monitoring algorithm, provides different choices for different users, can select a single monitoring method suitable for the data, and can also select a method for using fusion scores, increases the robustness through various algorithms, and further ensures the safety of the data;
fourthly, the user interacts with the platform through the client, and the platform can be regarded as a black box, is packaged for the user and is more friendly to the user.
The above embodiments are only for illustrating the invention and are not to be construed as limiting the invention, and those skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention, therefore, all equivalent technical solutions also fall into the scope of the invention, and the scope of the invention is defined by the claims.

Claims (10)

1. A domain name data storage method based on a block chain is characterized by comprising the following steps:
performing recursive retrieval through a DNS recursive server according to the query information of the user; after the intermediate data of the recursive retrieval are obtained, carrying out security detection on the intermediate data;
sending the target data obtained by recursive retrieval to the user;
and encrypting the target data, the intermediate data, the detection result of the intermediate data and the process information of the recursive retrieval to generate blocks and link the blocks into a block chain.
2. The method for storing domain name data according to claim 1, wherein when the intermediate data obtained by the current round of recursive retrieval is subjected to security detection, if the detection result is secure, the next round of recursive retrieval is performed, otherwise, the detection result is sent to the user, and the recursive retrieval is terminated or the next round of recursive retrieval is performed according to the instruction of the user.
3. The method of claim 2, wherein the query message is sent to the DNS recursive server via a domain name server for recursive retrieval;
and storing the intermediate data with the detection result of safety and the target data to the domain name server.
4. The method of claim 3, wherein if all the detection results are safe, the DNS recursive server is added to the blockchain network to become an accounting node.
5. A domain name data storage system based on blockchains, comprising:
the retrieval module is used for carrying out recursive retrieval through the DNS recursive server according to the query information of the user; after the intermediate data of the recursive retrieval are obtained, carrying out security detection on the intermediate data;
the interactive module is used for sending the target data obtained by the recursive retrieval to the user;
and the storage module is used for encrypting the target data, the intermediate data, the detection result of the intermediate data and the process information of the recursive retrieval to generate a block and linking the block into a block chain.
6. The domain name data storage system according to claim 5, wherein when the retrieval module performs security detection on the intermediate data obtained by the current round of recursive retrieval, if the detection result is secure, the next round of recursive retrieval is performed, otherwise, the feedback module is invoked to send the detection result to the user, and the recursive retrieval is terminated or the next round of recursive retrieval is performed according to the instruction of the user.
7. The domain name data storage system of claim 6 wherein the interactive module sends the query information to the DNS recursive server via a domain name server;
the storage module is also used for storing the intermediate data with the detection result of safety and the target data to the domain name server.
8. The domain name data storage system of claim 7 wherein if all of said tests are secure, said DNS recursive server is added to the blockchain network as an accounting node.
9. A computer-readable storage medium storing computer-executable instructions for performing the blockchain-based domain name data storage method according to any one of claims 1 to 4.
10. A data processing apparatus comprising the computer-readable storage medium of claim 9, the processor of the data processing apparatus retrieving and executing computer-executable instructions in the computer-readable storage medium for domain name data storage based on blockchains.
CN202010992834.0A 2020-09-21 2020-09-21 Domain name data storage method and system based on block chain Pending CN112182601A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010992834.0A CN112182601A (en) 2020-09-21 2020-09-21 Domain name data storage method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010992834.0A CN112182601A (en) 2020-09-21 2020-09-21 Domain name data storage method and system based on block chain

Publications (1)

Publication Number Publication Date
CN112182601A true CN112182601A (en) 2021-01-05

Family

ID=73956602

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010992834.0A Pending CN112182601A (en) 2020-09-21 2020-09-21 Domain name data storage method and system based on block chain

Country Status (1)

Country Link
CN (1) CN112182601A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113220503A (en) * 2021-05-19 2021-08-06 中国银行股份有限公司 Processing method and system of co-constructed code backup library based on block chain

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357175A (en) * 2015-09-25 2016-02-24 互联网域名系统北京市工程研究中心有限公司 Query method and device for domain name security of source address
CN106961422A (en) * 2017-02-24 2017-07-18 中国人民解放军信息工程大学 The mimicry safety method and device of a kind of DNS recursion servers
CN107613041A (en) * 2017-09-22 2018-01-19 中国互联网络信息中心 DNS management system, domain name management method and domain name analytic method based on block chain
CN108366137A (en) * 2018-05-28 2018-08-03 北京奇虎科技有限公司 The method and root DNS that domain name is handled based on block chain
CN109981814A (en) * 2019-03-19 2019-07-05 全链通有限公司 Domain name information inquiry method and system based on block chain network service node
CN110266684A (en) * 2019-06-19 2019-09-20 北京天融信网络安全技术有限公司 A kind of domain name system security means of defence and device
CN110445850A (en) * 2019-07-24 2019-11-12 深圳壹账通智能科技有限公司 Block chain node access method and device, storage medium, electronic equipment
CN111294415A (en) * 2018-12-10 2020-06-16 北京京东金融科技控股有限公司 Domain name resolution method and device
CN111355817A (en) * 2018-12-20 2020-06-30 中国移动通信集团辽宁有限公司 Domain name resolution method, device, security server and medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357175A (en) * 2015-09-25 2016-02-24 互联网域名系统北京市工程研究中心有限公司 Query method and device for domain name security of source address
CN106961422A (en) * 2017-02-24 2017-07-18 中国人民解放军信息工程大学 The mimicry safety method and device of a kind of DNS recursion servers
CN107613041A (en) * 2017-09-22 2018-01-19 中国互联网络信息中心 DNS management system, domain name management method and domain name analytic method based on block chain
CN108366137A (en) * 2018-05-28 2018-08-03 北京奇虎科技有限公司 The method and root DNS that domain name is handled based on block chain
CN111294415A (en) * 2018-12-10 2020-06-16 北京京东金融科技控股有限公司 Domain name resolution method and device
CN111355817A (en) * 2018-12-20 2020-06-30 中国移动通信集团辽宁有限公司 Domain name resolution method, device, security server and medium
CN109981814A (en) * 2019-03-19 2019-07-05 全链通有限公司 Domain name information inquiry method and system based on block chain network service node
CN110266684A (en) * 2019-06-19 2019-09-20 北京天融信网络安全技术有限公司 A kind of domain name system security means of defence and device
CN110445850A (en) * 2019-07-24 2019-11-12 深圳壹账通智能科技有限公司 Block chain node access method and device, storage medium, electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113220503A (en) * 2021-05-19 2021-08-06 中国银行股份有限公司 Processing method and system of co-constructed code backup library based on block chain
CN113220503B (en) * 2021-05-19 2024-04-16 中国银行股份有限公司 Processing method and system of co-built code backup library based on block chain

Similar Documents

Publication Publication Date Title
CN111373704B (en) Method, system and storage medium for supporting multimode identification network addressing progressive-entry IP
CN111368230B (en) Processing method and device for industrial Internet identification based on blockchain
CN103098070B (en) For the methods, devices and systems of Data Position in monitoring network service
CN112260990B (en) Method and device for safely accessing intranet application
JP2022507784A (en) Systems and methods for efficient and secure processing, access, and transmission of data over blockchain networks
Kaminsky et al. Decentralized user authentication in a global file system
JP2012235462A (en) Dnssec inline signing
JP4806462B2 (en) Peer-to-peer gateway
CN102307210A (en) Data downloading system and data management and downloading method thereof
CN105493435A (en) Virtual service provider zones
JP2011520177A (en) Storage and retrieval of data file transfers
JP7320866B2 (en) Method, apparatus and computer program for collecting data from multiple domains
US11416291B1 (en) Database server management for proxy scraping jobs
US11095705B2 (en) Content distributed over secure channels
CN113094334B (en) Digital service method, device, equipment and storage medium based on distributed storage
WO2022057002A1 (en) Abnormal request processing method and device
Li et al. Bringing decentralized search to decentralized services
Kryukov et al. Decentralized data storages: Technologies of construction
Wang et al. Blockzone: A blockchain-based dns storage and retrieval scheme
WO2022057525A1 (en) Method and device for data retrieval, electronic device, and storage medium
CN112182601A (en) Domain name data storage method and system based on block chain
CN114793244B (en) Resource processing method, device, equipment and medium for block chain
Ali et al. Blockstack technical whitepaper
EP4227828A1 (en) Web scraping through use of proxies, and applications thereof
CN111506661A (en) Content access management method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination