CN113992532A - Method and system for testing block chain bottom system - Google Patents

Method and system for testing block chain bottom system Download PDF

Info

Publication number
CN113992532A
CN113992532A CN202111607715.XA CN202111607715A CN113992532A CN 113992532 A CN113992532 A CN 113992532A CN 202111607715 A CN202111607715 A CN 202111607715A CN 113992532 A CN113992532 A CN 113992532A
Authority
CN
China
Prior art keywords
data
verification
acquisition request
data acquisition
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111607715.XA
Other languages
Chinese (zh)
Other versions
CN113992532B (en
Inventor
司苗珍
马遥
阮江科
林烨铭
周镇峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Minxing Digital Technology Co.,Ltd.
Original Assignee
Guangzhou Minhang Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Minhang Blockchain Technology Co ltd filed Critical Guangzhou Minhang Blockchain Technology Co ltd
Priority to CN202111607715.XA priority Critical patent/CN113992532B/en
Publication of CN113992532A publication Critical patent/CN113992532A/en
Application granted granted Critical
Publication of CN113992532B publication Critical patent/CN113992532B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a testing method and a testing system of a block chain bottom layer system, wherein the testing system of the block chain bottom layer system comprises the following steps: the system comprises a block chain bottom layer system, a test center and a client; wherein, the client: the data acquisition device is used for sending a data acquisition request to the test center and receiving interactive data; block chain bottom system: the data to be tested is interacted with the test center; the test center: for performing the steps of: receiving and verifying a data acquisition request and generating a verification result, wherein the data acquisition request comprises: the client ID and the request content, and the verification result comprises: verification passes and verification fails; performing data interaction operation according to the verification result to obtain to-be-tested data; testing the data to be tested, obtaining interactive data and sending the interactive data, wherein the interactive data comprises: test data and test results. The method and the device have the effects of testing integrity and authenticity of data interacted through the block chain bottom layer system and guaranteeing data interaction safety.

Description

Method and system for testing block chain bottom system
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and a system for testing a block chain underlying system.
Background
The block chain technology is an innovative technical framework emerging with bitcoin, and is essentially a public, transparent, non-falsifiable and traceable distributed book technology. A conventional blockchain underlying system is composed of a data layer, a network layer, a consensus layer, an incentive layer, a contract layer and an application layer, and can provide decentralized fully distributed domain name system services, i.e., point-to-point data transmission services between nodes in a network. However, it is still an urgent problem to detect whether data are interacted by using the blockchain technique, and how to detect the integrity and authenticity of the data interacted by the blockchain technique.
Disclosure of Invention
The application aims to provide a testing method and a testing system for a block chain bottom layer system, which have the effects of testing integrity and authenticity of data interacted through the block chain bottom layer system and guaranteeing data interaction safety.
To achieve the above object, the present application provides a testing system for a blockchain underlying system, comprising: the system comprises a block chain bottom layer system, a test center and a client; wherein, the client: the data acquisition device is used for sending a data acquisition request to the test center and receiving interactive data; block chain bottom system: the data to be tested is interacted with the test center; the test center: for performing the steps of: receiving and verifying a data acquisition request and generating a verification result, wherein the data acquisition request comprises: the client ID and the request content, and the verification result comprises: verification passes and verification fails; performing data interaction operation according to the verification result to obtain to-be-tested data; testing the data to be tested, obtaining interactive data and sending the interactive data, wherein the interactive data comprises: test data and test results.
As above, wherein the test center comprises: the device comprises a receiving unit, a verification unit, an interaction unit and a test unit; wherein the receiving unit: the verification unit is used for receiving the data acquisition request and sending the data acquisition request to the verification unit; a verification unit: the system is used for verifying the data acquisition request to generate a verification result; an interaction unit: the data interaction operation is executed according to the verification result, and the data to be tested is obtained; a test unit: and the data processing module is used for testing the data to be tested, obtaining the interactive data and sending the interactive data.
The application also provides a testing method of the block chain bottom layer system, which comprises the following steps: receiving and verifying a data acquisition request and generating a verification result, wherein the data acquisition request comprises: the client ID and the request content, and the verification result comprises: verification passes and verification fails; performing data interaction operation according to the verification result to obtain to-be-tested data; testing the data to be tested, obtaining interactive data and sending the interactive data, wherein the interactive data comprises: test data and test results.
As above, the sub-steps of receiving and verifying the data acquisition request and generating the verification result are as follows: receiving a data acquisition request; acquiring equipment operation information of the client according to the ID of the client; and performing security verification on the data acquisition request according to the equipment operation information to generate a verification result.
As above, the sub-step of performing security verification on the data acquisition request according to the device operation information and generating a verification result is as follows: acquiring the safety factor of the client according to the equipment operation information; analyzing the safety coefficient of the client by using a preset safety coefficient threshold, and if the safety coefficient of the client is greater than the safety coefficient threshold, generating a verification result that the verification is passed; and if the safety factor of the client is smaller than or equal to the safety factor threshold, the generated verification result is verification failure.
As above, the expression of the security factor of the client is as follows:
Figure 574154DEST_PATH_IMAGE001
(ii) a Wherein the content of the first and second substances,
Figure 715065DEST_PATH_IMAGE002
a safety factor for the client;
Figure 698064DEST_PATH_IMAGE003
and
Figure 296536DEST_PATH_IMAGE004
is a proportionality coefficient, and
Figure 579750DEST_PATH_IMAGE005
Figure 605474DEST_PATH_IMAGE006
Figure 544612DEST_PATH_IMAGE007
Figure 477932DEST_PATH_IMAGE008
the total number of attack types suffered by the client;
Figure 615653DEST_PATH_IMAGE009
is as follows
Figure 343437DEST_PATH_IMAGE010
The frequency of attacks of a particular attack type,
Figure 566608DEST_PATH_IMAGE011
as above, the sub-step of obtaining the data to be tested according to the data interaction operation executed according to the verification result is as follows: reading a verification result, and if the verification result is that the verification is passed, determining a consensus algorithm according to the data acquisition request; if the verification result is verification failure, ending; sending a consensus algorithm, and receiving a consensus result generated by all nodes in the same block chain performing the consensus operation on the data acquisition request together according to the determined consensus algorithm, wherein the consensus result comprises: failure and success; and sending a data acquisition request, and receiving to-be-tested data obtained by performing data interaction operation according to the consensus result and the data acquisition request.
The method is as above, wherein the data to be tested has the check mark.
As above, wherein the check identification is a timestamp.
As above, the sub-steps of testing the data to be tested, obtaining the interactive data and sending the interactive data are as follows: acquiring a block chain check value according to the request content in the data acquisition request; analyzing the check value of the block chain according to a preset check threshold value to generate an analysis result; testing the check mark of the data to be tested according to the analysis result to obtain test data and generate a test result; and taking the test result and the test data as interactive data and sending the interactive data.
The method and the device have the effects of testing integrity and authenticity of data interacted through the block chain bottom layer system and guaranteeing data interaction safety.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a block diagram of an embodiment of a test system for a blockchain underlying system;
FIG. 2 is a flowchart of an embodiment of a method for testing a blockchain underlying system.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present application provides a testing system for a block chain underlying system, comprising: a blockchain underlying system 110, a test center 120, and a client 130.
Wherein, the client 130: the data acquisition device is used for sending a data acquisition request to the test center and receiving interactive data.
Blockchain underlying system 110: used for interacting the data to be tested with the testing center.
The test center 120: for performing the steps of:
receiving and verifying a data acquisition request and generating a verification result, wherein the data acquisition request comprises: the client ID and the request content, and the verification result comprises: verification passes and verification fails;
performing data interaction operation according to the verification result to obtain to-be-tested data;
testing the data to be tested, obtaining interactive data and sending the interactive data, wherein the interactive data comprises: test data and test results.
Further, the test center 120 includes: the device comprises a receiving unit, a verification unit, an interaction unit and a test unit.
Wherein the receiving unit: the authentication unit is used for receiving the data acquisition request and sending the data acquisition request to the authentication unit.
A verification unit: and the verification module is used for verifying the data acquisition request and generating a verification result.
An interaction unit: and the data interaction module is used for executing data interaction operation according to the verification result and acquiring the data to be tested.
A test unit: and the data processing module is used for testing the data to be tested, obtaining the interactive data and sending the interactive data.
Furthermore, the block chain bottom layer system is provided with a check identification service layer; the checking identification service layer is used for providing checking identification which can be tested and verified for the data to be tested interacted through the consensus algorithm.
For one embodiment, the blockchain underlying system 110 has a timestamp service layer; the time stamp service layer is used for providing time stamps which can be tested and verified for the data to be tested which are interacted through the consensus algorithm.
As shown in fig. 2, the present application provides a testing method of a blockchain underlying system, including the following steps:
s210: receiving and verifying a data acquisition request and generating a verification result, wherein the data acquisition request comprises: the client ID and the request content, and the verification result comprises: verification passed and verification failed.
Further, the sub-steps of receiving and verifying the data acquisition request and generating the verification result are as follows:
s2101: receiving a data acquisition request, wherein the data acquisition request comprises: client ID and request content.
Specifically, the client sends a data acquisition request to the test center, and the test center sends the data acquisition request to the verification unit for verification after receiving the data acquisition request sent by the client through the receiving unit.
Wherein, the data acquisition request includes: client ID and request content.
Wherein the request content at least comprises: data content, application ID, and blockchain type.
Wherein the blockchain type includes: public, private, and federation chains, and the like.
S2102: and acquiring the equipment operation information of the client according to the ID of the client.
Specifically, the verification unit obtains device operation information of the client according to the client ID, where the device operation information includes: the total number of attack types the client is exposed to and the attack frequency of each attack type. The attack types include: distributed denial of service attacks, back door link attacks, web page tampering attacks, and the like.
S2103: and performing security verification on the data acquisition request according to the equipment operation information to generate a verification result, wherein the verification result comprises verification passing and verification failure.
Further, the security verification is performed on the data acquisition request according to the device operation information, and the sub-step of generating the verification result is as follows:
s21031: and obtaining the safety factor of the client according to the equipment operation information.
Further, the expression of the safety factor of the client is as follows:
Figure 38041DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 295847DEST_PATH_IMAGE012
a safety factor for the client;
Figure 194533DEST_PATH_IMAGE013
and
Figure 170579DEST_PATH_IMAGE014
is a proportionality coefficient, and
Figure 445703DEST_PATH_IMAGE015
Figure 823594DEST_PATH_IMAGE016
Figure 893181DEST_PATH_IMAGE017
Figure 356524DEST_PATH_IMAGE018
the total number of attack types suffered by the client;
Figure 166829DEST_PATH_IMAGE009
is as follows
Figure 399228DEST_PATH_IMAGE019
The frequency of attacks of a particular attack type,
Figure 905295DEST_PATH_IMAGE020
s21032: using preset safety factor thresholds
Figure 590355DEST_PATH_IMAGE021
Analyzing the safety coefficient of the client, if so
Figure 207281DEST_PATH_IMAGE022
If the verification result is the verification pass, the generated verification result is the verification pass; if it is
Figure 294185DEST_PATH_IMAGE023
Then, thenThe generated verification result is verification failure.
In particular, a preset safety factor threshold value is utilized
Figure 971154DEST_PATH_IMAGE024
Analyzing the safety coefficient of the client, if so
Figure 143510DEST_PATH_IMAGE025
If the data acquisition request is safe, the generated verification result is that the data acquisition request passes the verification; if it is
Figure 298548DEST_PATH_IMAGE026
If the data acquisition request sent by the user is unsafe, the verification result is a verification failure.
Further, when the generated verification result is verification pass, the verification result also includes a safety factor.
S220: and performing data interaction operation according to the verification result to obtain the data to be tested.
Further, according to the verification result, performing data interaction operation, and acquiring the data to be tested, the sub-step is as follows:
s2201: reading a verification result, and if the verification result is that the verification is passed, determining a consensus algorithm according to the data acquisition request; and if the verification result is verification failure, ending the operation.
Further, the sub-step of determining the consensus algorithm according to the data acquisition request is as follows:
s22011: and determining the interaction level according to the request content in the data acquisition request and the safety factor in the verification result.
Specifically, the interaction unit determines the interaction level according to the data content, the application ID, the block chain type, and the security factor. The interaction level represents the level of overall security of the interactive content and the interactive network environment.
S22012: and determining a consensus algorithm according to the interaction level.
Specifically, a plurality of interaction levels and a plurality of consensus algorithms are preset in the interaction unit, and the plurality of interaction levels and the plurality of consensus algorithms are in a one-to-one correspondence relationship. And after the interaction unit determines the interaction level, determining the consensus algorithm to be called according to the corresponding relation between the interaction level and the consensus algorithm.
S2202: sending a consensus algorithm, and receiving a consensus result generated by all nodes in the same block chain performing the consensus operation on the data acquisition request together according to the determined consensus algorithm, wherein the consensus result comprises: failure and success.
Specifically, the interaction unit sends the consensus algorithm to the block chain bottom system, and the block chain bottom system performs consensus operation on all nodes in the same block chain according to the consensus algorithm, that is, all nodes in the same block chain perform consensus operation on the data acquisition request together according to the determined consensus algorithm, and if the consensus is not achieved, the generated consensus result is failure; if the agreement is achieved, the output agreement result is successful, and after the agreement result is generated, S2203 is executed.
S2203: and sending a data acquisition request, and receiving to-be-tested data obtained by performing data interaction operation according to the consensus result and the data acquisition request.
Specifically, if the consensus received by the test center fails, the consensus operation needs to be performed again until the consensus is achieved. And if the consensus result received by the test center is successful, sending a data acquisition request to the block chain bottom layer system, executing data interaction operation by the block chain bottom layer system according to the data acquisition request to acquire to-be-tested data, and sending the to-be-tested data to the test center.
Further, the data to be tested has a check mark.
Specifically, as one embodiment, the check identifier is a timestamp.
S230: testing the data to be tested, obtaining interactive data and sending the interactive data, wherein the interactive data comprises: test data and test results.
Further, the sub-steps of testing the data to be tested, obtaining the interactive data and sending the interactive data are as follows:
s2301: and acquiring the check value of the block chain according to the request content in the data acquisition request.
Further, the expression of the check value of the block chain is as follows:
Figure 505538DEST_PATH_IMAGE027
wherein the content of the first and second substances,
Figure 353408DEST_PATH_IMAGE028
checking the value for the block chain;
Figure 13060DEST_PATH_IMAGE029
is a block chain type parameter;
Figure 971788DEST_PATH_IMAGE030
is the first in a block chain
Figure 767706DEST_PATH_IMAGE031
Block security of individual blocks;
Figure 786478DEST_PATH_IMAGE032
the construction time of the preset construction block is used;
Figure 933425DEST_PATH_IMAGE033
is the first in a block chain
Figure 695845DEST_PATH_IMAGE034
The actual build time of a block is,
Figure 611848DEST_PATH_IMAGE035
Figure 535942DEST_PATH_IMAGE036
is the total number of blocks in the block chain.
S2302: and analyzing the check value of the block chain according to a preset check threshold value to generate an analysis result.
Specifically, the test unit analyzes the check value of the block chain according to a preset check threshold value, and generates an analysis result. If the check value of the block chain is greater than or equal to the check threshold value, the current block chain construction difficulty is high, the check identifier is not easy to attack, and the generated analysis result is that the check value is safe; if the check value of the block chain is smaller than the check threshold value, the current block chain is not difficult to construct, the check identifier is vulnerable, and the generated analysis result is the check value danger.
S2303: testing the check mark of the data to be tested according to the analysis result to obtain test data and generate a test result; and taking the test result and the test data as interactive data and sending the interactive data.
Specifically, when the analysis result is that the check value is dangerous, the process is ended. And if the analysis result is that the check value is safe, testing the check identifier of the data to be tested according to the analysis result, if the test is successful, taking the data to be tested as the test data, generating a test result which is real, and sending the test result and the test data as interactive data to the client. And if the test fails, taking the data to be tested as test data, generating a false test result, and sending the test result and the test data as interactive data to the client.
As an embodiment, when the check identifier is a timestamp, the timestamp is tested according to the generation manner of the timestamp. For example: if the time stamp is generated in a link token mode, the accuracy of accessing the block information which can contain the time stamp information is tested, and the authenticity of the time stamp is determined.
The method and the device have the effects of testing integrity and authenticity of data interacted through the block chain bottom layer system and guaranteeing data interaction safety.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, the scope of protection of the present application is intended to be interpreted to include the preferred embodiments and all variations and modifications that fall within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A system for testing a blockchain underlying system, comprising: the system comprises a block chain bottom layer system, a test center and a client;
wherein, the client: the data acquisition device is used for sending a data acquisition request to the test center and receiving interactive data;
block chain bottom system: the data to be tested is interacted with the test center;
the test center: for performing the steps of:
receiving and verifying a data acquisition request and generating a verification result, wherein the data acquisition request comprises: the client ID and the request content, and the verification result comprises: verification passes and verification fails;
performing data interaction operation according to the verification result to obtain to-be-tested data;
testing the data to be tested, obtaining interactive data and sending the interactive data, wherein the interactive data comprises: test data and test results.
2. The system for testing a blockchain underlay system as recited in claim 1, wherein the test center comprises: the device comprises a receiving unit, a verification unit, an interaction unit and a test unit;
wherein the receiving unit: the verification unit is used for receiving the data acquisition request and sending the data acquisition request to the verification unit;
a verification unit: the system is used for verifying the data acquisition request to generate a verification result;
an interaction unit: the data interaction operation is executed according to the verification result, and the data to be tested is obtained;
a test unit: and the data processing module is used for testing the data to be tested, obtaining the interactive data and sending the interactive data.
3. A method for testing a block chain underlying system, comprising the steps of:
receiving and verifying a data acquisition request and generating a verification result, wherein the data acquisition request comprises: the client ID and the request content, and the verification result comprises: verification passes and verification fails;
performing data interaction operation according to the verification result to obtain to-be-tested data;
testing the data to be tested, obtaining interactive data and sending the interactive data, wherein the interactive data comprises: test data and test results.
4. The method for testing a blockchain underlying system according to claim 3, wherein the sub-steps of receiving and verifying the data acquisition request and generating the verification result are as follows:
receiving a data acquisition request;
acquiring equipment operation information of the client according to the ID of the client;
and performing security verification on the data acquisition request according to the equipment operation information to generate a verification result.
5. The method for testing a blockchain underlying system according to claim 4, wherein the data acquisition request is subjected to security verification according to the device operation information, and the sub-step of generating the verification result is as follows:
acquiring the safety factor of the client according to the equipment operation information;
analyzing the safety coefficient of the client by using a preset safety coefficient threshold, and if the safety coefficient of the client is greater than the safety coefficient threshold, generating a verification result that the verification is passed; and if the safety factor of the client is smaller than or equal to the safety factor threshold, the generated verification result is verification failure.
6. The method for testing a blockchain underlying system according to claim 5, wherein the safety factor of the client is expressed as follows:
Figure 280568DEST_PATH_IMAGE001
wherein the content of the first and second substances,
Figure 581099DEST_PATH_IMAGE002
a safety factor for the client;
Figure 617188DEST_PATH_IMAGE003
and
Figure 712183DEST_PATH_IMAGE004
is a proportionality coefficient, and
Figure 568144DEST_PATH_IMAGE005
Figure 937945DEST_PATH_IMAGE006
Figure 562962DEST_PATH_IMAGE007
Figure 94437DEST_PATH_IMAGE008
the total number of attack types suffered by the client;
Figure 437694DEST_PATH_IMAGE009
is as follows
Figure 345607DEST_PATH_IMAGE010
The frequency of attacks of a particular attack type,
Figure 825130DEST_PATH_IMAGE011
7. the method for testing a blockchain underlying system according to claim 3, wherein the sub-step of performing data interaction operation according to the verification result to obtain the data to be tested is as follows:
reading a verification result, and if the verification result is that the verification is passed, determining a consensus algorithm according to the data acquisition request; if the verification result is verification failure, ending;
sending a consensus algorithm, and receiving a consensus result generated by all nodes in the same block chain performing the consensus operation on the data acquisition request together according to the determined consensus algorithm, wherein the consensus result comprises: failure and success;
and sending a data acquisition request, and receiving to-be-tested data obtained by performing data interaction operation according to the consensus result and the data acquisition request.
8. The method of claim 7, wherein the data to be tested has a check mark.
9. The method of claim 8, wherein the verification flag is a timestamp.
10. The method for testing a blockchain underlying system according to claim 8 or 9, wherein the sub-steps of testing the data to be tested, obtaining the interactive data and sending the interactive data are as follows:
acquiring a block chain check value according to the request content in the data acquisition request;
analyzing the check value of the block chain according to a preset check threshold value to generate an analysis result;
testing the check mark of the data to be tested according to the analysis result to obtain test data and generate a test result; and taking the test result and the test data as interactive data and sending the interactive data.
CN202111607715.XA 2021-12-27 2021-12-27 Method and system for testing block chain bottom system Active CN113992532B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111607715.XA CN113992532B (en) 2021-12-27 2021-12-27 Method and system for testing block chain bottom system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111607715.XA CN113992532B (en) 2021-12-27 2021-12-27 Method and system for testing block chain bottom system

Publications (2)

Publication Number Publication Date
CN113992532A true CN113992532A (en) 2022-01-28
CN113992532B CN113992532B (en) 2022-03-25

Family

ID=79734364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111607715.XA Active CN113992532B (en) 2021-12-27 2021-12-27 Method and system for testing block chain bottom system

Country Status (1)

Country Link
CN (1) CN113992532B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101360107A (en) * 2008-09-19 2009-02-04 腾讯科技(深圳)有限公司 Method, system and apparatus enhancing security of single system login
CN101515932A (en) * 2009-03-23 2009-08-26 中兴通讯股份有限公司 Method and system for accessing Web service safely
CN102164033A (en) * 2010-02-24 2011-08-24 腾讯科技(深圳)有限公司 Method, device and system for preventing services from being attacked
US20170012978A1 (en) * 2015-05-14 2017-01-12 River Security Inc. Secure communication method and apparatus
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN109495458A (en) * 2018-10-31 2019-03-19 深圳市元征科技股份有限公司 A kind of method, system and the associated component of data transmission
CN110336815A (en) * 2019-07-04 2019-10-15 深圳前海微众银行股份有限公司 Attack defense method, device, equipment and readable storage medium storing program for executing based on block chain
CN110417776A (en) * 2019-07-29 2019-11-05 大唐高鸿信安(浙江)信息科技有限公司 A kind of identity identifying method and device
CN110598446A (en) * 2019-09-16 2019-12-20 腾讯科技(深圳)有限公司 Block chain based test method and device, storage medium and computer equipment
CN111813696A (en) * 2020-08-25 2020-10-23 中国工商银行股份有限公司 Application testing method, device and system and electronic equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101360107A (en) * 2008-09-19 2009-02-04 腾讯科技(深圳)有限公司 Method, system and apparatus enhancing security of single system login
CN101515932A (en) * 2009-03-23 2009-08-26 中兴通讯股份有限公司 Method and system for accessing Web service safely
CN102164033A (en) * 2010-02-24 2011-08-24 腾讯科技(深圳)有限公司 Method, device and system for preventing services from being attacked
US20170012978A1 (en) * 2015-05-14 2017-01-12 River Security Inc. Secure communication method and apparatus
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN109495458A (en) * 2018-10-31 2019-03-19 深圳市元征科技股份有限公司 A kind of method, system and the associated component of data transmission
CN110336815A (en) * 2019-07-04 2019-10-15 深圳前海微众银行股份有限公司 Attack defense method, device, equipment and readable storage medium storing program for executing based on block chain
CN110417776A (en) * 2019-07-29 2019-11-05 大唐高鸿信安(浙江)信息科技有限公司 A kind of identity identifying method and device
CN110598446A (en) * 2019-09-16 2019-12-20 腾讯科技(深圳)有限公司 Block chain based test method and device, storage medium and computer equipment
CN111813696A (en) * 2020-08-25 2020-10-23 中国工商银行股份有限公司 Application testing method, device and system and electronic equipment

Also Published As

Publication number Publication date
CN113992532B (en) 2022-03-25

Similar Documents

Publication Publication Date Title
KR101421329B1 (en) A method for authenticating a trusted platform based on the tri-element peer authentication(tepa)
CN101834860B (en) Method for remote dynamic verification on integrality of client software
CN104993937A (en) Method for testing integrity of cloud storage data
KR20070058581A (en) Two-way error correction for physical tokens
CN108470003A (en) Fuzz testing methods, devices and systems
CN111488134B (en) Public random number generation method and device based on block chain
CN115021942B (en) Tamper-resistant network data secure transmission method
CN110740140A (en) network information security supervision system based on cloud platform
CN114553444B (en) Identity authentication method, identity authentication device and storage medium
CN113630421A (en) Method for preventing data migration of web system based on asymmetric encryption algorithm
CN113992532B (en) Method and system for testing block chain bottom system
CN116226939B (en) Detection laboratory data tamper-proof method and system based on Internet of things and blockchain
CN106888094A (en) A kind of endorsement method and server
CN109981288A (en) A kind of quick external method of proof of the fine granularity cloud server terminal based on aggregate signature
CN114546857A (en) Interface test case generation method and device, electronic equipment and storage medium
CN114372092A (en) Case collaborative search processing method, system, device and electronic equipment
CN113326527A (en) Credible digital signature system and method based on block chain
CN113360575A (en) Method, device, equipment and storage medium for supervising transaction data in alliance chain
Mohanty et al. Security vulnerabilities in applying decentralized ledger systems for obfuscating hardwares
CN113542251B (en) Data reporting method and device
CN113221185B (en) Electronic signature method, system, equipment and storage medium based on data packet processing
CN112580109B (en) Software business process legality design method by using block chain signature technology
CN112738106B (en) Block chain anonymous user auditing system
Fu et al. An Improved Biometric Fuzzy Signature with Timestamp of Blockchain Technology for Electrical Equipment Maintenance
QUAN et al. SADT: Syntax-aware differential testing of certificate validation in SSL/TLS Implementations.(2020)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 510700 rooms 605 and 606, No. 118, banhe Road, Huangpu District, Guangzhou, Guangdong

Patentee after: Guangzhou Minxing Digital Technology Co.,Ltd.

Address before: 510700 rooms 605 and 606, No. 118, banhe Road, Huangpu District, Guangzhou, Guangdong

Patentee before: Guangzhou Minhang blockchain Technology Co.,Ltd.