CN117081861B - Intelligent contract data management system based on block chain - Google Patents

Intelligent contract data management system based on block chain Download PDF

Info

Publication number
CN117081861B
CN117081861B CN202311330283.1A CN202311330283A CN117081861B CN 117081861 B CN117081861 B CN 117081861B CN 202311330283 A CN202311330283 A CN 202311330283A CN 117081861 B CN117081861 B CN 117081861B
Authority
CN
China
Prior art keywords
node
suspicious
nodes
current
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311330283.1A
Other languages
Chinese (zh)
Other versions
CN117081861A (en
Inventor
黄晓燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yada Communication Network Co ltd
Original Assignee
Beijing Yada Communication Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yada Communication Network Co ltd filed Critical Beijing Yada Communication Network Co ltd
Priority to CN202311330283.1A priority Critical patent/CN117081861B/en
Publication of CN117081861A publication Critical patent/CN117081861A/en
Application granted granted Critical
Publication of CN117081861B publication Critical patent/CN117081861B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/30Decision processes by autonomous network management units using voting and bidding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the field of electric data processing, in particular to an intelligent contract data management system based on a block chain, which comprises the following components: the method comprises the steps of acquiring information of all nodes in a blockchain, when the nodes receive data sent by active nodes, identifying the active nodes, acquiring a first set and a second set of current nodes, acquiring average transmission distances of the nodes corresponding to the current nodes according to the second set of the current nodes, further acquiring the forwarding necessity of the current nodes for a suspicious node notification data packet, forwarding the suspicious node notification data packet according to the forwarding necessity, voting the suspicious nodes by each node to acquire the abnormal nodes, and eliminating contracts from the abnormal nodes. The invention can identify abnormal nodes in the block chain timely and accurately, and is helpful for maintaining the network environment in the block chain.

Description

Intelligent contract data management system based on block chain
Technical Field
The invention relates to the field of electric data processing, in particular to an intelligent contract data management system based on a blockchain.
Background
In the fields of computer science and blockchain, contracts generally refer to a protocol, specification, or contract that is fulfilled by parties under specific conditions to achieve a particular operational or interchange value. Contract data is the data content involved in this contract.
Contract data is particularly important in blockchain technology because it is stored on a non-tamperable blockchain and can be shared and verified between parties. The contract data has important influence on the execution and result of intelligent contracts, and through the management and processing of the contract data, automatic and trusted transaction and business logic can be realized.
For a user, whether other user accesses on the blockchain are abnormal needs to be verified, and characteristics of the user accesses are analyzed, so that an attacker is prevented from attacking the blockchain through an access point. If user access exists in the current blockchain, the user may transmit false information to cause other users to be deceptively deceived, so that communication between nodes fails, and finally, the blockchain cannot write in fair contract data, and performance on the blockchain is affected.
Disclosure of Invention
To solve the above problems, the present invention provides a blockchain-based intelligent contract data management system, the system including:
the node information acquisition module acquires information of all nodes in the block chain;
the suspicious node identification module is used for carrying out suspicious node identification on the active node when the node receives the data sent by the active node;
the suspicious node notifying module takes any node as a current node, and if the current node identifies the suspicious node but does not receive suspicious node notification data packets sent by other nodes, the current node sends suspicious node notification data packets to the node connected with the current node; if the current node receives suspicious node notification data packets sent by other nodes, but abnormal data sent by the suspicious node is not received yet, acquiring a first set and a second set of the current node according to the node sending the suspicious node notification data packets to the current node; acquiring the average transmission distance of the node corresponding to the current node according to the second set of the current node; calculating the forwarding necessity of the current node for the suspicious node notification data packet according to the first set, the second set and the average transmission distance of the node corresponding to the current node; forwarding the suspicious node notification data packet according to the forwarding necessity;
the abnormal node voting module is used for voting the suspicious nodes by each node to obtain abnormal nodes, and excluding the abnormal nodes from contract signing;
and the abnormal node treatment module is used for treating the abnormal node.
Preferably, the step of identifying the suspicious node for the active node includes the steps of:
and scanning the data sent by the active node by using a static analysis tool, checking whether the data sent by the active node has a known vulnerability or unsafe code mode, and taking the active node as a suspicious node when the data sent by the active node has the known vulnerability or unsafe code mode.
Preferably, the current node sends a suspicious node notification data packet to a node connected with the current node, which includes the steps of:
the current node prepares suspicious information of the suspicious node into a suspicious node notification data packet, and sends the suspicious node notification data packet to a node connected with the current node.
Preferably, the method for acquiring the first set includes:
the current node is recorded asWill be->The node sending the suspicious node notification packet is marked +.>To->Is used as the center of a circle and is>To->The distance between the two nodes is the radius, a circular area is constructed, and the nodes contained in the constructed circular area form a set which is recorded as a first set.
Preferably, the second set obtaining method includes:
the current node is recorded asWill be->The node sending the suspicious node notification packet is marked +.>To->Is used as the center of a circle and is>To->The distance between the two is the radius, a circular area is constructed, and the +.>The remaining nodes form a set, denoted as a second set.
Preferably, the step of obtaining the average transmission distance of the node corresponding to the current node according to the second set of the current node includes the following steps:
and taking the average value of the distances between every two nodes contained in the second set as the average transmission distance of the nodes corresponding to the current node.
Preferably, the step of calculating the forwarding necessity of the current node for the suspicious node notification packet according to the first set, the second set and the average transmission distance of the node corresponding to the current node includes the following steps:
wherein the method comprises the steps ofNotifying the forwarding necessity of the data packet for the suspicious node to the current node; />Is the current node; />To->Nodes for sending suspicious node notification data packets; />Is a first set; />Is a second set; />Is an intersection symbol; />For the current node->Average transmission distance of corresponding nodes; />Is a counting function.
Preferably, the forwarding of the suspicious node notification packet according to the forwarding necessity includes the steps of:
if the forwarding necessity of the current node for the suspicious node notification data packet is greater than or equal to a preset forwarding threshold, the current node forwards the suspicious node notification data packet to each node connected with the current node.
Preferably, each node votes on the suspicious node to obtain the abnormal node, and the method comprises the following steps:
if the current node identifies the suspicious node, the current node performs one abnormal node voting on the suspicious node; if the current node receives suspicious node notification data packets sent by other nodes, counting the proportion of the number of the suspicious node notification data packets received by the current node to the number of nodes connected with the current node, and taking the proportion as notification proportion, when the notification proportion is larger than or equal to a preset proportion threshold value, carrying out abnormal node voting on the suspicious node once by the current node, and when the notification proportion is smaller than the preset proportion threshold value, considering that the suspicious node is not an abnormal node by the current node, and carrying out abnormal node voting on the suspicious node by the current node;
and taking the ratio of the accumulated voting number of the suspicious nodes to the total number of the currently contracted nodes minus 1 as the voting proportion of the suspicious nodes, and taking the suspicious nodes as abnormal nodes when the voting proportion of the suspicious nodes is larger than or equal to a preset voting threshold value.
Preferably, the step of handling the abnormal node includes:
when the block chain detects the abnormal node, the abnormal node is isolated, a fault tolerance mechanism is started, a node verification mechanism is started, and data rollback and recovery are carried out.
The invention has the following beneficial effects: at present, abnormal node identification is usually carried out by singly signing the contribution condition of nodes in the blockchain when contracts are signed, when the contracts are not signed next time, part of high-credit nodes are converted into abnormal nodes after being attacked, the abnormal nodes cannot be identified in time by using the existing method, and abnormal instruction attack is carried out on the nodes in the blockchain by the abnormal nodes before the contracts are signed next time, so that the blockchain is paralysed. When the node receives the data sent by the active node, suspicious node identification is carried out on the active node, a first set and a second set of the current node are obtained, the average transmission distance of the node corresponding to the current node is obtained according to the second set of the current node, the forwarding necessity of the current node for the suspicious node notification data packet is further obtained, the suspicious node notification data packet is forwarded according to the forwarding necessity, and before the next contract is signed, the suspicious node is prevented from attacking the nodes in the blockchain, and the safety of the blockchain is ensured. According to the method and the device, the forwarding necessity of the suspicious node notification data packet is calculated, and the suspicious node notification data packet is forwarded according to the forwarding necessity, so that the problem that limited channel resources on a blockchain are blocked by excessive suspicious node notification data packets due to the fact that too many nodes send the suspicious node notification data packet is prevented. According to the invention, each node is utilized to vote on the suspicious node to obtain the abnormal node, and the abnormal node is excluded from contracting, so that the abnormal node in the blockchain is timely and accurately identified, and the network environment in the blockchain is maintained.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions and advantages of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a system block diagram of a blockchain-based intelligent contract data management system provided in accordance with an embodiment of the present invention;
fig. 2 is a schematic diagram of a node distribution topology.
Detailed Description
In order to further describe the technical means and effects adopted by the present invention to achieve the preset purpose, the following detailed description refers to the specific implementation, structure, characteristics and effects of the intelligent contract data management system based on blockchain according to the present invention with reference to the accompanying drawings and the preferred embodiments. In the following description, different "one embodiment" or "another embodiment" means that the embodiments are not necessarily the same. Furthermore, the particular features, structures, or characteristics of one or more embodiments may be combined in any suitable manner.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
The following specifically describes a specific scheme of the intelligent contract data management system based on block chains provided by the invention with reference to the accompanying drawings.
Referring to FIG. 1, a block chain based intelligent contract data management system is provided according to one embodiment of the present invention, comprising the following modules:
the node information acquisition module 101 acquires all nodes in the blockchain.
It should be noted that, in order to ensure that all nodes in the network reach an agreed state, the blockchain uses a consensus mechanism. Common consensus mechanisms include Proof of Work (Proof-of-Work), proof of rights (Proof-of-status), and the like. The consensus mechanism ensures consistency and trustworthiness in transacting and updating data in the network. For contract data that nodes reach, once the contract data is written into the blockchain, it is difficult to modify or delete. Each block contains the hash value of the previous block so that any malicious modification of the old block is perceived by other nodes, thereby ensuring the integrity and non-tamper-ability of the contract data in the blockchain.
In the embodiment of the present invention, information of all nodes in the blockchain is obtained, including positions of the nodes and a node distribution topology structure, and the schematic diagram of the node distribution topology structure is shown in fig. 2. It should be noted that, each time a contract is written into the blockchain, the blockchain stores the conditions of nodes in the blockchain when the contract is signed, including the positions of the nodes, the distribution topology structure and the workload proof of the nodes when the contract is signed. The information of all nodes in the blockchain can be obtained according to the information of the last time the blockchain writes a contract.
Thus, the positions of all nodes in the blockchain and the node distribution topological structure are obtained.
The suspicious node identification module 102 identifies suspicious nodes.
In order to ensure that the contract data reached by the nodes is not affected by the abnormal nodes, when the nodes sign contracts, the nodes choose positive nodes and negative nodes through whether the contracts sign positive behaviors or not by using a practical Bayesian-to-busy fault tolerance mechanism (PBFT), and the negative nodes are the abnormal nodes. When signing contracts, all nodes on the blockchain sign contracts together, at the moment, the PBFT judges whether the nodes are abnormal nodes or not through the positive behaviors of the nodes when signing contracts and the accumulated quantity of the active participation contracts, and the abnormal nodes are counted and removed according to the credibility evaluation among the nodes, so that the environment on the blockchain is ensured.
When the nodes are contracted, part of the nodes are confirmed to be active nodes, after the contracts are contracted, part of the active nodes are possibly attacked, the knowledge of other nodes on the attacked active nodes is unchanged, the nodes are still confirmed to be trusted nodes, and if the attacked active nodes execute abnormal attack instructions, block chain paralysis is caused. In order to prevent the active node under attack from affecting the blockchain, other nodes need to perform abnormal data identification on the data sent by the active node before the next contract is signed.
It should be further noted that the active node is typically under the control of a normal user, so that data sent from the active node to other nodes in the blockchain is received earlier by nodes closer to the active node, while the node updates the active evaluation of the active node. When the active node is attacked by an attacker, the information released by the attacker is different from the user, and when other adjacent nodes receive the data sent by the active node, abnormal data identification needs to be carried out on the received data.
In the embodiment of the invention, when the node receives the data sent by the active node, the data sent by the active node is verified and checked for compliance, specifically: and scanning the data sent by the active node by using a static analysis tool, and checking whether the data sent by the active node has a known loophole or unsafe code mode. If the data sent by the active node has a known loophole or unsafe code mode, the data sent by the active node is abnormal data, the active node may be attacked and is not trusted, and the active node is taken as a suspicious node.
Thus, the identification of the suspicious node is realized.
The suspicious node notification module 103 performs broadcast notification on suspicious nodes.
It should be noted that, in order to prevent the suspicious node from displaying an attack exception to other nodes on the blockchain, the other nodes use the data sent by the suspicious node as trusted data to cause the data exception in the blockchain, when one node identifies the suspicious node, the information of the suspicious node should be broadcasted, and the suspicious node notification data packet is transmitted to all nodes on the blockchain. However, if more nodes identify suspicious nodes, the nodes sending suspicious node notification data packets are enough, and in order to avoid that limited channel resources on a blockchain are blocked by excessive suspicious node notification data packets caused by sending suspicious node notification data packets by too many nodes, an intelligent decision is needed to send suspicious node notification data packets.
In the embodiment of the invention, any node is used as a current node, and if the current node identifies a suspicious node but does not receive suspicious node notification data packets sent by other nodes, the current node prepares suspicious information of the suspicious node as suspicious node notification data packets and sends the suspicious node notification data packets to nodes connected with the current node;
if the current node receives the suspicious node notification data packet sent by other nodes but does not receive abnormal data sent by the suspicious node, the current node is marked asCurrent node +.>Receiving suspicious node notification data packets is (i.e. to the current node +.>Nodes sending suspicious node notification packets) is marked +.>With nodes +.>As the center of a circle, use node->To node->The distance between the two is radius, a circular area is constructed, the nodes contained in the constructed circular area form a set which is marked as a first set, and the first set is marked by +.>And (3) representing. With nodes->As the center of a circle, use node->To node->The distance between the two is the radius, another circular area is constructed, and the node is removed from the constructed circular area>The remaining nodes form a set, denoted as second set, with +.>And (3) representing. And taking the average value of the distances between every two nodes contained in the second set as the average transmission distance of the nodes corresponding to the current node B.
Calculating the forwarding necessity of the current node for the suspicious node notification data packet according to the first set, the second set and the average transmission distance of the node corresponding to the current node:
wherein the method comprises the steps ofNotifying the forwarding necessity of the data packet for the suspicious node to the current node; />Is the current node; />To->Nodes for sending suspicious node notification data packets; />For the first set, i.e. with node +.>With the center of circle being a nodeTo node->A set of nodes contained within a circular region having a radius at a distance therebetween; />For the second set, i.e. with node +.>The center is a node->To node->Circular region culling node with distance of radius +.>The set of remaining nodes thereafter; />Is the intersection of the first set and the second set; />For the current node->The average transmission distance of the corresponding nodes, namely the average value of the distances between every two nodes contained in the second set; />For counting function +.>Representing a second setThe number of nodes contained in->Representing the number of nodes contained in the intersection of the first set and the second set; />Representing the proportion of the number of nodes in the node distribution topological structure, which are simultaneously positioned in the range of the circular areas corresponding to the first set and the second set, to the number of nodes in the second set, wherein the smaller the proportion is, the current node is represented>The more the suspicious node notification data packet needs to be forwarded to compensate the node +.>Notification overlay for remote node, where the current node +.>The greater the forwarding necessity for the suspicious node notification packet; current node->Corresponding node average transmission distance ∈ ->The larger, meaning the current node +>The density of the mutual communication between all nodes in the local range of (1) is lower, and more nodes are required to send suspicious node notification data packets to timely notify the current node +.>Is used for avoiding the nodes responding to the abnormal instruction sent by the suspicious node, and the current node is +.>Notifying a suspicious node of forwarding necessity of a data packetThe larger.
Presetting a forwarding threshold valueIn this embodiment->By way of example, and not limitation, in other embodiments the forwarding threshold may be set by an practitioner according to actual implementation. If the forwarding necessity of the current node for the suspicious node notification data packet is greater than or equal to the forwarding threshold +.>The current node forwards the suspicious node notification packet to each node connected to the current node.
It should be noted that, if the current node receives the suspicious node notification data packet sent by the other multiple nodes and the suspicious node in the suspicious node notification data packet is the same node, the current node forwards the suspicious node notification data packet only once at most.
If the current node receives the suspicious node notification data packet sent by other nodes earlier than the abnormal data sent by the suspicious node, the abnormal data sent by the suspicious node is directly discarded without verification and compliance check.
Thus, the suspicious node broadcast notification is realized.
The abnormal node voting module 104 performs abnormal node voting on the suspicious nodes.
In the practical bayer fault tolerance mechanism (PBFT), reputation evaluation (i.e., positive evaluation) is performed between nodes when a contract is newly made. In the embodiment of the invention, voting of the abnormal nodes is performed according to abnormal data sent by the suspicious node and received by each node and suspicious node notification data packets sent by other nodes, specifically:
presetting a proportional thresholdAnd a voting threshold +.>In this embodiment->、/>By way of example, and not limitation, in other embodiments the practitioner may set the scaling threshold and voting threshold according to the actual implementation.
If the current node identifies the suspicious node, the current node considers the suspicious node as an abnormal node, and the current node performs abnormal node voting on the suspicious node once. If the current node receives suspicious node notification data packets sent by other nodes, counting the proportion of the number of suspicious node notification data packets received by the current node to the number of nodes connected with the current node, and taking the proportion as a notification proportion, wherein the notification proportion is larger than or equal to a proportion threshold valueWhen the current node considers the suspicious node as an abnormal node, the current node performs abnormal node voting once on the suspicious node, otherwise, when the notification proportion is smaller than the proportion threshold valueWhen the current node considers that the suspicious node is not an abnormal node, the current node does not vote for the suspicious node.
Taking the ratio of the accumulated voting number of the suspicious nodes to the total node number of the currently contracted contract minus 1 as the voting proportion of the suspicious nodes, when the voting proportion of the suspicious nodes is larger than or equal to the voting threshold valueWhen the contract is currently signed, the suspicious node is used as an abnormal node, the reputation evaluation of the abnormal node is set to 0, and the abnormal node is removed. And eliminating all obtained abnormal nodes from contract signing.
So far, abnormal node voting is carried out on suspicious nodes, and reputation evaluation of each node is obtained.
The abnormal node handling module 105 handles abnormal nodes.
When the blockchain network detects an abnormal node, the adoption of an appropriate security response strategy can help to protect the security and integrity of the whole network, specifically:
isolating the abnormal node: when an abnormal node is detected, the abnormal node can be isolated and disconnected from other nodes of the network, so that the abnormal node is prevented from affecting the other nodes. This may be accomplished through firewall rules or configuration of blockchain node software at the underlying network layer.
Starting a fault tolerance mechanism: the blockchain network may handle the abnormal nodes through an automatic fault tolerance mechanism. For example, when a node anomaly is detected, the system may automatically exclude it from the consensus process to ensure stability and security of the network.
Starting a node verification mechanism: the blockchain network may employ a node verification mechanism to perform identity verification and trust evaluation on the nodes participating in the network. If a node is detected as abnormal, it may be suspended from participating in the consensus process until the problem is resolved or ameliorated.
Data rollback and recovery: if the abnormal node maliciously tampers or destroys the blockchain data or the contract information, the abnormal node can be considered to roll back to the previous legal state and take corresponding recovery measures so as to ensure the consistency and the integrity of the data.
In summary, the system of the invention comprises a node information acquisition module, a suspicious node identification module, a suspicious node notification module, an abnormal node voting module and an abnormal node handling module, and the system acquires the information of all nodes in the blockchain, when the nodes receive the data sent by the active nodes, the suspicious node identification is carried out on the active nodes, a first set and a second set of the current nodes are acquired, the average transmission distance of the nodes corresponding to the current nodes is acquired according to the second set of the current nodes, the forwarding necessity of the current nodes for the suspicious node notification data packet is further acquired, the suspicious node notification data packet is forwarded according to the forwarding necessity, and before the next contract is signed, the attack of the suspicious nodes on the nodes in the blockchain is prevented, and the safety of the blockchain is ensured. According to the method and the device, the forwarding necessity of the suspicious node notification data packet is calculated, and the suspicious node notification data packet is forwarded according to the forwarding necessity, so that the problem that limited channel resources on a blockchain are blocked by excessive suspicious node notification data packets due to the fact that too many nodes send the suspicious node notification data packet is prevented. According to the invention, each node is utilized to vote on the suspicious node to obtain the abnormal node, and the abnormal node is excluded from contracting, so that the abnormal node in the blockchain is timely and accurately identified, and the network environment in the blockchain is maintained.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (5)

1. A blockchain-based intelligent contract data management system, the system comprising:
the node information acquisition module acquires information of all nodes in the block chain;
the suspicious node identification module is used for carrying out suspicious node identification on the active node when the node receives the data sent by the active node;
the suspicious node notifying module takes any node as a current node, and if the current node identifies the suspicious node but does not receive suspicious node notification data packets sent by other nodes, the current node sends suspicious node notification data packets to the node connected with the current node; if the current node receives suspicious node notification data packets sent by other nodes, but abnormal data sent by the suspicious node is not received yet, acquiring a first set and a second set of the current node according to the node sending the suspicious node notification data packets to the current node; acquiring the average transmission distance of the node corresponding to the current node according to the second set of the current node; calculating the forwarding necessity of the current node for the suspicious node notification data packet according to the first set, the second set and the average transmission distance of the node corresponding to the current node; forwarding the suspicious node notification data packet according to the forwarding necessity;
the abnormal node voting module is used for voting the suspicious nodes by each node to obtain abnormal nodes, and excluding the abnormal nodes from contract signing;
the abnormal node treatment module is used for treating the abnormal nodes;
the first set acquisition method comprises the following steps:
the current node is recorded asWill be->The node sending the suspicious node notification packet is marked +.>To->Is used as the center of a circle and is>To->The distance between the two nodes is the radius, a circular area is constructed, and the nodes contained in the constructed circular area form a set which is recorded as a first set;
the second set acquisition method comprises the following steps:
the current node is recorded asWill be->The node sending the suspicious node notification packet is marked +.>To->Is used as the center of a circle and is>To->The distance between the two is the radius, a circular area is constructed, and the +.>Forming one set by the rest nodes, and marking the set as a second set;
the step of obtaining the average transmission distance of the node corresponding to the current node according to the second set of the current node comprises the following steps:
taking the average value of the distances between every two nodes contained in the second set as the average transmission distance of the nodes corresponding to the current node;
the step of calculating the forwarding necessity of the current node for the suspicious node notification data packet according to the first set, the second set and the average transmission distance of the node corresponding to the current node, includes the following steps:
wherein the method comprises the steps ofNotifying the forwarding necessity of the data packet for the suspicious node to the current node; />Is the current node; />To->Nodes for sending suspicious node notification data packets; />Is a first set; />Is a second set; />Is an intersection symbol; />For the current node->Average transmission distance of corresponding nodes; />Is a counting function;
the forwarding of the suspicious node notification data packet according to the forwarding necessity comprises the following steps:
if the forwarding necessity of the current node for the suspicious node notification data packet is greater than or equal to a preset forwarding threshold, the current node forwards the suspicious node notification data packet to each node connected with the current node.
2. The blockchain-based intelligent contract data management system of claim 1, wherein the suspicious node identification for active nodes includes the steps of:
and scanning the data sent by the active node by using a static analysis tool, checking whether the data sent by the active node has a known vulnerability or unsafe code mode, and taking the active node as a suspicious node when the data sent by the active node has the known vulnerability or unsafe code mode.
3. The blockchain-based intelligent contract data management system of claim 1, wherein the current node transmits a suspicious node notification packet to a node connected to the current node, comprising the steps of:
the current node prepares suspicious information of the suspicious node into a suspicious node notification data packet, and sends the suspicious node notification data packet to a node connected with the current node.
4. The blockchain-based intelligent contract data management system of claim 1, wherein each node votes for suspicious nodes to obtain abnormal nodes, comprising the steps of:
if the current node identifies the suspicious node, the current node performs one abnormal node voting on the suspicious node; if the current node receives suspicious node notification data packets sent by other nodes, counting the proportion of the number of the suspicious node notification data packets received by the current node to the number of nodes connected with the current node, and taking the proportion as notification proportion, when the notification proportion is larger than or equal to a preset proportion threshold value, carrying out abnormal node voting on the suspicious node once by the current node, and when the notification proportion is smaller than the preset proportion threshold value, considering that the suspicious node is not an abnormal node by the current node, and carrying out abnormal node voting on the suspicious node by the current node;
and taking the ratio of the accumulated voting number of the suspicious nodes to the total number of the currently contracted nodes minus 1 as the voting proportion of the suspicious nodes, and taking the suspicious nodes as abnormal nodes when the voting proportion of the suspicious nodes is larger than or equal to a preset voting threshold value.
5. The blockchain-based intelligent contract data management system of claim 1, wherein the handling of the abnormal node includes the steps of:
when the block chain detects the abnormal node, the abnormal node is isolated, a fault tolerance mechanism is started, a node verification mechanism is started, and data rollback and recovery are carried out.
CN202311330283.1A 2023-10-16 2023-10-16 Intelligent contract data management system based on block chain Active CN117081861B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311330283.1A CN117081861B (en) 2023-10-16 2023-10-16 Intelligent contract data management system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311330283.1A CN117081861B (en) 2023-10-16 2023-10-16 Intelligent contract data management system based on block chain

Publications (2)

Publication Number Publication Date
CN117081861A CN117081861A (en) 2023-11-17
CN117081861B true CN117081861B (en) 2023-12-26

Family

ID=88717481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311330283.1A Active CN117081861B (en) 2023-10-16 2023-10-16 Intelligent contract data management system based on block chain

Country Status (1)

Country Link
CN (1) CN117081861B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117670329B (en) * 2024-02-01 2024-05-14 中国信息通信研究院 Trust-based transaction method and device in blockchain network

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111182510A (en) * 2020-01-09 2020-05-19 重庆邮电大学 Industrial Internet of things node consensus method based on block chain
CN111343208A (en) * 2020-05-21 2020-06-26 腾讯科技(深圳)有限公司 Block chain-based data detection method and device and computer-readable storage medium
KR20200085565A (en) * 2019-01-07 2020-07-15 에스케이텔레콤 주식회사 Apparatus and method for managing distributed ledger based on block chain
CN113596777A (en) * 2021-07-26 2021-11-02 一汽奔腾轿车有限公司 Intelligent networking automobile anonymous identity authentication system and method based on block chain
CN115801407A (en) * 2022-11-16 2023-03-14 广州蚁比特区块链科技有限公司 Abnormal node shielding method and device, storage medium and target node
WO2023037200A1 (en) * 2021-09-12 2023-03-16 Trudeau Nathan Method and system for achieving a consensus and its use thereof
KR20230088041A (en) * 2021-12-10 2023-06-19 엘지전자 주식회사 Method of detecting abnormality using blockchain and server implementing thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3477906B1 (en) * 2017-10-26 2021-03-31 Accenture Global Solutions Limited Systems and methods for identifying and mitigating outlier network activity
CN115280717B (en) * 2021-01-11 2024-06-07 微福斯有限责任公司 Blockchain auditing system and method
US11968311B2 (en) * 2021-07-16 2024-04-23 The Regents Of The University Of California Multi-shard transactions in a Byzantine computing environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200085565A (en) * 2019-01-07 2020-07-15 에스케이텔레콤 주식회사 Apparatus and method for managing distributed ledger based on block chain
CN111182510A (en) * 2020-01-09 2020-05-19 重庆邮电大学 Industrial Internet of things node consensus method based on block chain
CN111343208A (en) * 2020-05-21 2020-06-26 腾讯科技(深圳)有限公司 Block chain-based data detection method and device and computer-readable storage medium
CN113596777A (en) * 2021-07-26 2021-11-02 一汽奔腾轿车有限公司 Intelligent networking automobile anonymous identity authentication system and method based on block chain
WO2023037200A1 (en) * 2021-09-12 2023-03-16 Trudeau Nathan Method and system for achieving a consensus and its use thereof
KR20230088041A (en) * 2021-12-10 2023-06-19 엘지전자 주식회사 Method of detecting abnormality using blockchain and server implementing thereof
CN115801407A (en) * 2022-11-16 2023-03-14 广州蚁比特区块链科技有限公司 Abnormal node shielding method and device, storage medium and target node

Also Published As

Publication number Publication date
CN117081861A (en) 2023-11-17

Similar Documents

Publication Publication Date Title
CN109698819B (en) Threat disposal management method and system in network
US7464407B2 (en) Attack defending system and attack defending method
CN117081861B (en) Intelligent contract data management system based on block chain
CN110233868A (en) A kind of edge calculations data safety and method for secret protection based on Fabric
US9490986B2 (en) Authenticating a node in a communication network
CN103986743A (en) Method, apparatus and system for acquiring data in Internet of Things
CN108337219A (en) A kind of method and storage medium of Internet of Things anti-intrusion
CN114268508A (en) Internet of things equipment secure access method, device, equipment and medium
CN116684202B (en) Internet of things information security transmission method
CN102136956A (en) Monitoring method and system for detecting network communication behaviors
Rass et al. Community-based security for the internet of things
CN114024957B (en) Method for judging risk of user behavior in zero trust architecture
WO2022151741A1 (en) Contact data storage method and apparatus, device, and storage medium
CN116996238A (en) Processing method and related device for network abnormal access
CN111107035B (en) Security situation sensing and protecting method and device based on behavior identification
CN114143028A (en) Data cross-region safe transmission method and system based on electric power spot transaction service scene
CN113378205A (en) Method for data reverse transmission across security domains
CN114338107B (en) Safety control method and device
Kaskar et al. A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set
CN117040929B (en) Access processing method, device, equipment, medium and program product
CN118368108A (en) EBPF-based network access security control system
CN116846687B (en) Network security monitoring method, system, device and storage medium
Zhao Reliable Information Transmission Mechanism Research of the Internet of Things Sensing Layer based on the Digital Signature
CN106888199A (en) The demand response safety access method that role drives in intelligent grid
Hai et al. Blockchain-based Trustworthiness in Cross-Border Data Exchange in 5G-powered Intelligent Connected Vehicles

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant