SG10201910425SA - Methods and devices for preventing denial-of-service attack on blockchain system - Google Patents

Methods and devices for preventing denial-of-service attack on blockchain system

Info

Publication number
SG10201910425SA
SG10201910425SA SG10201910425SA SG10201910425SA SG10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA
Authority
SG
Singapore
Prior art keywords
methods
devices
blockchain system
service attack
preventing denial
Prior art date
Application number
SG10201910425SA
Inventor
Yuan Yuan
Shengjiao Cao
Hui Fang
Weitao Yang
Original Assignee
Alipay Labs Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Labs Singapore Pte Ltd filed Critical Alipay Labs Singapore Pte Ltd
Priority to SG10201910425SA priority Critical patent/SG10201910425SA/en
Priority to PCT/CN2020/109546 priority patent/WO2021088451A1/en
Priority to CN202080077301.8A priority patent/CN114641788B/en
Publication of SG10201910425SA publication Critical patent/SG10201910425SA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
SG10201910425SA 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system SG10201910425SA (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG10201910425SA SG10201910425SA (en) 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system
PCT/CN2020/109546 WO2021088451A1 (en) 2019-11-07 2020-08-17 Methods and devices for preventing denial-of-service attack on blockchain system
CN202080077301.8A CN114641788B (en) 2019-11-07 2020-08-17 Method and apparatus for preventing denial of service attacks on blockchain systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201910425SA SG10201910425SA (en) 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system

Publications (1)

Publication Number Publication Date
SG10201910425SA true SG10201910425SA (en) 2020-10-29

Family

ID=73034389

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201910425SA SG10201910425SA (en) 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system

Country Status (3)

Country Link
CN (1) CN114641788B (en)
SG (1) SG10201910425SA (en)
WO (1) WO2021088451A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023146718A1 (en) * 2022-01-27 2023-08-03 Qualcomm Incorporated Security key derivation using decoded information blocks

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064601A (en) * 2006-04-26 2007-10-31 资通电脑股份有限公司 Method for authenticating character graph
US20100037056A1 (en) * 2008-08-07 2010-02-11 Follis Benjamin D Method to support privacy preserving secure data management in archival systems
US11494761B2 (en) * 2015-11-06 2022-11-08 Cable Television Laboratories, Inc. Systems and methods for digital asset security ecosystems
US20170236120A1 (en) * 2016-02-11 2017-08-17 Oracle International Corporation Accountability and Trust in Distributed Ledger Systems
CN106534097B (en) * 2016-10-27 2018-05-18 上海亿账通区块链科技有限公司 Permission method of control and system based on the transaction of block chain
CA2948229C (en) * 2016-11-10 2022-05-31 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
CN108876377A (en) * 2018-07-06 2018-11-23 杭州复杂美科技有限公司 A kind of method and system for preventing from repeating to pay
CN110113328B (en) * 2019-04-28 2021-01-15 武汉理工大学 Software defined opportunistic network DDoS defense method based on block chain
CN110084599B (en) * 2019-04-28 2021-04-20 百度在线网络技术(北京)有限公司 Key processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN114641788A (en) 2022-06-17
WO2021088451A1 (en) 2021-05-14
CN114641788B (en) 2023-06-30

Similar Documents

Publication Publication Date Title
EP3694170A4 (en) Method and device for withstanding denial-of-service attack
EP3803655A4 (en) Threat mitigation system and method
EP3253025A4 (en) Sdn-based ddos attack prevention method, device and system
EP3574461A4 (en) System and method for detecting replay attack
EP3393089A4 (en) Security device, network system and attack detection method
EP3820198A4 (en) Security protection method, device, and system
IL270919B (en) System and method for preventing malicious can bus attacks
EP3337123A4 (en) Network attack prevention method, apparatus and system
EP3545665A4 (en) System and method for detecting replay attack
EP3557841A4 (en) Dns attack defense method, apparatus and system
EP3525127A4 (en) Method and system for blocking phishing or ransomware attack
EP3987412A4 (en) System and method for attack protection in iot devices
EP3909220C0 (en) System and method for secure detokenization
EP4066463A4 (en) Threat mitigation system and method
IL253987A0 (en) Cyber threat detection system and method
EP3554036A4 (en) Ddos attack detection method and device
IL264275A (en) Hearing protection device, hearing protection system, and related method
EP3759672A4 (en) Fraud prevention exchange system and method
EP4028916A4 (en) Threat mitigation system and method
GB201805429D0 (en) Security system and method
SG10201910425SA (en) Methods and devices for preventing denial-of-service attack on blockchain system
EP3843354A4 (en) Method, device, and system for anti-phishing attack check
PT3811258T (en) Method for preventing ransomware attacks on computing systems
EP3618396A4 (en) Protection method and system for http flood attack
ZA202206279B (en) Security system and method