SG10201910425SA - Methods and devices for preventing denial-of-service attack on blockchain system - Google Patents
Methods and devices for preventing denial-of-service attack on blockchain systemInfo
- Publication number
- SG10201910425SA SG10201910425SA SG10201910425SA SG10201910425SA SG10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA
- Authority
- SG
- Singapore
- Prior art keywords
- methods
- devices
- blockchain system
- service attack
- preventing denial
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201910425SA SG10201910425SA (en) | 2019-11-07 | 2019-11-07 | Methods and devices for preventing denial-of-service attack on blockchain system |
PCT/CN2020/109546 WO2021088451A1 (en) | 2019-11-07 | 2020-08-17 | Methods and devices for preventing denial-of-service attack on blockchain system |
CN202080077301.8A CN114641788B (en) | 2019-11-07 | 2020-08-17 | Method and apparatus for preventing denial of service attacks on blockchain systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201910425SA SG10201910425SA (en) | 2019-11-07 | 2019-11-07 | Methods and devices for preventing denial-of-service attack on blockchain system |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201910425SA true SG10201910425SA (en) | 2020-10-29 |
Family
ID=73034389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201910425SA SG10201910425SA (en) | 2019-11-07 | 2019-11-07 | Methods and devices for preventing denial-of-service attack on blockchain system |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN114641788B (en) |
SG (1) | SG10201910425SA (en) |
WO (1) | WO2021088451A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023146718A1 (en) * | 2022-01-27 | 2023-08-03 | Qualcomm Incorporated | Security key derivation using decoded information blocks |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064601A (en) * | 2006-04-26 | 2007-10-31 | 资通电脑股份有限公司 | Method for authenticating character graph |
US20100037056A1 (en) * | 2008-08-07 | 2010-02-11 | Follis Benjamin D | Method to support privacy preserving secure data management in archival systems |
US11494761B2 (en) * | 2015-11-06 | 2022-11-08 | Cable Television Laboratories, Inc. | Systems and methods for digital asset security ecosystems |
US20170236120A1 (en) * | 2016-02-11 | 2017-08-17 | Oracle International Corporation | Accountability and Trust in Distributed Ledger Systems |
CN106534097B (en) * | 2016-10-27 | 2018-05-18 | 上海亿账通区块链科技有限公司 | Permission method of control and system based on the transaction of block chain |
CA2948229C (en) * | 2016-11-10 | 2022-05-31 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
CN108876377A (en) * | 2018-07-06 | 2018-11-23 | 杭州复杂美科技有限公司 | A kind of method and system for preventing from repeating to pay |
CN110113328B (en) * | 2019-04-28 | 2021-01-15 | 武汉理工大学 | Software defined opportunistic network DDoS defense method based on block chain |
CN110084599B (en) * | 2019-04-28 | 2021-04-20 | 百度在线网络技术(北京)有限公司 | Key processing method, device, equipment and storage medium |
-
2019
- 2019-11-07 SG SG10201910425SA patent/SG10201910425SA/en unknown
-
2020
- 2020-08-17 WO PCT/CN2020/109546 patent/WO2021088451A1/en active Application Filing
- 2020-08-17 CN CN202080077301.8A patent/CN114641788B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN114641788A (en) | 2022-06-17 |
WO2021088451A1 (en) | 2021-05-14 |
CN114641788B (en) | 2023-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3694170A4 (en) | Method and device for withstanding denial-of-service attack | |
EP3803655A4 (en) | Threat mitigation system and method | |
EP3253025A4 (en) | Sdn-based ddos attack prevention method, device and system | |
EP3574461A4 (en) | System and method for detecting replay attack | |
EP3393089A4 (en) | Security device, network system and attack detection method | |
EP3820198A4 (en) | Security protection method, device, and system | |
IL270919B (en) | System and method for preventing malicious can bus attacks | |
EP3337123A4 (en) | Network attack prevention method, apparatus and system | |
EP3545665A4 (en) | System and method for detecting replay attack | |
EP3557841A4 (en) | Dns attack defense method, apparatus and system | |
EP3525127A4 (en) | Method and system for blocking phishing or ransomware attack | |
EP3987412A4 (en) | System and method for attack protection in iot devices | |
EP3909220C0 (en) | System and method for secure detokenization | |
EP4066463A4 (en) | Threat mitigation system and method | |
IL253987A0 (en) | Cyber threat detection system and method | |
EP3554036A4 (en) | Ddos attack detection method and device | |
IL264275A (en) | Hearing protection device, hearing protection system, and related method | |
EP3759672A4 (en) | Fraud prevention exchange system and method | |
EP4028916A4 (en) | Threat mitigation system and method | |
GB201805429D0 (en) | Security system and method | |
SG10201910425SA (en) | Methods and devices for preventing denial-of-service attack on blockchain system | |
EP3843354A4 (en) | Method, device, and system for anti-phishing attack check | |
PT3811258T (en) | Method for preventing ransomware attacks on computing systems | |
EP3618396A4 (en) | Protection method and system for http flood attack | |
ZA202206279B (en) | Security system and method |