SG10201910425SA - Methods and devices for preventing denial-of-service attack on blockchain system - Google Patents

Methods and devices for preventing denial-of-service attack on blockchain system

Info

Publication number
SG10201910425SA
SG10201910425SA SG10201910425SA SG10201910425SA SG10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA
Authority
SG
Singapore
Prior art keywords
methods
devices
blockchain system
service attack
preventing denial
Prior art date
Application number
SG10201910425SA
Other languages
English (en)
Inventor
Yuan Yuan
Shengjiao Cao
Hui Fang
Weitao Yang
Original Assignee
Alipay Labs Singapore Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Labs Singapore Pte Ltd filed Critical Alipay Labs Singapore Pte Ltd
Priority to SG10201910425SA priority Critical patent/SG10201910425SA/en
Priority to PCT/CN2020/109546 priority patent/WO2021088451A1/en
Priority to CN202080077301.8A priority patent/CN114641788B/zh
Publication of SG10201910425SA publication Critical patent/SG10201910425SA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
SG10201910425SA 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system SG10201910425SA (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG10201910425SA SG10201910425SA (en) 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system
PCT/CN2020/109546 WO2021088451A1 (en) 2019-11-07 2020-08-17 Methods and devices for preventing denial-of-service attack on blockchain system
CN202080077301.8A CN114641788B (zh) 2019-11-07 2020-08-17 用于防止对区块链系统的拒绝服务攻击的方法和设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201910425SA SG10201910425SA (en) 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system

Publications (1)

Publication Number Publication Date
SG10201910425SA true SG10201910425SA (en) 2020-10-29

Family

ID=73034389

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201910425SA SG10201910425SA (en) 2019-11-07 2019-11-07 Methods and devices for preventing denial-of-service attack on blockchain system

Country Status (3)

Country Link
CN (1) CN114641788B (zh)
SG (1) SG10201910425SA (zh)
WO (1) WO2021088451A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023146718A1 (en) * 2022-01-27 2023-08-03 Qualcomm Incorporated Security key derivation using decoded information blocks

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064601A (zh) * 2006-04-26 2007-10-31 资通电脑股份有限公司 文字图形化的认证方法
US20100037056A1 (en) * 2008-08-07 2010-02-11 Follis Benjamin D Method to support privacy preserving secure data management in archival systems
US11494761B2 (en) * 2015-11-06 2022-11-08 Cable Television Laboratories, Inc. Systems and methods for digital asset security ecosystems
US20170236120A1 (en) * 2016-02-11 2017-08-17 Oracle International Corporation Accountability and Trust in Distributed Ledger Systems
CN106534097B (zh) * 2016-10-27 2018-05-18 上海亿账通区块链科技有限公司 基于区块链交易的权限管制方法及系统
CA2948229C (en) * 2016-11-10 2022-05-31 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
CN108876377A (zh) * 2018-07-06 2018-11-23 杭州复杂美科技有限公司 一种防止重复支付的方法和系统
CN110084599B (zh) * 2019-04-28 2021-04-20 百度在线网络技术(北京)有限公司 密钥处理方法、装置、设备和存储介质
CN110113328B (zh) * 2019-04-28 2021-01-15 武汉理工大学 一种基于区块链的软件定义机会网络DDoS防御方法

Also Published As

Publication number Publication date
CN114641788A (zh) 2022-06-17
WO2021088451A1 (en) 2021-05-14
CN114641788B (zh) 2023-06-30

Similar Documents

Publication Publication Date Title
EP3694170A4 (en) METHOD AND DEVICE FOR DEFENDING DENIAL OF SERVICE ATTACKS
EP3803656A4 (en) THREAT MITIGATION SYSTEM AND METHOD
EP3253025A4 (en) Sdn-based ddos attack prevention method, device and system
EP3574461A4 (en) SYSTEM AND METHOD FOR DETECTING A PLAYBACK
EP3393089A4 (en) SAFETY DEVICE, NETWORK SYSTEM AND METHOD FOR DETECTING ATTACKS
EP3820198A4 (en) SAFETY PROCEDURE, DEVICE AND SYSTEM
IL270919B (en) A system and method for preventing a malicious attack in a standardized communication protocol in a computer system
EP3337123A4 (en) METHOD, APPARATUS AND SYSTEM FOR PREVENTING NETWORK ATTACK
EP3545665A4 (en) REINSERTION ATTACK DETECTION SYSTEM AND METHOD
EP3557841A4 (en) DEFENSE METHOD, APPARATUS AND SYSTEM AGAINST DNS ATTACKS
EP3525127A4 (en) METHOD AND SYSTEM FOR BLOCKING A PHISHING OR RANÇONGICIEL ATTACK
EP3987412A4 (en) ATTACK PROTECTION SYSTEM AND METHOD FOR IOT DEVICES
EP4066464A4 (en) THREAT MITIGATION SYSTEM AND METHOD
IL253987A0 (en) System and method for identifying cyber threats
EP3909220C0 (en) SYSTEM AND METHOD FOR SAFE DESEGMENTATION
EP3554036A4 (en) PROCESS AND DEVICE FOR DDOS ATTACK RECOGNITION
IL264275A (en) Hearing protection device, hearing protection system and related method
EP3759672A4 (en) FRAUD PREVENTION EXCHANGE SYSTEM AND METHOD
EP4028918A4 (en) THREAT MITIGATION SYSTEM AND METHOD
GB201805429D0 (en) Security system and method
SG10201910425SA (en) Methods and devices for preventing denial-of-service attack on blockchain system
EP3843354A4 (en) METHOD, DEVICE AND SYSTEM FOR TESTING ANTESTS FOR PROTECTION OF PHISHING
PT3811258T (pt) Método para impedir ataques com software de sequestro em sistemas informáticos
EP3618396A4 (en) PROTECTION METHOD AND SYSTEM FOR HTTP FLOOD ATTACK
ZA202206279B (en) Security system and method