SG10201910425SA - Methods and devices for preventing denial-of-service attack on blockchain system - Google Patents
Methods and devices for preventing denial-of-service attack on blockchain systemInfo
- Publication number
- SG10201910425SA SG10201910425SA SG10201910425SA SG10201910425SA SG10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA SG 10201910425S A SG10201910425S A SG 10201910425SA
- Authority
- SG
- Singapore
- Prior art keywords
- methods
- devices
- blockchain system
- service attack
- preventing denial
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Finance (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201910425SA SG10201910425SA (en) | 2019-11-07 | 2019-11-07 | Methods and devices for preventing denial-of-service attack on blockchain system |
PCT/CN2020/109546 WO2021088451A1 (en) | 2019-11-07 | 2020-08-17 | Methods and devices for preventing denial-of-service attack on blockchain system |
CN202080077301.8A CN114641788B (zh) | 2019-11-07 | 2020-08-17 | 用于防止对区块链系统的拒绝服务攻击的方法和设备 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SG10201910425SA SG10201910425SA (en) | 2019-11-07 | 2019-11-07 | Methods and devices for preventing denial-of-service attack on blockchain system |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201910425SA true SG10201910425SA (en) | 2020-10-29 |
Family
ID=73034389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201910425SA SG10201910425SA (en) | 2019-11-07 | 2019-11-07 | Methods and devices for preventing denial-of-service attack on blockchain system |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN114641788B (zh) |
SG (1) | SG10201910425SA (zh) |
WO (1) | WO2021088451A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023146718A1 (en) * | 2022-01-27 | 2023-08-03 | Qualcomm Incorporated | Security key derivation using decoded information blocks |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101064601A (zh) * | 2006-04-26 | 2007-10-31 | 资通电脑股份有限公司 | 文字图形化的认证方法 |
US20100037056A1 (en) * | 2008-08-07 | 2010-02-11 | Follis Benjamin D | Method to support privacy preserving secure data management in archival systems |
US11494761B2 (en) * | 2015-11-06 | 2022-11-08 | Cable Television Laboratories, Inc. | Systems and methods for digital asset security ecosystems |
US20170236120A1 (en) * | 2016-02-11 | 2017-08-17 | Oracle International Corporation | Accountability and Trust in Distributed Ledger Systems |
CN106534097B (zh) * | 2016-10-27 | 2018-05-18 | 上海亿账通区块链科技有限公司 | 基于区块链交易的权限管制方法及系统 |
CA2948229C (en) * | 2016-11-10 | 2022-05-31 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
CN108876377A (zh) * | 2018-07-06 | 2018-11-23 | 杭州复杂美科技有限公司 | 一种防止重复支付的方法和系统 |
CN110084599B (zh) * | 2019-04-28 | 2021-04-20 | 百度在线网络技术(北京)有限公司 | 密钥处理方法、装置、设备和存储介质 |
CN110113328B (zh) * | 2019-04-28 | 2021-01-15 | 武汉理工大学 | 一种基于区块链的软件定义机会网络DDoS防御方法 |
-
2019
- 2019-11-07 SG SG10201910425SA patent/SG10201910425SA/en unknown
-
2020
- 2020-08-17 CN CN202080077301.8A patent/CN114641788B/zh active Active
- 2020-08-17 WO PCT/CN2020/109546 patent/WO2021088451A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
CN114641788A (zh) | 2022-06-17 |
WO2021088451A1 (en) | 2021-05-14 |
CN114641788B (zh) | 2023-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3694170A4 (en) | METHOD AND DEVICE FOR DEFENDING DENIAL OF SERVICE ATTACKS | |
EP3803656A4 (en) | THREAT MITIGATION SYSTEM AND METHOD | |
EP3253025A4 (en) | Sdn-based ddos attack prevention method, device and system | |
EP3574461A4 (en) | SYSTEM AND METHOD FOR DETECTING A PLAYBACK | |
EP3393089A4 (en) | SAFETY DEVICE, NETWORK SYSTEM AND METHOD FOR DETECTING ATTACKS | |
EP3820198A4 (en) | SAFETY PROCEDURE, DEVICE AND SYSTEM | |
IL270919B (en) | A system and method for preventing a malicious attack in a standardized communication protocol in a computer system | |
EP3337123A4 (en) | METHOD, APPARATUS AND SYSTEM FOR PREVENTING NETWORK ATTACK | |
EP3545665A4 (en) | REINSERTION ATTACK DETECTION SYSTEM AND METHOD | |
EP3557841A4 (en) | DEFENSE METHOD, APPARATUS AND SYSTEM AGAINST DNS ATTACKS | |
EP3525127A4 (en) | METHOD AND SYSTEM FOR BLOCKING A PHISHING OR RANÇONGICIEL ATTACK | |
EP3987412A4 (en) | ATTACK PROTECTION SYSTEM AND METHOD FOR IOT DEVICES | |
EP4066464A4 (en) | THREAT MITIGATION SYSTEM AND METHOD | |
IL253987A0 (en) | System and method for identifying cyber threats | |
EP3909220C0 (en) | SYSTEM AND METHOD FOR SAFE DESEGMENTATION | |
EP3554036A4 (en) | PROCESS AND DEVICE FOR DDOS ATTACK RECOGNITION | |
IL264275A (en) | Hearing protection device, hearing protection system and related method | |
EP3759672A4 (en) | FRAUD PREVENTION EXCHANGE SYSTEM AND METHOD | |
EP4028918A4 (en) | THREAT MITIGATION SYSTEM AND METHOD | |
GB201805429D0 (en) | Security system and method | |
SG10201910425SA (en) | Methods and devices for preventing denial-of-service attack on blockchain system | |
EP3843354A4 (en) | METHOD, DEVICE AND SYSTEM FOR TESTING ANTESTS FOR PROTECTION OF PHISHING | |
PT3811258T (pt) | Método para impedir ataques com software de sequestro em sistemas informáticos | |
EP3618396A4 (en) | PROTECTION METHOD AND SYSTEM FOR HTTP FLOOD ATTACK | |
ZA202206279B (en) | Security system and method |