Anti-attack method, equipment and storage medium

An anti-attack and device technology, applied in the blockchain field, can solve problems such as memory pool congestion, achieve the effect of enhancing protection and increasing attack costs

Pending Publication Date: 2019-08-30
HANGZHOU FUZAMEI TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When an attacker sends a large number of such transactions, it will cause congestion in the mempool

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack method, equipment and storage medium
  • Anti-attack method, equipment and storage medium
  • Anti-attack method, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The application will be further described in detail below with reference to the drawings and embodiments. It can be understood that the specific embodiments described here are only used to explain the related invention, but not to limit the invention. In addition, it should be noted that, for ease of description, only the parts related to the invention are shown in the drawings.

[0022] It should be noted that the embodiments in this application and the features in the embodiments can be combined with each other if there is no conflict. Hereinafter, the present application will be described in detail with reference to the drawings and in conjunction with embodiments.

[0023] figure 1 It is a flowchart of an attack prevention method provided by an embodiment of the present invention.

[0024] Such as figure 1 As shown, in this embodiment, the present invention provides an attack prevention method, including:

[0025] S11: Parse the first transaction to be stored in the memor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-attack method, equipment and a storage medium. The anti-attack method comprises the steps: analyzing a first transaction to be stored in a memory pool, so as to obtain asignature address of the first transaction; obtaining the balance of the corresponding account according to the signature address; judging whether the balance is not less than the service fee of thefirst transaction or not: if not, generating and reporting error information, and deleting the first transaction; and if so, storing the first transaction into the memory pool. The anti-attack methodanalyzes the address before the transaction is stored in the memory pool so as to obtain the account balance, and determines whether the balance is enough to pay the service fee, so as to filter the transaction with insufficient account balance, and guarantee the condition that the memory pool is jammed due to the fact that the account balance is not enough to pay the service fee.

Description

Technical field [0001] This application relates to the field of blockchain technology, in particular to an anti-attack method, equipment, and storage medium. Background technique [0002] In the current blockchain system, the blockchain node does not check whether the account that signed the transaction has enough balance to pay the handling fee before executing the transaction, but deducts the handling fee when the transaction is executed. If the deduction fails, the transaction fee will be deducted. The transaction execution failed. [0003] Based on the above mechanism, an attacker in the network can generate a large number of transactions whose account balance is insufficient to pay the handling fee through signatures of accounts with insufficient balances and send them to the blockchain network for attack. These transactions can smoothly enter the memory pool and be packaged into blocks, and the lack of handling fees is not detected until they are executed. When an attacker ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/40G06Q40/04
CPCG06Q20/3825G06Q20/3829G06Q20/4037G06Q40/04
Inventor 何玉斌王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products