Security risk assessment method for block chain

A security risk and blockchain technology, applied in computer security devices, instruments, payment systems, etc., can solve problems such as researching blockchain security risks, blockchain security risk impacts, etc.

Inactive Publication Date: 2019-10-08
SICHUAN UNIV
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to the literature review, the existing methods do not study the security risk of the blockchain from the perspective of technical a...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk assessment method for block chain
  • Security risk assessment method for block chain
  • Security risk assessment method for block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0110] Below in conjunction with example the present invention will be further described:

[0111] 1) Description of the experimental environment

[0112] So far, there are only two authoritative institutions in the world that have conducted technical security risk assessments on blockchains and released data. One is the China Information Industry Development Center - CCID Blockchain Research Institute. The assessment object is public chains, and the number of assessments is 31. Items, the evaluation content includes the realization of functions, basic performance, security and degree of centralization; the other is the independent rating agency in the United States - Weiss Ratings, the evaluation object is the public chain, the number of evaluations is 93, and the evaluation content includes functions, basic performance, security sex and energy management. In order to verify the feasibility of this model, this experiment selected 30 well-known public chain systems as the exp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security risk assessment method for a block chain. The security risk of the block chain is quantified at the two aspects of technical architecture and activeness. The method comprises the following steps of firstly, establishing a block chain trusted computing base (BTCB) model according to a block chain technical system architecture; designing a security sensitivity analysis method combining AHP (Analytic Hierarchy Process) and pairing comparison, distributing a security sensitivity weight for each security risk influence factor, and finally constructing a security risk scoring function of the block chain. At an experiment part, the method is adopted to score 30 important public chain block chain projects at present, the comparison and analysis are carried out onthe scores, the scores are compared and analyzed with a Cydive public chain technology evaluation index and a Weis encrypted currency rating, and an experiment result shows that the method has certainfeasibility.

Description

technical field [0001] The present invention relates to application fields such as finance and finance, and in particular to safety-related issues related to the application of block chain technology in the fields of finance and finance. Background technique [0002] Blockchain originated from Bitcoin, and has become an important application technology in the fields of finance and finance in the future by virtue of its security advantages such as trustlessness, tamper resistance, and traceability. With the substantial improvement of computer computing power and the increase of economic interests hidden behind the application field, the security issues of blockchain technology are becoming more and more prominent. Therefore, the security risk research of blockchain is becoming a research hotspot at home and abroad. [0003] In recent years, various methods have been proposed to detect and assess the security risks of blockchain. At present, most studies use mathematical met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06Q20/40
CPCG06F21/577G06F2221/034G06Q20/4016
Inventor 郭兵沈艳秦超霞刘胜杰苏红张珍周驰岷逯峻雨
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products