Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain client vulnerability mining method, device and equipment and storage medium

A vulnerability mining and blockchain technology, which is applied in the computer field, can solve problems such as economic loss, damage to the system, and threats to the security of the blockchain, and achieve the effect of strong vulnerability mining, improved accuracy, and increased considerations

Pending Publication Date: 2019-11-12
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When building a blockchain, it needs to be implemented with the help of a blockchain client. However, there may be loopholes in the blockchain client. Vulnerabilities are defects in the specific implementation of hardware, software, protocols or system security policies. Vulnerabilities can be It allows attackers to access or destroy the system without authorization; and because blockchains often have financial attributes, vulnerabilities can cause a lot of economic losses and threaten the security of blockchains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain client vulnerability mining method, device and equipment and storage medium
  • Block chain client vulnerability mining method, device and equipment and storage medium
  • Block chain client vulnerability mining method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Blockchain (Blockchain) is a concept of Bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of Bitcoin, it is a series of data blocks associated with each other using cryptographic methods. Each data block contains a batch of bitcoin network transaction information, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block. Blockchain is an Internet protocol and a basic data structure. Just like HTTP is the most important application protocol in the Internet application layer, blockchain is also a point-to-point transmission protocol in the application layer. On the basis of the protocol, the blockchain defines a distributed ledger jointly by "blocks" and "chains". "Blocks" are similar to transaction records in securities transactions, recording all equity transfer relationships that occurred within a specific period of time; there is a strict and unique inheritance relations...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain client vulnerability mining method and device, and a storage medium. The method comprises the steps of obtaining a writing attribute of a block chain client; obtaining a block chain vulnerability test sample corresponding to the writing attribute; performing vulnerability analysis processing on the block chain client through the block chain vulnerability testsample to obtain a vulnerability analysis result, and collecting abnormal information generated by the block chain client; and determining vulnerabilities existing in the block chain client accordingto the vulnerability analysis result and the abnormal information. According to the method, the compiling attribute comprises the attribute on which the block chain client is compiled, so that the obtained vulnerability test sample can realize vulnerability mining of the block chain client on the compiling level, the vulnerability mining depth is relatively large, and the vulnerability mining strength is high. Moreover, the abnormal information generated by the block chain client is collected, and the vulnerability existing in the block chain client is determined according to the vulnerabilityanalysis result and the abnormal information, so that consideration factors during vulnerability determination are increased, and the vulnerability determination accuracy is improved.

Description

technical field [0001] The present application relates to the field of computer technology, and more specifically, to a blockchain client vulnerability mining method, device, equipment, and storage medium. Background technique [0002] With the development of computer technology, users have higher and higher requirements for the accuracy and security of data on the computer. In this application scenario, the blockchain is more and more popular due to its properties that cannot be tampered with and can be traced. Pay attention to. Blockchain (Blockchain) is a concept of Bitcoin. It is essentially a decentralized database. At the same time, as the underlying technology of Bitcoin, it is a series of data blocks associated with each other using cryptographic methods. Each data block contains a batch of bitcoin network transaction information, which is used to verify the validity of the information (anti-counterfeiting) and generate the next block. When building a blockchain, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/1433
Inventor 陈楠
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD