Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Blockchain architecture security evaluation method and system based on permeability test case set

A test case set and security assessment technology, applied in the field of network security, can solve the problems of blockchain platforms, systems, and application security incidents, etc., to reduce the probability of security incidents, promote security development, quantify and evaluate security Effect

Inactive Publication Date: 2020-03-24
CHINA ACADEMY OF INFORMATION & COMM
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are few security assessment methods and systems for blockchain technology architecture. On the one hand, with the rapid development of blockchain technology, a large number of blockchain platforms, systems, applications and other products have frequent security incidents in practical applications. Most blockchain product developers and service providers do not pay enough attention to, timely identify and take measures to deal with security risks before their products are put into the market
On the other hand, the implementation of a systematic security assessment of the blockchain technology architecture requires a clear understanding of the core mechanism and application scenario characteristics of the blockchain technology, and proposes targeted testing methods and methods for its technical architecture, application scenarios, and attack modes. Evaluation methods. At present, there is no unified definition of the technical architecture of the blockchain at home and abroad, but ITU, ISO, TC260, CCSA and other domestic and foreign standardization organizations have described and analyzed it from different angles in relevant standard documents, and Reached a consensus on the key levels and core mechanisms of the technical architecture

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain architecture security evaluation method and system based on permeability test case set
  • Blockchain architecture security evaluation method and system based on permeability test case set
  • Blockchain architecture security evaluation method and system based on permeability test case set

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to realize the timely discovery of security risks of blockchain technology architecture, improve the security of blockchain products and services, and promote the security application of blockchain technology, a new set of security evaluation system is designed in the embodiment of this application. Blockchain technical architecture, according to the hierarchical characteristics of the blockchain technical architecture, conduct security tests on it, and evaluate the security of the blockchain technical architecture based on the test results.

[0044] Embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0045] refer to figure 1 As shown, the security assessment system based on the block chain platform includes at least an assessment initialization module 10, a security test module 11, a result collection module 12, a security assessment module 13, a set of security test cases 14, and a security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a blockchain architecture security evaluation method and a system based on a permeability test case set. The objective of the invention is to provide a hierarchical model for ablockchain technology architecture. Based on a permeability test method, the security of aspects such as a key protocol and a core mechanism of a blockchain technology architecture is evaluated. The security risk and vulnerability can be identified in time before a blockchain platform, a system, an application and the like are officially put into use, and security evaluation can also be performedon a running blockchain architecture, so that an evaluation result guides the improvement of the security of the blockchain platform and the application security in different scenes.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and system for evaluating the security of a blockchain architecture based on a set of penetration test cases. Background technique [0002] As a data security storage, dissemination and management mechanism, blockchain can realize transparent data open sharing by allowing users to participate in data calculation and storage, and verify the authenticity of data with each other, and has become a hot Internet technology in recent years. At present, blockchain technology has been widely used in the financial field, and has rapidly penetrated into medical, communication, insurance and other industries. [0003] With the development of blockchain technology, various industries have gradually realized its technical advantages and application value. At the same time, the security risks in the application process of blockchain have become increasingly prominent. At present, there...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1433H04L63/145H04L63/1458
Inventor 魏亮谢玮卜哲孟楠戴方芳崔枭飞石悦徐扬郑威赵相楠
Owner CHINA ACADEMY OF INFORMATION & COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products