Unlock instant, AI-driven research and patent intelligence for your innovation.

Improved Anti-replay device based on memory space interchange

A memory and replay attack technology, applied in the direction of attacking encryption mechanism countermeasures, instruments, digital transmission systems, etc., can solve problems such as inaccuracy

Active Publication Date: 2020-05-05
蚂蚁双链科技(上海)有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A disadvantage of Bloom filters is that the return value is probabilistic (ie, imprecise)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved Anti-replay device based on memory space interchange
  • Improved Anti-replay device based on memory space interchange
  • Improved Anti-replay device based on memory space interchange

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] This disclosure describes a scheme involving techniques for using storage space swapping to more efficiently identify replay attacks. Only the most recent transaction information is stored in the working section of the memory. Switching is performed when a threshold condition is determined to be met, eg, when the working section is at a threshold percentage full. During switchover, the backup section becomes the working section. During the overlapping phase, transaction information can be stored in the working section and the backup section to provide redundancy. Storing and searching transaction information for only recent transactions can speed up search times. For example, a transaction can be a transaction in a blockchain.

[0020] To provide further context to the embodiments herein, and as noted above, distributed ledger systems (DLS), which may also be referred to as consensus networks (e.g., composed of peer-to-peer nodes) and blockchain networks, enable part...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting and disabling replay attacks. One of the methods includes receiving atransaction to be completed in a blockchain. A current working section of memory storing transaction information that is designated for use in identifying past transactions already processed is determined, where the memory also stores a backup section providing, when used in combination with the current working section, an alternating memory section storage scheme for the transaction information.From the current working section, whether the transaction has previously been processed is determined. When it is determined that the transaction has previously been processed, the transaction is bypassed. When it is determined that the transaction has not previously been processed the transaction is processed and transaction information for the transaction is written into the current working section.

Description

technical field [0001] This paper deals with identifying replay attacks (or replay attacks), in which transactions or transmissions are maliciously or fraudulently repeated. Background technique [0002] A distributed ledger system (DLS), also known as a consensus network and / or a blockchain network, enables participating entities to store data securely and immutably. Without referencing any specific use case, DLS is often referred to as a blockchain network. Examples of types of blockchain networks may include public blockchain networks, private blockchain networks, and consortium blockchain networks. A consortium blockchain network is provided for a select group of entities that controls the consensus process and includes an access control layer. [0003] A replay attack can refer to the attacker sending a package that the target host has already received, such as a transaction in a blockchain network. The purpose of replay attacks is to deceive the blockchain network. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L9/002H04L63/1466G06F21/64G06F21/554H04L63/123H04L9/3239H04L9/50
Inventor 吕宏
Owner 蚂蚁双链科技(上海)有限公司