Device access processing method, device and storage medium

A device access and processing method technology, applied in the computer field, can solve problems affecting the normal operation of the blockchain network, achieve the effect of optimizing device access management, reducing repeated access, and ensuring normal operation

Active Publication Date: 2021-09-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the continuous popularization of blockchain technology, online network attacks against blockchains have gradually emerged, such as Sybil attacks. Criminals can create multiple account identities, multiple nodes or computer coordinates in an attempt to attack the blockchain network. Control, can refuse to receive or transmit blocks, or even prevent other users from entering the blockchain network, etc., seriously affecting the normal operation of the blockchain network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device access processing method, device and storage medium
  • Device access processing method, device and storage medium
  • Device access processing method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] Please combine Figure 1-Figure 8 In the illustrated embodiment, the device access processing method provided by the embodiment of the present invention is introduced in detail.

[0050] See figure 1 , which provides a system architecture diagram of device access processing for the embodiment of the present invention. Such as figure 1As shown, for the same business processing based on the block chain 100, such as: financial business, community access...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device access processing method, device and storage medium, wherein the method includes: obtaining an access request of an access device for a blockchain, obtaining a device code of the access device carried in the access request, The device code is a device serial number generated according to the service timestamp of the access device; access verification is performed on the device code based on the device code list to obtain verification data of the device code; based on the verification data An access processing result for the access request is determined. By adopting the present invention, the device access management in the block chain network can be optimized, the repeated access of single block node devices with multiple identities can be reduced, and the normal operation of the block chain network can be guaranteed.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a device access processing method, device and storage medium. Background technique [0002] With the continuous development and improvement of computer technology, various business scenarios can now be completed through the blockchain, such as: information record storage, transaction, information query, etc., because the blockchain is decentralized, tamper-proof and traceable characteristics, so that information security can be guaranteed. However, with the continuous popularization of blockchain technology, online network attacks against blockchains have gradually emerged, such as Sybil attacks. Criminals can create multiple account identities, multiple nodes or computer coordinates in an attempt to attack the blockchain network. Control, can refuse to receive or transmit blocks, or even prevent other users from entering the blockchain network, etc., seriously affecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0876H04L63/10H04L67/1097H04L67/1095H04L9/50
Inventor 刘攀
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products