Embedded intrusion detection method and device for smart contract

A technology of smart contracts and intrusion detection, applied in the field of blockchain, can solve the problems of intrusion detection that cannot be smart contracts, and achieve the effect of improving security and reliability

Pending Publication Date: 2020-08-11
广州拉卡拉信息技术有限公司 +1
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the above-mentioned technical problems in the prior art, the embodiments of the present disclosure propose an embedded intrusion detection method, device, elect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded intrusion detection method and device for smart contract
  • Embedded intrusion detection method and device for smart contract
  • Embedded intrusion detection method and device for smart contract

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In the following detailed description, numerous specific details of the disclosure are set forth by way of example in order to provide a thorough understanding of the relevant disclosure. It will be apparent, however, to one of ordinary skill in the art that the present disclosure may be practiced without these details. It should be understood that the terms "system", "device", "unit" and / or "module" used in the present disclosure are used as a means of distinguishing between different parts, elements, sections or assemblies at different levels in a sequential arrangement. method. However, these terms may be replaced by other expressions if other expressions can achieve the same purpose.

[0042] It will be understood that when a device, unit or module is referred to as being "on," "connected to" or "coupled to" another device, unit or module, it can be directly on the other device, unit or module. connected or coupled to or communicate with other devices, units or mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an embedded intrusion detection method and device for a smart contract. The method comprises the steps of testing and analyzing an intelligent contract needing to be protected by using a test case in a test environment, and generating a control flow graph corresponding to the intelligent contract; processing the control flow graph, and marking path features of all test cases to form a safe path feature set; adding the coded security path feature set into the smart contract to form a smart contract with an embedded IDS function, and deploying the smartcontract into a blockchain; and when a notification that the embedded IDS judges that an intrusion behavior occurs is received, marking an exception, and carrying out alarming and rollback.

Description

technical field [0001] The present disclosure relates to the technical field of block chain, and in particular to an embedded intrusion detection method, device, electronic equipment and storage medium of a smart contract. Background technique [0002] Blockchain technology is a distributed data storage technology that is decentralized, does not require third-party authentication, and has peer-to-peer interaction. By maintaining chain-structured data blocks, blockchain can maintain continuously growing and tamper-proof data records. At present, the application of blockchain is mainly concentrated in digital currency, network transactions, etc., but this is only because these fields rely more on certain characteristics of blockchain. In fact, the actual application direction of blockchain is far more than the above-mentioned fields. [0003] The first generation of blockchain is essentially a decentralized data record (such as Bitcoin's ledger) tool, through consensus algorit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q40/04G06F21/64
CPCG06Q40/04G06F21/64
Inventor 不公告发明人
Owner 广州拉卡拉信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products