Attack prevention method and device

A smart contract and in-depth technology, applied in the field of communication, can solve problems such as single defense and lack of smart contract attack defense, and achieve the effect of ensuring asset security

Active Publication Date: 2020-09-04
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides a method and device for preventing attacks to solve the problem that only one specific type of smart contract attack behavior can only be prevented, and there is a lack of comprehensive protection against smart contract attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack prevention method and device
  • Attack prevention method and device
  • Attack prevention method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057]Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, not to limit the present invention.

[0058] The attack prevention method and device provided by the embodiments of the present invention, considering that there are many types of attacks on smart contracts, common ones include re-entry attacks, timestamp-dependent attacks, and call depth attacks, etc. These attack behaviors may lead to block chain network users Loss of assets, reducing the security and reliability of the blockchain network. However, the current methods of preventing smart contract attacks are generally only aimed at a specific type of attack behavior, and lack all-round protection against smart contract attacks. Therefore, a new method of preventing attacks is proposed, which can protect Behavior i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack prevention method and device, and belongs to the technical field of communication. The attack prevention method comprises the following steps: an accounting node detects a balance state updating condition of a main calling smart contract and a calling depth of a called smart contract; comparing the calling depth with a preset calling depth threshold value to obtain a calling depth comparison result; updating or resetting the calling depth according to the calling depth comparison result; and sending the balance state updating condition to the main calling smart contract, so that the main calling smart contract calls the called smart contract according to the calling depth and fund sending is executed during balance state updating. Attack behaviors of the smart contract can be comprehensively prevented, and thus asset security of a blockchain network user is guaranteed.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an attack prevention method and device. Background technique [0002] A smart contract is a set of promises defined in digital form, including an agreement on which the parties to the contract can enforce those promises. In the blockchain network, a smart contract is a piece of code running on the blockchain. If a clause of the smart contract triggers an execution condition, the code will be automatically executed to complete the smart contract, thereby saving human communication costs and Oversight costs. However, due to factors such as the imprecise writing of smart contract codes, it is easy for hackers to use the smart contract code loopholes to attack and obtain huge profits. Among them, reentrancy attack, timestamp dependency attack and call depth attack are common attack methods against smart contracts. Reentrancy attack is an attack method in which the attacker ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06Q40/04
CPCH04L63/1441G06Q40/04H04L9/50
Inventor 田新雪肖征荣马书惠杨子文董慧
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products