A method and device for preventing attacks

A deep, smart contract technology, applied in the field of communications, can solve problems such as single defense, lack of smart contract attack defense, etc., to achieve the effect of ensuring asset security

Active Publication Date: 2022-04-26
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For this reason, the present invention provides a method and device for preventing attacks to solve the problem that only one specific type of smart contract attack behavior can only be prevented, and there is a lack of comprehensive protection against smart contract attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for preventing attacks
  • A method and device for preventing attacks
  • A method and device for preventing attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057]Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0058] The attack prevention method and device provided by the embodiments of the present invention, considering that there are many types of attacks on smart contracts, common ones include re-entry attacks, timestamp-dependent attacks, and call depth attacks, etc. These attack behaviors may lead to block chain network users Loss of assets, reducing the security and reliability of the blockchain network. However, the current methods of preventing smart contract attacks are generally only aimed at a specific type of attack behavior, and lack all-round protection against smart contract attacks. Therefore, a new method of preventing attacks is proposed, which can pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attack prevention method and device, belonging to the technical field of communication. The attack prevention method includes: the accounting node detects the balance status update of the calling smart contract and the call depth of the called smart contract; compares the call depth with the preset call depth threshold to obtain the call depth comparison result; compares the result according to the call depth Update or reset the calling depth, and send the balance status update to the main calling smart contract, so that the calling smart contract can call the called smart contract according to the calling depth, and execute the fund sending when the balance status is updated, which can attack the smart contract Behavior is more comprehensively prevented, so as to protect the asset security of blockchain network users.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an attack prevention method and device. Background technique [0002] A smart contract is a set of promises defined in digital form, including an agreement on which the parties to the contract can enforce those promises. In the blockchain network, a smart contract is a piece of code running on the blockchain. If a clause of the smart contract triggers an execution condition, the code will be automatically executed to complete the smart contract, thereby saving human communication costs and Oversight costs. However, due to factors such as the imprecise writing of smart contract codes, it is easy for hackers to use the smart contract code loopholes to attack and obtain huge profits. Among them, reentrancy attack, timestamp dependency attack and call depth attack are common attack methods against smart contracts. Reentrancy attack is an attack method in which the attacker ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06Q40/04
CPCH04L63/1441G06Q40/04H04L9/50
Inventor 田新雪肖征荣马书惠杨子文董慧
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products