Proxy firewall protection method and system for smart contract
A technology of smart contracts and protection systems, applied in transmission systems, digital transmission systems, data processing applications, etc., can solve problems such as inability to know, inability to guarantee testability, and inability to protect smart contracts, ensuring transaction security and efficiency. And the effect of timely access control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0045] see Figure 1-3 .
[0046] Such as figure 1 As shown, this embodiment provides a proxy firewall protection method for smart contracts, at least including the following steps:
[0047] S101. After the user publishes the transaction, the proxy contract in the proxy firewall is invoked, and the proxy firewall performs a security check on the parameter content of the transaction according to the preset security policy;
[0048] Specifically, for step S101, the user issues a transaction to call the proxy firewall contract, and the proxy firewall checks the parameter content of the transaction according to the security policy, such as whether the sender's address is in the blacklist of the protection policy library.
[0049] It should be noted that a transaction is a data structure of the blockchain and mainly includes the following main fields: Type: the type of transaction, ContractCreation (creating a contract) or MessageCall (calling a contract or transferring money); N...
no. 2 example
[0073] see Figure 4-5 .
[0074] Such as Figure 4As shown, this embodiment provides a proxy firewall protection system for smart contracts, including:
[0075] The transaction release module 100 is used to invoke the proxy contract in the proxy firewall after the user publishes the transaction, and the proxy firewall performs a security check on the parameter content of the transaction according to the preset security strategy;
[0076] Specifically, for the transaction release module 100, the user issues a transaction to call the proxy firewall contract, and the proxy firewall checks the transaction parameters according to the security policy, such as whether the sender's address is in the blacklist of the protection policy library.
[0077] The smart contract calling module 200 is used to change the source address of the transaction to the address of the proxy contract by the proxy firewall after passing the security check, and issue the transaction to the target smart c...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com