Proxy firewall protection method and system for smart contract

A technology of smart contracts and protection systems, applied in transmission systems, digital transmission systems, data processing applications, etc., can solve problems such as inability to know, inability to guarantee testability, and inability to protect smart contracts, ensuring transaction security and efficiency. And the effect of timely access control

Active Publication Date: 2020-09-11
GUANGZHOU UNIVERSITY
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, during the research and practice of the existing technology, the inventors of the present invention found that the existing smart contract security technology has the following defects: the mutual calling of smart contracts leads to unknown code execution space, and it is impossible to ensure sufficient Testability; first, unknown external functions can be called in smart contracts
For example, if a smart contract uses the call function to perform a transfer operation, the transfer operation will call the fallback function of the transferred address by default, and it is impossible to know whether there is an unsafe code similar to a circular call in the fallback function of the other party before the smart contract is chained; Secondly, the smart contract firewall needs to insert code into the protected smart contract before going to the chain. Smart contract developers need to introduce a library file provided by the existing smart contract firewall when writing a smart contract to realize the security management of the contract ; and the protection scheme of the smart contract cannot be changed after it is on the chain, and the unprotected smart contract that has been on the chain cannot be protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy firewall protection method and system for smart contract
  • Proxy firewall protection method and system for smart contract
  • Proxy firewall protection method and system for smart contract

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] see Figure 1-3 .

[0046] Such as figure 1 As shown, this embodiment provides a proxy firewall protection method for smart contracts, at least including the following steps:

[0047] S101. After the user publishes the transaction, the proxy contract in the proxy firewall is invoked, and the proxy firewall performs a security check on the parameter content of the transaction according to the preset security policy;

[0048] Specifically, for step S101, the user issues a transaction to call the proxy firewall contract, and the proxy firewall checks the parameter content of the transaction according to the security policy, such as whether the sender's address is in the blacklist of the protection policy library.

[0049] It should be noted that a transaction is a data structure of the blockchain and mainly includes the following main fields: Type: the type of transaction, ContractCreation (creating a contract) or MessageCall (calling a contract or transferring money); N...

no. 2 example

[0073] see Figure 4-5 .

[0074] Such as Figure 4As shown, this embodiment provides a proxy firewall protection system for smart contracts, including:

[0075] The transaction release module 100 is used to invoke the proxy contract in the proxy firewall after the user publishes the transaction, and the proxy firewall performs a security check on the parameter content of the transaction according to the preset security strategy;

[0076] Specifically, for the transaction release module 100, the user issues a transaction to call the proxy firewall contract, and the proxy firewall checks the transaction parameters according to the security policy, such as whether the sender's address is in the blacklist of the protection policy library.

[0077] The smart contract calling module 200 is used to change the source address of the transaction to the address of the proxy contract by the proxy firewall after passing the security check, and issue the transaction to the target smart c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a proxy firewall protection method and system for a smart contract, and the method comprises the steps that a proxy contract in a proxy firewall is called after a user publishes a transaction, and the proxy firewall carries out the safety check of the parameter content of the transaction according to a safety strategy; after the security check is passed, the proxy firewallchanges the source address of the transaction into the address of the proxy contract, and issues the transaction to the target smart contract, so that the proxy firewall calls the target smart contract; after the calling of the target intelligent contract is completed, the proxy firewall updates the transaction execution result to the transaction content and returns the transaction execution result to the proxy contract; and the updated transaction is issued to the user address through the proxy contract, so that the proxy firewall transmits a transaction execution result to the user, and calling of the proxy contract is completed. A calling interface is provided between the user and the target contract through the proxy firewall, safe calling of the intelligent contract is achieved, and the transaction safety of a contract publisher and a caller is improved.

Description

technical field [0001] The invention relates to the field of electronics and computer information technology, in particular to a proxy firewall protection method and system for smart contracts. Background technique [0002] Blockchain is a form of distributed ledger technology, and since the introduction of digital currency, blockchain has received a lot of attention and application. Blockchain was originally introduced for peer-to-peer payments, but has recently been extended to allow programmable transactions in the form of smart contracts. Smart contracts are programs that can be collectively executed by a network of mutually distrusting nodes that implement a consensus protocol (such as proof-of-work or proof-of-stake) and are digitally enforced. [0003] Since smart contracts are entrusted by users to process and transfer assets of considerable value, they are subject to intensive hacking activity. This kind of hacking is more dangerous than traditional network system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q40/04
CPCH04L63/0281H04L63/0227H04L63/20G06Q40/04H04L63/1425H04L9/50
Inventor 田志宏杜莎莎苏申林炼升曾标孙彦斌姜誉鲁辉
Owner GUANGZHOU UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products