CN111628998A - Dust attack prevention method - Google Patents

Dust attack prevention method Download PDF

Info

Publication number
CN111628998A
CN111628998A CN202010457482.9A CN202010457482A CN111628998A CN 111628998 A CN111628998 A CN 111628998A CN 202010457482 A CN202010457482 A CN 202010457482A CN 111628998 A CN111628998 A CN 111628998A
Authority
CN
China
Prior art keywords
transaction
dust
threshold
accounting
accounting node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010457482.9A
Other languages
Chinese (zh)
Other versions
CN111628998B (en
Inventor
田新雪
李宁
肖征荣
马书惠
杨子文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010457482.9A priority Critical patent/CN111628998B/en
Publication of CN111628998A publication Critical patent/CN111628998A/en
Application granted granted Critical
Publication of CN111628998B publication Critical patent/CN111628998B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a dust attack prevention method, wherein if alarm information broadcasted by other accounting nodes in a block chain where the accounting node is located is received, transaction amount, a dust attack alarm mark and a payee identification carried in the alarm information are obtained, the alarm information is broadcasted when the other accounting nodes judge that the transaction amount of the transaction is dust, if the accounting node is determined to be the payee of the transaction according to the payee identification, a first wallet and a second wallet with different addresses are locally arranged, and dust money of the accounting node transacted by the other accounting nodes is placed in the first wallet. The method provided by the embodiment of the invention can isolate the assets of the possibly attacked address from the assets of other addresses when the accounting node is transacted with dust, thereby effectively preventing dust attack and improving the security of the block chain transaction.

Description

Dust attack prevention method
Technical Field
The invention relates to the technical field of block chains, in particular to a dust attack prevention method and a dust attack prevention device.
Background
"dust" means a small number of bits (e.g., 1 clever is "dust" and it has only 0.00000001 bits). Typically, very few people will have that small transaction amount because the transaction commission already exceeds the transaction amount. Just because "dust" is so small that it is easily ignored by the user, this phenomenon is noticed by small blacks (fraudsters) which turn "dust" into the user's wallet address without drawing the attention of the user who received the "dust" who received it but had not yet spent it, so these "dust" are mixed with UTXO (unpaid transaction Output) in the user's original wallet address. These "dusts" may be used when money is used in large transfers to other addresses or other transactions, and may travel silently to other user addresses following large transactions and be tracked. These "dusts" are just like fluorescent agents, describing the behavior of the user's whites by one-five-ten, and are traced by the small blacks, which use these clues to guess the identity of the whites, and thus threaten and strangle the whites. This is a dust attack.
The real problem is that the large white uses the non-cost money mixed with the 'dust', if the large white does not cost the money, the 'dust' cannot run, and the small black cannot track, however, the large white cannot require the large white because the 'dust' never costs other non-cost money in the pool, and therefore some methods are needed to solve the danger caused by the dust attack.
Disclosure of Invention
Therefore, the invention provides a dust attack prevention method and a dust attack prevention device, which aim to solve the problem of dust attack caused by dust trading in the prior art.
In order to achieve the above object, a first aspect of the present invention provides a dust attack prevention method:
if alarm information broadcasted by other accounting nodes in a block chain where the accounting node is located is received, acquiring transaction amount, a dust attack alarm mark and a payee identification carried in the alarm information, wherein the alarm information is broadcasted when the other accounting nodes judge that the transaction amount of the transaction is dust;
and if the accounting node is determined to be the payee of the transaction according to the payee identification, setting a first wallet and a second wallet with different addresses locally, and placing the dust money of the other accounting nodes transacted to the accounting node in the first wallet.
Preferably, the method further comprises:
and if the fact that the transaction amount of the accounting node as the payer is larger than a first transaction threshold value and smaller than a dust threshold value is detected, broadcasting an alarm message in a block chain, wherein the alarm message comprises the transaction amount, a dust attack alarm mark and a payee identification, and the dust threshold value is larger than the first transaction threshold value.
Preferably, the method further comprises:
and if the transaction amount of the accounting node as the payer is smaller than the first transaction threshold value, the transaction is not written into the block chain account book.
Preferably, the first trading threshold is determined according to the lowest value of the mine excavation rewards of the accounting node.
Preferably, the method further comprises:
if the transaction amount is greater than a second transaction threshold, writing the transaction into a blockchain account book, and using the currency in the second wallet to conduct transaction, wherein the second transaction threshold is greater than a dust threshold.
The invention provides a second aspect of accounting node, which is characterized in that the accounting node comprises a receiving module, an obtaining module and a first processing module;
the receiving module is used for receiving the alarm message broadcast by other accounting nodes in the block chain where the accounting node is located;
the acquisition module is used for acquiring the transaction amount, the dust attack alarm mark and the payee identification carried in the alarm message, wherein the alarm message is broadcast when the other accounting nodes judge that the transaction amount of the transaction is dust;
and the first processing module is used for locally setting a first wallet and a second wallet with different addresses if the accounting node is determined to be the payee of the transaction according to the payee identification, and placing the dust currency of the other accounting nodes transacted to the accounting node in the first wallet.
Preferably, the accounting node further includes a second processing module, where the second processing module is configured to broadcast an alarm message in the blockchain if it is detected that the transaction amount of the accounting node as the payer is greater than the first transaction threshold and smaller than the dust threshold, where the alarm message includes the transaction amount, the dust attack alarm flag, and the payee identifier, and the dust threshold is greater than the first transaction threshold.
Preferably, the second processing module is further configured to, if it is detected that the transaction amount of the accounting node as the payer is smaller than the first transaction threshold, not write the transaction into the blockchain ledger.
Preferably, the first trading threshold is determined according to the lowest value of the mine excavation rewards of the accounting node.
Preferably, the second processing module is further configured to, if the transaction amount is greater than a second transaction threshold value, write the transaction into a blockchain ledger and perform a transaction using the currency in the second wallet, where the second transaction threshold value is greater than a dust threshold value.
The invention has the following advantages:
according to the dust attack prevention method provided by the embodiment of the invention, if alarm information broadcasted by other accounting nodes in a block chain where the accounting node is located is received, the transaction amount, the dust attack alarm mark and the payee identification carried in the alarm information are obtained, the alarm information is broadcasted when the other accounting nodes judge that the transaction amount of the transaction is dust, if the accounting node is determined to be the payee of the transaction according to the payee identification, a first wallet and a second wallet with different addresses are locally arranged, and dust money of the accounting node transacted by the other accounting nodes is placed in the first wallet. The method provided by the embodiment of the invention can isolate the assets of the possibly attacked address from the assets of other addresses when the accounting node is transacted with dust, thereby effectively preventing dust attack and improving the security of the block chain transaction.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a first schematic flow chart of a dust attack prevention method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a dust attack prevention method according to an embodiment of the present invention;
FIG. 3 is a first schematic structural diagram of an accounting node according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a billing node according to an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
A blockchain is a decentralized database that contains a list of what are called blocks, with records that are growing and aligned. Each tile contains a timestamp and a link to the previous tile: the blockchain is designed so that the data is not tampered, and once recorded, the data in a block is not reversible. The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The consensus mechanism is a mathematical algorithm for establishing trust and obtaining rights and interests among different nodes in the blockchain system. The Blockchain (Blockchain) is an important concept of the bit coins, and the firecoin network is combined with an internet financial laboratory of the five-crossing financial institute of Qinghua university and a global bit coin development research report 2014-2016 issued by Xinghao science and technology to mention that the Blockchain is a bottom layer technology and a basic framework of the bit coins, is essentially a decentralized database and is used as the bottom layer technology of the bit coins. The block chain is a series of data blocks which are associated by using a cryptographic method, and each data block contains information of one bitcoin network transaction, so that the validity (anti-counterfeiting) of the information is verified and the next block is generated. In a narrow sense, the blockchain is a distributed account book which is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence and is guaranteed in a cryptographic mode and cannot be tampered and forged. Broadly, the blockchain technique is a completely new distributed infrastructure and computing that utilizes blockchain data structures to verify and store data, distributed node consensus algorithms to generate and update data, cryptographic means to secure data transmission and access, and intelligent contracts composed of automated script code to program and manipulate data. Blockchain design is a protective measure, such as (applied to) highly fault-tolerant distributed computing systems. The blockchain enables mixed consistency, and is suitable for recording events, titles, medical records and other activities requiring data inclusion, identification management, transaction flow management and provenance management. The blockchain has huge potential for financial off-media and has huge influence on leading global trade. The concept of blockchains was first proposed by the mingent in 2008, and in the following years, bitcoins became the core component of electronic money: as a common ledger for all transactions, the blockchain database can be managed autonomously by using a peer-to-peer network and a distributed timestamp server, and the blockchain invented for bitcoin makes bitcoin the first digital currency to solve the problem of repeated consumption, and the design of bitcoin has become an inspiration source for other applications.
As shown in fig. 1, an embodiment of the present invention provides a method for preventing dust attack, which may include the following steps:
and 11, if receiving the alarm information broadcast by other accounting nodes in the block chain where the accounting node is located, acquiring the transaction amount, the dust attack alarm mark and the payee identification carried in the alarm information, wherein the alarm information is broadcast when the other accounting nodes judge that the transaction amount of the transaction is dust.
In this step, if a certain accounting node detects that the transaction amount of the transaction of this time, which is taken as a payer, is dust, the alarm message is broadcasted in the block chain in a broadcast message mode of private key signature. Therefore, when the accounting node receives the alarm message broadcast by other accounting nodes in the block chain, the public key of the other accounting nodes can be used for verifying the alarm message, and after the verification is passed, the transaction amount, the dust attack alarm mark and the payee identification carried in the alarm message are obtained. The accounting node can determine the transaction amount of the transaction between the other accounting nodes and the accounting node corresponding to the payee identification as dust according to the dust attack alarm mark.
And 12, if the accounting node is determined to be the payee of the transaction according to the payee identification, locally setting a first wallet and a second wallet with different addresses, and placing the dust currency of the accounting node transacted by other accounting nodes into the first wallet.
In this step, if the accounting node finds that the payee identifier carried in the alarm message is the identifier of the accounting node itself, and can determine that the transaction amount of the transaction between the other accounting node and the accounting node is dust, a dust attack precaution measure needs to be taken, that is, two purses with different addresses are locally set, and the dust currency transacted by the other accounting node and the UTXO are placed in different purses. The isolation management among the addresses corresponding to each wallet isolates the assets of the possibly attacked address from the assets of other addresses. In the subsequent transaction process, the accounting node can continue to use the UTXO, and dust is not needed to be entrained when the UTXO is used, so that dust attack to the accounting node by a fraudster is effectively prevented.
It should be noted that, the embodiments of the present invention do not specifically limit the setting of several wallets with different addresses. For example, three purses with different addresses may be provided, the first to hold dust currency, the second to hold unusually large amounts, and the third to hold small amounts that require frequent transactions. As long as only the money in the two purses is used in the subsequent transaction, the dust attack can be effectively prevented.
As can be seen from steps 11 to 12, in the dust attack prevention method provided in the embodiment of the present invention, if an alarm message broadcasted by another accounting node in the block chain where the accounting node is located is received, the transaction amount, the dust attack alarm flag, and the payee identifier carried in the alarm message are obtained, the alarm message is broadcasted when the other accounting node determines that the transaction amount of the current transaction is dust, and if the accounting node is determined to be the payee of the current transaction according to the payee identifier, the first wallet and the second wallet having different addresses are locally set, and the dust money transacted to the accounting node by the other accounting node is placed in the first wallet. The method provided by the embodiment of the invention can isolate the assets of the possibly attacked address from the assets of other addresses when the accounting node is transacted with dust, thereby effectively preventing dust attack and improving the security of the block chain transaction.
As shown in fig. 2, in some embodiments, the dust attack prevention method may further include the following steps:
step 21, detecting whether the transaction amount of the accounting node as the payer is larger than a first transaction threshold, if so, executing step 22, otherwise, executing step 25.
And step 22, detecting whether the transaction amount of the accounting node as a payer is smaller than a dust threshold, if so, executing step 23, and otherwise, executing step 24.
And step 23, broadcasting an alarm message in the block chain, wherein the alarm message comprises the transaction amount, the dust attack alarm mark and the payee identifier, and the dust threshold is greater than the first transaction threshold.
In this step, the accounting node in the blockchain may be locally provided with a money amount detection module to detect a size relationship between the transaction money amount of each transaction and the first transaction threshold and the dust threshold. If the accounting node detects that the accounting node serves as a payer and the transaction amount is larger than the first transaction threshold and smaller than the dust threshold in the transaction, the fact that the transaction amount is probably dust to a payee in the transaction of the accounting node means that the transaction amount, the dust attack alarm mark and the payee identification can be signed by using a private key of the accounting node, and then the alarm message carrying the information is broadcasted to a block chain so as to prompt the payee not to use the dust to conduct the transaction.
According to the dust attack prevention method provided by the embodiment of the invention, if the transaction amount of the bookkeeping node as the payer is larger than the first transaction threshold and smaller than the dust threshold, a warning is sent to the payee to prompt the payee not to use dust for transaction, the bookkeeping node of the payee can be prompted to take dust attack prevention measures, and the safety of block chain transaction is improved.
And 24, if the transaction amount is larger than a second transaction threshold value, writing the transaction into the blockchain account book, and performing transaction by using the currency in the second wallet, wherein the second transaction threshold value is larger than the dust threshold value.
In this step, the accounting nodes in the blockchain may agree to a consensus, set a lowest bottom line for the transfer transaction, i.e., a second transaction threshold value that is greater than the dust threshold value, and agree to pack the transaction into a new block only if the transaction amount is greater than the second transaction threshold value. And in subsequent transactions, only the money in the wallet except the first wallet is used for transactions, and the dust in the first wallet is forbidden for transactions.
According to the dust attack prevention method provided by the embodiment of the invention, when the transaction amount is larger than the second transaction threshold value, the transaction is written into the block chain account book, and the transaction is carried out only by using the currency in the second wallet, so that the transaction using dust is effectively avoided, and the safety of the block chain transaction is improved.
And step 25, if the transaction amount of the accounting node as the payer is detected to be smaller than the first transaction threshold, not writing the transaction into the block chain account book.
In this step, if the amount detection module of the accounting node in the transaction detects that the accounting node serves as a payer and the transaction amount is smaller than the first transaction threshold, the transaction may not be written into a new block, that is, into the block chain book.
According to the dust attack prevention method provided by the embodiment of the invention, if the transaction amount of the accounting node as a payer is smaller than the first transaction threshold, the transaction is not written into the block chain account book, and the accounting can be directly cancelled when the transaction amount is too low, so that the meaningless accounting operation is avoided, and the accounting efficiency is improved.
In some embodiments, in the dust attack prevention method provided by the present invention, the first transaction threshold is determined according to the lowest value of the mine excavation reward of the accounting node.
In an embodiment of the present invention, the first trading threshold may be a lowest baseline threshold, which may be determined by a lowest value of the mine excavation reward of the billing node. For example, the first transaction threshold may be proportional to the lowest value of the per-mine reward.
According to the dust attack prevention method provided by the embodiment of the invention, the first transaction threshold value is determined according to the lowest value of the mine excavation reward of the accounting node, so that the transaction is ensured to be accounted when the accounting node can obtain the mine excavation reward, the meaningless accounting operation is avoided, and the accounting efficiency is improved.
Based on the same inventive concept, the embodiment of the invention also provides a billing node which is applied to preventing dust attack. As shown in fig. 3, the accounting node may comprise a receiving module 100, an obtaining module 200 and a first processing module 300
The receiving module 100 is configured to receive an alarm message broadcast by other accounting nodes in the block chain where the accounting node is located.
The obtaining module 200 is configured to obtain a transaction amount, a dust attack alarm flag, and a payee identifier carried in the alarm message, where the alarm message is broadcast when the other accounting node determines that the transaction amount of the transaction is dust.
The first processing module 300 is configured to, if it is determined that the current accounting node is the current payee of the transaction according to the payee identifier, set a first wallet and a second wallet having different addresses locally, and place the dust currency of the transaction of the other accounting node to the current accounting node in the first wallet.
In some embodiments, as shown in fig. 4, the accounting node further includes a second processing module 400, where the second processing module 400 is configured to broadcast an alarm message in the blockchain if it is detected that the transaction amount of the accounting node as the payer is greater than the first transaction threshold and less than the dust threshold, where the alarm message includes the transaction amount, the dust attack alarm flag, and the payee identification, and the dust threshold is greater than the first transaction threshold.
In some embodiments, the second processing module 400 is further configured to, if it is detected that the transaction amount of the current accounting node as the payer is smaller than the first transaction threshold, not write the transaction into the blockchain ledger.
In some embodiments, the first transaction threshold is determined based on a lowest value of the mine excavation rewards of the current billing node.
In some embodiments, the second processing module 400 is further configured to write the transaction to the blockchain ledger and conduct the transaction using the currency within the second wallet if the transaction amount is greater than a second transaction threshold, the second transaction threshold being greater than the dust threshold.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (10)

1. A dust attack prevention method, comprising:
if alarm information broadcasted by other accounting nodes in a block chain where the accounting node is located is received, acquiring transaction amount, a dust attack alarm mark and a payee identification carried in the alarm information, wherein the alarm information is broadcasted when the other accounting nodes judge that the transaction amount of the transaction is dust;
and if the accounting node is determined to be the payee of the transaction according to the payee identification, setting a first wallet and a second wallet with different addresses locally, and placing the dust money of the other accounting nodes transacted to the accounting node in the first wallet.
2. The method of claim 1, further comprising:
and if the fact that the transaction amount of the accounting node as the payer is larger than a first transaction threshold value and smaller than a dust threshold value is detected, broadcasting an alarm message in a block chain, wherein the alarm message comprises the transaction amount, a dust attack alarm mark and a payee identification, and the dust threshold value is larger than the first transaction threshold value.
3. The method of claim 1, further comprising:
and if the transaction amount of the accounting node as the payer is smaller than the first transaction threshold value, the transaction is not written into the block chain account book.
4. The method according to claim 2 or 3, wherein the first trading threshold is determined according to a lowest value of the present accounting node mine reward.
5. The method of claim 1, further comprising:
if the transaction amount is greater than a second transaction threshold, writing the transaction into a blockchain account book, and using the currency in the second wallet to conduct transaction, wherein the second transaction threshold is greater than a dust threshold.
6. The accounting node is characterized by comprising a receiving module, an obtaining module and a first processing module;
the receiving module is used for receiving the alarm message broadcast by other accounting nodes in the block chain where the accounting node is located;
the acquisition module is used for acquiring the transaction amount, the dust attack alarm mark and the payee identification carried in the alarm message, wherein the alarm message is broadcast when the other accounting nodes judge that the transaction amount of the transaction is dust;
and the first processing module is used for locally setting a first wallet and a second wallet with different addresses if the accounting node is determined to be the payee of the transaction according to the payee identification, and placing the dust currency of the other accounting nodes transacted to the accounting node in the first wallet.
7. The accounting node of claim 6, further comprising a second processing module, wherein the second processing module is configured to broadcast an alarm message in the blockchain if it is detected that the transaction amount of the accounting node as the payer is greater than the first transaction threshold and less than a dust threshold, the alarm message including the transaction amount, the dust attack alarm flag, and the payee identification, and the dust threshold is greater than the first transaction threshold.
8. The accounting node of claim 6, wherein the second processing module is further configured to, if it is detected that the transaction amount of the accounting node as the payer is smaller than the first transaction threshold, not write the transaction into the blockchain account.
9. A billing node according to claim 7 or 8, characterized in that the first transaction threshold is determined according to the lowest value of the present billing node mine reward.
10. An accounting node as claimed in claim 6, wherein the second processing module is further configured to write the transaction to a blockchain ledger and to conduct transactions using currency within the second wallet if the transaction amount is greater than a second transaction threshold, the second transaction threshold being greater than a dust threshold.
CN202010457482.9A 2020-05-26 2020-05-26 Dust attack prevention method Active CN111628998B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010457482.9A CN111628998B (en) 2020-05-26 2020-05-26 Dust attack prevention method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010457482.9A CN111628998B (en) 2020-05-26 2020-05-26 Dust attack prevention method

Publications (2)

Publication Number Publication Date
CN111628998A true CN111628998A (en) 2020-09-04
CN111628998B CN111628998B (en) 2022-03-01

Family

ID=72260826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010457482.9A Active CN111628998B (en) 2020-05-26 2020-05-26 Dust attack prevention method

Country Status (1)

Country Link
CN (1) CN111628998B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653692A (en) * 2020-12-21 2021-04-13 中山大学 Adjustable dynamic defense mechanism for DDoS attack of bit currency memory pool

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5192486A (en) * 1990-03-30 1993-03-09 Fior De Venezuela Plant and process for fluidized bed reduction of ore
US5788078A (en) * 1993-08-02 1998-08-04 Free Flow Packaging Corporation Vacuum formed cushioning device and method of making and using the same
US20100188373A1 (en) * 2001-06-01 2010-07-29 Sony Corporation Information input device, and electronic apparatus using same
GB201607476D0 (en) * 2016-04-29 2016-06-15 Eitc Holdings Ltd Operating system for blockchain IOT devices
CN106533661A (en) * 2016-10-25 2017-03-22 北京大学 Online generation method for cryptographic currency address based on combined public key
US20180130050A1 (en) * 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management
CN108551454A (en) * 2018-04-23 2018-09-18 北京奇虎科技有限公司 Block chain attack cognitive method and device based on transaction stroke count
CN108885748A (en) * 2016-02-23 2018-11-23 区块链控股有限公司 Universal tokenization system for cryptocurrency of blockchains
CN110445755A (en) * 2019-07-04 2019-11-12 杭州复杂美科技有限公司 Hand over pregnable defence method, equipment and storage medium
CN111027947A (en) * 2019-12-06 2020-04-17 湖北文理学院 UTXO wallet selection method, UTXO wallet selection equipment, UTXO wallet storage medium and UTXO wallet selection device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5192486A (en) * 1990-03-30 1993-03-09 Fior De Venezuela Plant and process for fluidized bed reduction of ore
US5788078A (en) * 1993-08-02 1998-08-04 Free Flow Packaging Corporation Vacuum formed cushioning device and method of making and using the same
US20100188373A1 (en) * 2001-06-01 2010-07-29 Sony Corporation Information input device, and electronic apparatus using same
CN108885748A (en) * 2016-02-23 2018-11-23 区块链控股有限公司 Universal tokenization system for cryptocurrency of blockchains
GB201607476D0 (en) * 2016-04-29 2016-06-15 Eitc Holdings Ltd Operating system for blockchain IOT devices
CN106533661A (en) * 2016-10-25 2017-03-22 北京大学 Online generation method for cryptographic currency address based on combined public key
US20180130050A1 (en) * 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management
CN108551454A (en) * 2018-04-23 2018-09-18 北京奇虎科技有限公司 Block chain attack cognitive method and device based on transaction stroke count
CN110445755A (en) * 2019-07-04 2019-11-12 杭州复杂美科技有限公司 Hand over pregnable defence method, equipment and storage medium
CN111027947A (en) * 2019-12-06 2020-04-17 湖北文理学院 UTXO wallet selection method, UTXO wallet selection equipment, UTXO wallet storage medium and UTXO wallet selection device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
COBO钱包: "区块链安全篇——关于粉尘攻击的那些事儿", 《HTTPS://BAIJIAHAO.BAIDU.COM/S?ID=1650542008485859965&WFR=SPIDER&FOR=PC》 *
WEIJIE ZHAO: "Blockchain technology: development and prospects", 《NATIONAL SCIENCE REVIEW》 *
张绍成等: "区块链风险与安全问题研究――从技术架构的角度", 《辽宁大学学报(自然科学版)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653692A (en) * 2020-12-21 2021-04-13 中山大学 Adjustable dynamic defense mechanism for DDoS attack of bit currency memory pool

Also Published As

Publication number Publication date
CN111628998B (en) 2022-03-01

Similar Documents

Publication Publication Date Title
Gatteschi et al. To blockchain or not to blockchain: That is the question
JP7181232B2 (en) Blockchain for general computation
CN110020860B (en) Cross-chain asset transfer method, system and computer readable storage medium
CN110135186B (en) Medical data transaction and sharing method based on block chain technology
CN110008720B (en) Dynamic data tracing method and device for Internet of things based on alliance chain
CN106875254B (en) Android malicious application program control method based on block chain technology
Alblooshi et al. Blockchain-based ownership management for medical IoT (MIoT) devices
JP2020503579A (en) Blockchain-based method and system for specifying recipients of electronic communication
Zhao et al. A graph-based investigation of bitcoin transactions
Akcora et al. Blockchain: A graph primer
CN109274501A (en) License block chain method for secret protection based on Proxy Signature
CN111383114A (en) Asset information management method and device based on block chain
CN111402033A (en) Asset information management method and device based on block chain
US20210297242A1 (en) Method, device, and apparatus for processing distributed data, and medium
CN114549194A (en) Right asset management service platform based on block chain and implementation method thereof
CN111628998B (en) Dust attack prevention method
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
Zhao et al. Research on a shared bicycle deposit management system based on blockchain technology
Su et al. Analysis on the Impact of Blockchain Technology on the Accounting Profession
Abi Din et al. Boxer: Preventing fraud by scanning credit cards
EP3907968A1 (en) Method and system for blockchain intrusion prevention
CN115099800A (en) Block chain based method and device for transferring poor asset data
Xu et al. Exploring blockchain technology through a modular lens: A survey
CN113159940A (en) Transaction method, system and computer equipment for enhanced bit currency wallet
Antal et al. Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet 2021, 13, 62

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant