CN111884808A - Method and device for preventing cross-chain replay of transaction and electronic equipment - Google Patents
Method and device for preventing cross-chain replay of transaction and electronic equipment Download PDFInfo
- Publication number
- CN111884808A CN111884808A CN202010697255.3A CN202010697255A CN111884808A CN 111884808 A CN111884808 A CN 111884808A CN 202010697255 A CN202010697255 A CN 202010697255A CN 111884808 A CN111884808 A CN 111884808A
- Authority
- CN
- China
- Prior art keywords
- transaction
- abstract
- initial
- calculating
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the specification relates to a method, a device and electronic equipment for preventing cross-chain replay of transactions, and the method, the device and the electronic equipment mainly comprise the following steps: calculating a first transaction initial abstract according to transaction content to be signed; calculating a transaction summary according to the first transaction initial summary and the created block summary; signing the transaction digest and sending a transaction; calculating a second transaction initial abstract according to the transaction content in the received signature transaction; calculating a verification transaction abstract according to the second transaction initial abstract and the innovation block abstract; and verifying the validity of the transaction according to the verification transaction abstract and the transaction signature. In the process of constructing a transaction by a user, transaction contents and the summary of the created blocks need to be participated in calculating the transaction summary, and the user signs according to the obtained transaction summary. When the node checks the signature, the node also needs to verify the summary containing the creation block, so that the problem of cross-chain replay of the transaction is economically and conveniently solved.
Description
Technical Field
The embodiment of the specification relates to the technical field of networks, in particular to a method and a device for preventing cross-link replay of transactions and electronic equipment.
Background
In a federation chain, there are multiple privatized deployed federation chains. For example, participant M may be simultaneously in two different federation chains, chain-a and chain-B, where M has both participation and permission to send transactions in both blockchain systems. If the participant M uses the same private key in both chains, the transaction sent by the participant M in chain-A may be taken to chain-B for replay by a malicious attacker, so that it cannot be judged for chain-B whether the transaction is actively issued by M or cross-chain replay by the malicious attacker.
One existing solution is to add a field, such as a field for adding a chain ID (chain _ ID) to a transaction, where the chain ID is initially randomly generated when the chain ID is privatized for deployment, and then is solidified into a founder block and is not allowed to be modified. The chain replay of the transaction is prevented by adding a chain _ id field in the transaction, a user specifies the chain _ id when the transaction is sent, and a node judges whether the chain _ id is matched or not when the transaction is received. This approach has two disadvantages, that is, if the range of chain _ id is not large enough, collision is easy to occur, and at the same time, the increase of chain _ id in transaction makes transaction volume larger, increasing the burden of storage and communication.
Disclosure of Invention
The embodiment of the specification provides a method and a device for preventing transaction cross-chain replay and electronic equipment, and the method and the device are used for solving the problem of how to conveniently and accurately prevent transaction cross-chain replay in the prior art.
In order to solve the above technical problem, the embodiments of the present specification adopt the following technical solutions:
in a first aspect, a method for preventing cross-chain replay of transactions is provided, which is applied to a blockchain system, and the method includes:
calculating a first transaction initial abstract according to transaction content to be signed;
calculating a transaction summary according to the first transaction initial summary and the created block summary;
signing the transaction digest and sending a transaction;
calculating a second transaction initial abstract according to the transaction content in the received signature transaction;
calculating a verification transaction abstract according to the second transaction initial abstract and the innovation block abstract;
and verifying the validity of the transaction according to the verification transaction abstract and the transaction signature.
In a second aspect, there is provided an apparatus for preventing cross-chain replay of transactions, applied to a blockchain system, the apparatus comprising:
a first transaction initial summarization module: the system comprises a first transaction initial abstract calculation module, a second transaction initial abstract calculation module and a signature generation module, wherein the first transaction initial abstract calculation module is used for calculating a first transaction initial abstract according to transaction contents to be signed;
a transaction summarization module: calculating a transaction summary according to the first transaction initial summary and the created block summary;
a signature module: for signing the transaction digest and sending the transaction;
the second transaction initial summarization module: calculating a second transaction initial abstract according to the transaction content in the received signature transaction;
a verification transaction summary module: calculating a verification transaction abstract according to the second transaction initial abstract and the innovation block abstract;
a verification module: and verifying the validity of the transaction according to the verification transaction abstract and the transaction signature.
In a third aspect, an electronic device is provided, including: one or more processors and memory, wherein the memory contains one or more computer programs executable by the one or more processors to cause the one or more processors to perform a method of preventing cross-chain replay of transactions provided in accordance with embodiments of the present invention.
In a fourth aspect, the present invention also provides a storage medium storing a computer program, the computer program causing a computer to execute the method for preventing cross-chain replay of transactions provided according to the embodiments of the present invention.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects: in the process of constructing a transaction by a user, transaction content and the summary of the created blocks need to be participated in calculating the transaction summary, and the user signs according to the obtained transaction summary. When the node checks the signature, the node also needs to verify the summary containing the creation block, so that the problem of cross-chain replay of the transaction is economically and conveniently solved. Meanwhile, extra fields such as chain ID and the like are not needed to be contained in the transaction, so that extra storage and communication space is not wasted.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative efforts.
FIG. 1 is a schematic diagram illustrating steps of a method for preventing cross-chain replay of transactions according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an apparatus for preventing cross-chain replay of transactions according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without any creative effort belong to the protection scope of the embodiments in the present specification.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Example one
Referring to fig. 1, a schematic diagram of steps of a method for preventing a transaction from being replayed across a chain according to an embodiment of the present disclosure is applied to a blockchain system, where the method includes:
step 101: calculating a first transaction initial abstract according to transaction content to be signed;
step 102: calculating a transaction summary according to the first transaction initial summary and the created block summary;
step 103: signing the transaction digest and sending a transaction;
step 104: calculating a second transaction initial abstract according to the transaction content in the received signature transaction;
step 105: calculating a verification transaction abstract according to the second transaction initial abstract and the innovation block abstract;
step 106: and verifying the validity of the transaction according to the verification transaction abstract and the transaction signature.
It should be noted that the created block summary may include one or more of a timestamp, an initial consensus list, a blockchain identifier, and an initial configuration parameter of the created block. Therefore, the uniqueness of the initial fast summary is ensured, and the probability of repetition of the initial fast summary information is almost zero in the normal block chain operation process.
The method further comprises the steps of setting an RPC interface for the block chain system, and calling the RPC interface to obtain the created block abstract. The user may therefore obtain a summary of the foundational blocks of the chain before sending the transaction. When calculating the transaction abstract, a first transaction initial abstract is calculated according to the transaction content to be signed, then a creature block abstract is added to the first transaction initial abstract to newly calculate a final transaction abstract, and then transaction signing and sending are carried out.
The node needs a new verification signature rule in all protocols that need to verify the validity of the transaction: after receiving the transaction sent by the trader, the node calculates a second original transaction abstract according to the transaction content, and calculates a verification transaction abstract together with the creature block abstract, and verifies the validity of the transaction according to the verification transaction abstract and the transaction signature.
Further, when the transaction is verified to be legal according to the verification transaction abstract and the transaction signature, the transaction enters a transaction pool;
when a transaction is verified as illegal based on the verification transaction digest and transaction signature, the transaction may be a forgery or a cross-chain replay from other chains, and the transaction is terminated.
Meanwhile, the same transaction verification rule is also required to be followed in the block verification of the consensus protocol, and if the block does not conform to the transaction verification rule, the block can be considered as illegal and includes forged transactions or cross-chain replayed transactions. When a node receives a transaction forwarded by other nodes, the transaction verification rule also needs to be followed.
According to the technical scheme, in the process of constructing the transaction by the user, the transaction content and the summary of the created blocks need to be involved in calculating the transaction summary, and the user signs according to the obtained transaction summary. When the node checks the signature, the node also needs to verify the summary containing the creation block, so that the problem of cross-chain replay of the transaction is economically and conveniently solved. Meanwhile, extra fields such as chain ID and the like are not needed to be contained in the transaction, so that extra storage and communication space is not wasted.
Example two
Referring to fig. 2, a schematic structural diagram of an apparatus for preventing transaction cross-chain replay provided in an embodiment of the present disclosure is applied to a blockchain system, and the apparatus mainly includes:
first transaction initiation summary module 201: the system comprises a first transaction initial abstract calculation module, a second transaction initial abstract calculation module and a signature generation module, wherein the first transaction initial abstract calculation module is used for calculating a first transaction initial abstract according to transaction contents to be signed;
transaction summary module 202: calculating a transaction summary according to the first transaction initial summary and the created block summary;
the signature module 203: for signing the transaction digest and sending the transaction;
second transaction initiation summary module 204: calculating a second transaction initial abstract according to the transaction content in the received signature transaction;
validate transaction summary module 205: calculating a verification transaction abstract according to the second transaction initial abstract and the innovation block abstract;
the verification module 206: and verifying the validity of the transaction according to the verification transaction abstract and the transaction signature.
Optionally, when the verification module verifies that the transaction is legal, the transaction enters a transaction pool; when the verification module verifies that the transaction is illegal, the transaction is terminated.
Optionally, the device further includes an RPC interface, and the created block abstract is obtained by calling the RPC interface.
Optionally, the created block summary includes one or more of a timestamp, an initial consensus list, a blockchain identification, and an initial configuration parameter of the created block.
According to the technical scheme, in the process of constructing the transaction by the user, the transaction content and the summary of the created blocks need to be involved in calculating the transaction summary, and the user signs according to the obtained transaction summary. When the node checks the signature, the node also needs to verify the summary containing the creation block, so that the problem of cross-chain replay of the transaction is economically and conveniently solved. Meanwhile, extra fields such as chain ID and the like are not needed to be contained in the transaction, so that extra storage and communication space is not wasted.
It should be understood that the apparatus described in the second embodiment may execute all technical solutions related to the method for preventing transaction cross-link replay in the form of a functional module, and implement corresponding technical effects, which are not described herein again.
EXAMPLE III
The electronic apparatus of the embodiment of the present specification is described in detail below with reference to fig. 3. Referring to fig. 3, at a hardware level, the electronic device includes one or more processors and a memory. Optionally, an internal bus and a network interface are also included. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a Non-Volatile Memory (Non-Volatile Memory), such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be interconnected by an internal bus, which may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an extended EISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 3, but this does not indicate only one bus or one type of bus.
A memory for storing a computer program. In particular, the computer program may comprise program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program, and the device for preventing the transaction from crossing the chain is formed on the logic level. The processor executes the program stored in the memory, and is specifically used for executing the method operations executed when the transaction cross-link replay device is taken as an execution subject.
The method performed by the apparatus according to the embodiment shown in fig. 1 of the present specification may be implemented in or by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The methods, steps, and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
Of course, besides the software implementation, the electronic device of the embodiment of the present disclosure does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
According to the technical scheme, in the process of constructing the transaction by the user, the transaction content and the summary of the created blocks need to be involved in calculating the transaction summary, and the user signs according to the obtained transaction summary. When the node checks the signature, the node also needs to verify the summary containing the creation block, so that the problem of cross-chain replay of the transaction is economically and conveniently solved. Meanwhile, extra fields such as chain ID and the like are not needed to be contained in the transaction, so that extra storage and communication space is not wasted.
Example four
The present specification embodiments also provide a storage medium storing a computer program, the computer readable storage medium storing one or more programs for use by a processor in performing the method for preventing transaction cross-chain replay described herein.
According to the technical scheme, in the process of constructing the transaction by the user, the transaction content and the summary of the created blocks need to be involved in calculating the transaction summary, and the user signs according to the obtained transaction summary. When the node checks the signature, the node also needs to verify the summary containing the creation block, so that the problem of cross-chain replay of the transaction is economically and conveniently solved. Meanwhile, extra fields such as chain ID and the like are not needed to be contained in the transaction, so that extra storage and communication space is not wasted.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present specification shall be included in the protection scope of the present specification.
The system, apparatus, module or unit illustrated in one or more of the above embodiments may be implemented by a computer chip or an entity, or by an article of manufacture with a certain functionality. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Claims (10)
1. A method for preventing cross-chain replay of transactions, applied to a blockchain system, the method comprising:
calculating a first transaction initial abstract according to transaction content to be signed;
calculating a transaction summary according to the first transaction initial summary and the created block summary;
signing the transaction digest and sending a transaction;
calculating a second transaction initial abstract according to the transaction content in the received signature transaction;
calculating a verification transaction abstract according to the second transaction initial abstract and the innovation block abstract;
and verifying the validity of the transaction according to the verification transaction abstract and the transaction signature.
2. The method of claim 1, further comprising: when the transaction is verified to be legal according to the verification transaction abstract and the transaction signature, the transaction enters a transaction pool;
and when the transaction is verified to be illegal according to the verification transaction abstract and the transaction signature, the transaction is terminated.
3. The method of claim 2, further comprising: and setting an RPC interface for the block chain system, and calling the RPC interface to acquire the created block abstract.
4. The method of claims 1-3, further comprising: the created block summary comprises one or more of a timestamp, an initial consensus list, a blockchain identification, and initial configuration parameters of the created block.
5. An apparatus for preventing cross-chain replay of transactions, applied to a blockchain system, the apparatus comprising:
a first transaction initial summarization module: the system comprises a first transaction initial abstract calculation module, a second transaction initial abstract calculation module and a signature generation module, wherein the first transaction initial abstract calculation module is used for calculating a first transaction initial abstract according to transaction contents to be signed;
a transaction summarization module: calculating a transaction summary according to the first transaction initial summary and the created block summary;
a signature module: for signing the transaction digest and sending the transaction;
the second transaction initial summarization module: calculating a second transaction initial abstract according to the transaction content in the received signature transaction;
a verification transaction summary module: calculating a verification transaction abstract according to the second transaction initial abstract and the innovation block abstract;
a verification module: and verifying the validity of the transaction according to the verification transaction abstract and the transaction signature.
6. The apparatus of claim 5, further comprising: when the verification module verifies that the transaction is legal, the transaction enters a transaction pool;
when the verification module verifies that the transaction is illegal, the transaction is terminated.
7. The apparatus of claim 6, further comprising an RPC interface, the founder block digest obtained by invoking the RPC interface.
8. The apparatus of claims 5-7, further comprising: the created block summary comprises one or more of a timestamp, an initial consensus list, a blockchain identification, and initial configuration parameters of the created block.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-4.
10. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010697255.3A CN111884808B (en) | 2020-07-20 | 2020-07-20 | Method and device for preventing transaction cross-chain replay and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010697255.3A CN111884808B (en) | 2020-07-20 | 2020-07-20 | Method and device for preventing transaction cross-chain replay and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111884808A true CN111884808A (en) | 2020-11-03 |
CN111884808B CN111884808B (en) | 2023-06-23 |
Family
ID=73154974
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010697255.3A Active CN111884808B (en) | 2020-07-20 | 2020-07-20 | Method and device for preventing transaction cross-chain replay and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111884808B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112749966A (en) * | 2021-01-07 | 2021-05-04 | 中国工商银行股份有限公司 | Transaction replay detection method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109308211A (en) * | 2018-09-11 | 2019-02-05 | 上海点融信息科技有限责任公司 | For handling the method, apparatus and storage medium of Transaction Information in block chain |
CN109639410A (en) * | 2018-10-31 | 2019-04-16 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN110046901A (en) * | 2018-12-28 | 2019-07-23 | 阿里巴巴集团控股有限公司 | Reliability verification method, system, device and the equipment of alliance's chain |
CN110222529A (en) * | 2019-05-21 | 2019-09-10 | 平安普惠企业管理有限公司 | Assets management method, electronic equipment and computer storage medium based on alliance's chain |
CN110674128A (en) * | 2018-07-02 | 2020-01-10 | 国际商业机器公司 | On-chain remediation of block chains |
US20200128043A1 (en) * | 2018-12-29 | 2020-04-23 | Alibaba Group Holding Limited | System and method for detecting replay attack |
-
2020
- 2020-07-20 CN CN202010697255.3A patent/CN111884808B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110674128A (en) * | 2018-07-02 | 2020-01-10 | 国际商业机器公司 | On-chain remediation of block chains |
CN109308211A (en) * | 2018-09-11 | 2019-02-05 | 上海点融信息科技有限责任公司 | For handling the method, apparatus and storage medium of Transaction Information in block chain |
CN109639410A (en) * | 2018-10-31 | 2019-04-16 | 阿里巴巴集团控股有限公司 | Data based on block chain deposit card method and device, electronic equipment |
CN110046901A (en) * | 2018-12-28 | 2019-07-23 | 阿里巴巴集团控股有限公司 | Reliability verification method, system, device and the equipment of alliance's chain |
US20200128043A1 (en) * | 2018-12-29 | 2020-04-23 | Alibaba Group Holding Limited | System and method for detecting replay attack |
CN110222529A (en) * | 2019-05-21 | 2019-09-10 | 平安普惠企业管理有限公司 | Assets management method, electronic equipment and computer storage medium based on alliance's chain |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112749966A (en) * | 2021-01-07 | 2021-05-04 | 中国工商银行股份有限公司 | Transaction replay detection method and device |
CN112749966B (en) * | 2021-01-07 | 2024-02-02 | 中国工商银行股份有限公司 | Transaction replay detection method and device |
Also Published As
Publication number | Publication date |
---|---|
CN111884808B (en) | 2023-06-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11438165B2 (en) | Method and apparatus for processing transaction requests | |
CN110570196B (en) | Transaction data processing method, device, terminal equipment and storage medium | |
CN111092724A (en) | Block chain system digital certificate issuing method, equipment, system and medium | |
CN110020859B (en) | Parallel execution block chain consensus method and device and electronic equipment | |
CN110874650B (en) | Alliance learning method, device and system fusing public domain data and private data | |
CN113810465B (en) | Asynchronous binary consensus method and device | |
CN112235278A (en) | Method and device for monitoring address information of trader and electronic equipment | |
CN111639308A (en) | Software serial number distribution verification method and device based on block chain | |
CN111461886B (en) | Management method and device for system configuration independent of intelligent contracts on block chains | |
CN111698244A (en) | Method and device for rapidly participating in consensus of newly added nodes and electronic equipment | |
CN113783708A (en) | Re-voting binary consensus method and device based on reliable broadcast | |
CN113794576B (en) | Re-voting binary consensus method and device | |
CN111523887A (en) | Authority control method and device of intelligent contract read-only method and electronic equipment | |
CN115118423A (en) | Consensus method and device for trusted block chain and trusted block chain system | |
CN110874647A (en) | Private data evaluation and league learning method, device and system in league learning | |
CN111884808A (en) | Method and device for preventing cross-chain replay of transaction and electronic equipment | |
CN108710658B (en) | Data record storage method and device | |
CN110704134A (en) | Method and device for performing function expansion on block chain | |
CN113407156B (en) | Method and system for generating random number based on decentralized verifiable delay function | |
CN110009348B (en) | Block chain proxy signature method and system and electronic equipment | |
CN112465642A (en) | Method and system for realizing block chain transaction based on state channel | |
CN111209593A (en) | Block chain-based distributed lock processing method, related device and electronic equipment | |
CN111030826A (en) | Certificate revocation method and device for block chain network and electronic equipment | |
CN110648123A (en) | Digital asset construction method and device and electronic equipment | |
CN113779155B (en) | Block chain transaction processing method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 2339, 2nd Floor, No. 92, Huancheng North Road, Gongshu District, Hangzhou City, Zhejiang Province 310005 Applicant after: Hangzhou Xita Technology Co.,Ltd. Address before: 310000 No. 1001, floor 10, tower a, Huaxing Times Square, No. 478, Wensan Road, Xihu District, Hangzhou, Zhejiang Province Applicant before: Hangzhou Xita Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |