CN109743178B - Method and system for preventing block chain of block chain from being hijacked - Google Patents
Method and system for preventing block chain of block chain from being hijacked Download PDFInfo
- Publication number
- CN109743178B CN109743178B CN201811647133.2A CN201811647133A CN109743178B CN 109743178 B CN109743178 B CN 109743178B CN 201811647133 A CN201811647133 A CN 201811647133A CN 109743178 B CN109743178 B CN 109743178B
- Authority
- CN
- China
- Prior art keywords
- hash value
- transmission
- time
- value
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for preventing block chains of block chains from being hijacked, and the method comprises a transmission time detection unit, a transmission rate detection unit and a processing unit, wherein the processing unit receives the transmission time of hash values between the block chains detected by a transmission time detection unit, the transmission rate detection unit detects the transmission rate of the hash values, compares the transmission time with a set time threshold value, and judges whether the hash values between the block chains are hijacked or not according to a time comparison result and the transmission rate. The invention can effectively reduce the block chain transmission error between the block chains, improve the success rate of the block chain transmission, check the transmission time and the speed of the block chain, prevent the block chain transmission process from being lost or hijacked, match the hash value of the non-hijacked block chain with the successful transmission probability between the block chains, control the stability of the transmission between the block chains, simultaneously improve the transmission safety of the hash value in the block chain and improve the safety of the block chain.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a system for preventing a block chain of a block chain from being hijacked.
Background
In recent years, the block chain technology has been widely spread and applied due to its obvious characteristics of decentralization, non-tamper-ability, transparent process, traceability, and the like. In the practical application process of the block chain, a large amount of data is usually encountered, and after the data is verified, the data is written into the block chain maintained by the block chain link point network so as to realize the function of the block chain.
However, due to the continuous accumulation of the block chains, in the process of transmitting the hash value of the block chain, the hash value is easily lost in the transmission process of the block chain due to external hijacking, or data or transaction information between the block chains is not complete or the block chain is not stable due to the fact that some unsafe or wrong information is added between the block chains by the external hijacking, so how to prevent the loss of the hash value between the block chains or the insecurity of the transmission information between the block chains due to the hijacking of the block chains, which causes economic property loss, is a problem in the use and wide-range application of the block chains in the future.
Disclosure of Invention
The invention provides a method for preventing block chains of block chains from being hijacked, which comprises a transmission time detection unit, a transmission rate detection unit and a processing unit, wherein the processing unit receives the transmission time of hash values between the block chains detected by a transmission time detection unit, the transmission rate detection unit detects the transmission rate of the hash values, compares the transmission time with a set time threshold value, and judges whether the hash values between the block chains are hijacked or not according to a time comparison result and the transmission rate.
The method at least comprises two block chain nodes, namely a first block chain node and a second block chain node, a transmission state detection unit between the block chain nodes,
the system comprises a state detection unit, a hash value transmission safety control unit and a state detection unit, wherein the state detection unit is used for detecting the transmission state between the block chain nodes; the preset threshold comprises a first preset threshold and a second preset threshold, the first preset threshold is used for comparing the success probability of the transmission of the first block link node to the second block link node, and the second preset threshold is used for the success probability of the transmission of the second block link node to the first block link node.
In the method, the determining whether the hash value between the block chains is hijacked according to the time comparison result and the transmission rate specifically includes: the set time threshold comprises a time threshold upper limit value and a time threshold lower limit value, when the transmission time of the hash value is greater than the time threshold upper limit value or less than the time threshold lower limit value, the hash value is judged to be hijacked possibly, the received hash value is fed back to the block chain node sending the hash value, the block chain node sending the hash value compares the fed-back hash value with the original hash value, if the fed-back hash value is different from the original hash value, the hash value is determined to be hijacked, if the fed-back hash value is the same as the original hash value, the time value transmitted by the hash value is recorded, and the hash value transmission time is recorded;
when the transmission time of the hash value is between the upper limit value and the lower limit value of the time threshold value, judging whether the transmission rate is always in a preset rate interval, if so, judging that the transmission of the hash value is not hijacked, if not, determining that the transmission of the hash value is hijacked, discarding the hash value, feeding back to a block chain node sending the hash value, and requesting to retransmit the hash value.
The method comprises the steps that the hash value comprises a header, a time table, a speed table and a feedback value, the time table records the absolute value of sending time and the absolute value of receiving time of the hash value, the speed table is used for recording a fluctuation range curve of the transmission rate of the hash value, and the feedback value is used for recording the number of times of feedback and the corresponding result state of each feedback when the time exceeds the range.
A system for preventing block chains of block chains from being hijacked comprises a transmission time detection unit, a transmission rate detection unit and a processing unit, wherein the processing unit receives the transmission time of hash values between the block chains detected by a transmission time detection unit, the transmission rate detection unit detects the transmission rate of the hash values, compares the transmission time with a set time threshold value, and judges whether the hash values between the block chains are hijacked or not according to a time comparison result and the transmission rate.
The system at least comprises two block chain nodes, namely a first block chain node and a second block chain node, and a transmission state detection unit between the block chain nodes,
the system comprises a state detection unit, a hash value transmission safety control unit and a state detection unit, wherein the state detection unit is used for detecting the transmission state between the block chain nodes; the preset threshold comprises a first preset threshold and a second preset threshold, the first preset threshold is used for comparing the success probability of the transmission of the first block link node to the second block link node, and the second preset threshold is used for the success probability of the transmission of the second block link node to the first block link node.
The system specifically includes, according to the time comparison result and the transmission rate, determining whether the hash value between the block chains is hijacked: the set time threshold comprises a time threshold upper limit value and a time threshold lower limit value, when the transmission time of the hash value is greater than the time threshold upper limit value or less than the time threshold lower limit value, the hash value is judged to be hijacked possibly, the received hash value is fed back to the block chain node sending the hash value, the block chain node sending the hash value compares the fed-back hash value with the original hash value, if the fed-back hash value is different from the original hash value, the hash value is determined to be hijacked, if the fed-back hash value is the same as the original hash value, the time value transmitted by the hash value is recorded, and the hash value transmission time is recorded;
when the transmission time of the hash value is between the upper limit value and the lower limit value of the time threshold value, judging whether the transmission rate is always in a preset rate interval, if so, judging that the transmission of the hash value is not hijacked, if not, determining that the transmission of the hash value is hijacked, discarding the hash value, feeding back to a block chain node sending the hash value, and requesting to retransmit the hash value.
The system, hash value includes table head, timetable, speed table, feedback value, the timetable records the sending time absolute value and receiving time absolute value of hash value, the speed table is used to record hash value transmission rate fluctuation range curve, the feedback value is used to record the number of feedback times and corresponding each feedback result state when the time exceeds the range.
The beneficial technical effects obtained by the invention are as follows: the invention can effectively reduce the block chain transmission error between the block chains, improve the success rate of the block chain transmission, check the transmission time and the speed of the block chain, prevent the block chain transmission process from being lost or hijacked, match the hash value of the non-hijacked block chain with the successful transmission probability between the block chains, control the stability of the transmission between the block chains, simultaneously improve the transmission safety of the hash value in the block chain and improve the safety of the block chain. The transmission time and the transmission rate can effectively judge the balance of the hash value transmission among the block chains, and the transmission path of the hash value is determined by quantitatively judging the transmission of the hash value, such as the time, the rate and the like, so that the transmission path of the hash value is unique and unchanged, and the condition that the hash value is artificially hijacked or changed is reduced.
Drawings
The invention will be further understood from the following description in conjunction with the accompanying drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the embodiments. In the drawings, like reference numerals designate corresponding parts throughout the different views.
Fig. 1 is a schematic diagram of a method for preventing a blockchain of a blockchain from being hijacked according to the present invention.
Fig. 2 is a schematic diagram of a system for preventing block chains of a block chain from being hijacked according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clearly apparent, the present invention is further described in detail below with reference to the accompanying drawings and embodiments thereof; it should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. Other systems, methods, and/or features of the present embodiments will become apparent to those skilled in the art upon review of the following detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims. Additional features of the disclosed embodiments are described in, and will be apparent from, the detailed description that follows.
As shown in fig. 1, a schematic diagram of a method for preventing block chains of a block chain from being hijacked is provided for the present invention, which includes a transmission time detection unit, a transmission rate detection unit, and a processing unit, where the processing unit receives transmission time of hash values between block chains detected by a transmission time detection unit, the transmission rate detection unit detects a transmission rate of hash values, compares the transmission time with a set time threshold, and determines whether hash values between block chains are hijacked according to a time comparison result and the transmission rate.
The method at least comprises two block chain nodes, namely a first block chain node and a second block chain node, a transmission state detection unit between the block chain nodes,
the system comprises a state detection unit, a hash value transmission safety control unit and a state detection unit, wherein the state detection unit is used for detecting the transmission state between the block chain nodes; the preset threshold comprises a first preset threshold and a second preset threshold, the first preset threshold is used for comparing the success probability of the transmission of the first block link node to the second block link node, and the second preset threshold is used for the success probability of the transmission of the second block link node to the first block link node.
In the method, the determining whether the hash value between the block chains is hijacked according to the time comparison result and the transmission rate specifically includes: the set time threshold comprises a time threshold upper limit value and a time threshold lower limit value, when the transmission time of the hash value is greater than the time threshold upper limit value or less than the time threshold lower limit value, the hash value is judged to be hijacked possibly, the received hash value is fed back to the block chain node sending the hash value, the block chain node sending the hash value compares the fed-back hash value with the original hash value, if the fed-back hash value is different from the original hash value, the hash value is determined to be hijacked, if the fed-back hash value is the same as the original hash value, the time value transmitted by the hash value is recorded, and the hash value transmission time is recorded;
when the transmission time of the hash value is between the upper limit value and the lower limit value of the time threshold value, judging whether the transmission rate is always in a preset rate interval, if so, judging that the transmission of the hash value is not hijacked, if not, determining that the transmission of the hash value is hijacked, discarding the hash value, feeding back to a block chain node sending the hash value, and requesting to retransmit the hash value.
In the method, the hash value includes a header, a time table, a rate table, and a feedback value, where the time table records an absolute value of sending time and an absolute value of receiving time of the hash value, the rate table is used to record a fluctuation range curve of a transmission rate of the hash value, and the feedback value is used to record the number of times of feedback and a corresponding result state of each feedback when the time exceeds the range.
As shown in fig. 2, a schematic diagram of a system for preventing block chains of a block chain from being hijacked according to the present invention includes a transmission time detection unit, a transmission rate detection unit, and a processing unit, where the processing unit receives transmission time of hash values between block chains detected by the transmission time detection unit, the transmission rate detection unit detects a transmission rate of the hash values, compares the transmission time with a set time threshold, and determines whether the hash values between the block chains are hijacked according to a time comparison result and the transmission rate.
The device comprises a feedback unit for feeding back results after judging time and speed, and a result determining unit for comparing hash values after the feedback results are obtained.
The system at least comprises two block chain nodes, namely a first block chain node and a second block chain node, and a transmission state detection unit between the block chain nodes,
the system comprises a state detection unit, a hash value transmission safety control unit and a state detection unit, wherein the state detection unit is used for detecting the transmission state between the block chain nodes; the preset threshold comprises a first preset threshold and a second preset threshold, the first preset threshold is used for comparing the success probability of the transmission of the first block link node to the second block link node, and the second preset threshold is used for the success probability of the transmission of the second block link node to the first block link node.
The system, according to the time comparison result and the transmission rate, specifically determining whether the hash value between the block chains is hijacked includes: the set time threshold comprises a time threshold upper limit value and a time threshold lower limit value, when the transmission time of the hash value is greater than the time threshold upper limit value or less than the time threshold lower limit value, the hash value is judged to be hijacked possibly, the received hash value is fed back to the block chain node sending the hash value, the block chain node sending the hash value compares the fed-back hash value with the original hash value, if the fed-back hash value is different from the original hash value, the hash value is determined to be hijacked, if the fed-back hash value is the same as the original hash value, the time value transmitted by the hash value is recorded, and the hash value transmission time is recorded;
when the transmission time of the hash value is between the upper limit value and the lower limit value of the time threshold value, judging whether the transmission rate is always in a preset rate interval, if so, judging that the transmission of the hash value is not hijacked, if not, determining that the transmission of the hash value is hijacked, discarding the hash value, feeding back to a block chain node sending the hash value, and requesting to retransmit the hash value.
The system, hash value includes table head, timetable, speed table, feedback value, the timetable records the sending time absolute value and receiving time absolute value of hash value, the speed table is used to record hash value transmission rate fluctuation range curve, the feedback value is used to record the number of feedback times and corresponding each feedback result state when the time exceeds the range.
The processor can be connected with other zone chains through the management server to determine hash value transmission reference values of other zone chains, can analyze the reference hash value in the management server per se and the other zone chains, sets a sharing ID before sharing, sets the sharing ID as a private key, writes the private key into the hash value, shares the hash value only when the hash value standard of the sharing zone chain is reached, otherwise, shares the hash value as messy codes, and if the hash value is successfully shared. One of the main invention points of the invention is to judge the operation path of the hash value through time and speed to determine the safe transmission of the hash value, and the other is to match the transmission time and speed of the hash value with the transmission success rate between block chains to further improve the transmission efficiency and the transmission stability between the block chains.
The beneficial technical effects obtained by the invention are as follows: the invention can effectively reduce the block chain transmission error between the block chains, improve the success rate of the block chain transmission, check the transmission time and the speed of the block chain, prevent the block chain transmission process from being lost or hijacked, match the hash value of the non-hijacked block chain with the successful transmission probability between the block chains, control the stability of the transmission between the block chains, simultaneously improve the transmission safety of the hash value in the block chain and improve the safety of the block chain. The transmission time and the transmission rate can effectively judge the balance of the hash value transmission among the block chains, and the transmission path of the hash value is determined by quantitatively judging the transmission of the hash value, such as the time, the rate and the like, so that the transmission path of the hash value is unique and unchanged, and the condition that the hash value is artificially hijacked or changed is reduced.
Specific details are given in the description to provide a thorough understanding of the exemplary configurations including implementations. However, configurations may be practiced without these specific details, for example, well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the configurations. This description provides example configurations only, and does not limit the scope, applicability, or configuration of the claims. Rather, the foregoing description of the configurations will provide those skilled in the art with an enabling description for implementing the described techniques. Various changes may be made in the function and arrangement of elements without departing from the spirit or scope of the disclosure.
Further, although each operation may describe the operation as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. There may be other steps in a process. Furthermore, examples of the methods may be implemented by hardware, software, firmware, middleware, code, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or code, the program code or code segments to perform the necessary tasks may be stored in a non-transitory computer-readable medium such as a storage medium and the described tasks are performed by a processor.
It is intended that the foregoing detailed description be regarded as illustrative rather than limiting, and that it be understood that it is the following claims, including all equivalents, that are intended to define the spirit and scope of this invention. The above examples are to be construed as merely illustrative and not limitative of the remainder of the disclosure. After reading the description of the invention, the skilled person can make various changes or modifications to the invention, and these equivalent changes and modifications also fall into the scope of the invention defined by the claims.
Claims (4)
1. A method for preventing block chains of block chains from being hijacked is characterized by comprising a transmission time detection unit, a transmission rate detection unit and a processing unit, wherein the processing unit receives the transmission time of hash values between the block chains detected by a transmission time detection unit, the transmission rate detection unit detects the transmission rate of the hash values, compares the transmission time with a set time threshold value, and judges whether the hash values between the block chains are hijacked or not according to a time comparison result and the transmission rate; at least two block chain nodes including a first block chain node and a second block chain node, a transmission state detection unit between the block chain nodes,
the system comprises a state detection unit, a hash value transmission safety control unit and a state detection unit, wherein the state detection unit is used for detecting the transmission state between the block chain nodes; the preset threshold comprises a first preset threshold and a second preset threshold, the first preset threshold is used for comparing the success probability of the transmission of the first block link node to the second block link node, and the second preset threshold is used for the success probability of the transmission of the second block link node to the first block link node;
the step of judging whether the hash values between the block chains are hijacked or not according to the time comparison result and the transmission rate specifically comprises the following steps: the set time threshold comprises a time threshold upper limit value and a time threshold lower limit value, when the transmission time of the hash value is greater than the time threshold upper limit value or less than the time threshold lower limit value, the hash value is judged to be hijacked possibly, the received hash value is fed back to the block chain node sending the hash value, the block chain node sending the hash value compares the fed-back hash value with the original hash value, if the fed-back hash value is different from the original hash value, the hash value is determined to be hijacked, if the fed-back hash value is the same as the original hash value, the time value transmitted by the hash value is recorded, and the hash value transmission time is recorded;
when the transmission time of the hash value is between the upper limit value and the lower limit value of the time threshold value, judging whether the transmission rate is always in a preset rate interval, if so, judging that the transmission of the hash value is not hijacked, if not, determining that the transmission of the hash value is hijacked, discarding the hash value, feeding back to a block chain node sending the hash value, and requesting to retransmit the hash value.
2. The method of claim 1, wherein the hash value comprises a header, a time table, a rate table, and a feedback value, wherein the time table records an absolute value of a sending time and an absolute value of a receiving time of the hash value, the rate table is used for recording a hash value transmission rate fluctuation range curve, and the feedback value is used for recording the number of feedbacks and corresponding result states of each feedback when the time is out of range.
3. A system for preventing block chains of block chains from being hijacked is characterized by comprising a transmission time detection unit, a transmission rate detection unit and a processing unit, wherein the processing unit receives the transmission time of hash values between the block chains detected by a transmission time detection unit, the transmission rate detection unit detects the transmission rate of the hash values, compares the transmission time with a set time threshold value, and judges whether the hash values between the block chains are hijacked or not according to a time comparison result and the transmission rate; at least two block chain nodes including a first block chain node and a second block chain node, a transmission state detection unit between the block chain nodes,
the system comprises a state detection unit, a hash value transmission safety control unit and a state detection unit, wherein the state detection unit is used for detecting the transmission state between the block chain nodes; the preset threshold comprises a first preset threshold and a second preset threshold, the first preset threshold is used for comparing the success probability of the transmission of the first block link node to the second block link node, and the second preset threshold is used for the success probability of the transmission of the second block link node to the first block link node; the step of judging whether the hash values between the block chains are hijacked or not according to the time comparison result and the transmission rate specifically comprises the following steps: the set time threshold comprises a time threshold upper limit value and a time threshold lower limit value, when the transmission time of the hash value is greater than the time threshold upper limit value or less than the time threshold lower limit value, the hash value is judged to be hijacked possibly, the received hash value is fed back to the block chain node sending the hash value, the block chain node sending the hash value compares the fed-back hash value with the original hash value, if the fed-back hash value is different from the original hash value, the hash value is determined to be hijacked, if the fed-back hash value is the same as the original hash value, the time value transmitted by the hash value is recorded, and the hash value transmission time is recorded;
when the transmission time of the hash value is between the upper limit value and the lower limit value of the time threshold value, judging whether the transmission rate is always in a preset rate interval, if so, judging that the transmission of the hash value is not hijacked, if not, determining that the transmission of the hash value is hijacked, discarding the hash value, feeding back to a block chain node sending the hash value, and requesting to retransmit the hash value.
4. The system of claim 3, wherein the hash value comprises a header, a time table, a rate table, and a feedback value, the time table records an absolute value of the sending time and an absolute value of the receiving time of the hash value, the rate table is used for recording a hash value transmission rate fluctuation range curve, and the feedback value is used for recording the number of feedbacks and the corresponding result status of each feedback when the time is out of range.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811647133.2A CN109743178B (en) | 2018-12-30 | 2018-12-30 | Method and system for preventing block chain of block chain from being hijacked |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811647133.2A CN109743178B (en) | 2018-12-30 | 2018-12-30 | Method and system for preventing block chain of block chain from being hijacked |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109743178A CN109743178A (en) | 2019-05-10 |
CN109743178B true CN109743178B (en) | 2022-07-08 |
Family
ID=66362724
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811647133.2A Active CN109743178B (en) | 2018-12-30 | 2018-12-30 | Method and system for preventing block chain of block chain from being hijacked |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109743178B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115751629B (en) * | 2022-12-01 | 2024-08-20 | 珠海格力电器股份有限公司 | Air conditioner communication method, device and system, air conditioner unit and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017148419A1 (en) * | 2016-03-03 | 2017-09-08 | 华为技术有限公司 | Data transmission method and server |
CN107819789A (en) * | 2017-12-07 | 2018-03-20 | 北京泛融科技有限公司 | A kind of content anti-hijack system and method based on block chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI495311B (en) * | 2012-12-14 | 2015-08-01 | Realtek Semiconductor Corp | Wireless transmission rate adjustment method |
-
2018
- 2018-12-30 CN CN201811647133.2A patent/CN109743178B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017148419A1 (en) * | 2016-03-03 | 2017-09-08 | 华为技术有限公司 | Data transmission method and server |
CN107819789A (en) * | 2017-12-07 | 2018-03-20 | 北京泛融科技有限公司 | A kind of content anti-hijack system and method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN109743178A (en) | 2019-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11411681B2 (en) | In-vehicle information processing for unauthorized data | |
CN108696589B (en) | Block chain data transmission method, device, equipment and storage medium | |
US11522891B2 (en) | Machine learning anomaly detection of process-loaded DLLs | |
US20200183373A1 (en) | Method for detecting anomalies in controller area network of vehicle and apparatus for the same | |
CN110289997B (en) | Log message checking method, device and system | |
CN109274592B (en) | MAC address table item processing method and device and computer readable medium | |
US11444891B2 (en) | Electronic control unit, abnormality determination program, and abnormality determination method | |
CN101783955A (en) | Data recovering method when data is abnormal and equipment thereof | |
CN106506124A (en) | Retransmit message and determine method and device | |
CN102111400B (en) | Trojan horse detection method, device and system | |
CN109743178B (en) | Method and system for preventing block chain of block chain from being hijacked | |
CN108880994B (en) | Method and device for retransmitting mails | |
CN110910141A (en) | Transaction processing method, system, device, equipment and computer readable storage medium | |
CN114637611A (en) | Information processing method and device based on message queue and computer equipment | |
CN110399131B (en) | Method, device and computer equipment for improving stability of application program | |
CN111367934A (en) | Data consistency checking method, device, server and medium | |
CN115118782B (en) | Data control method, device, electronic equipment and computer readable storage medium | |
US12113794B2 (en) | System and method for controlling login access to computer resource assets | |
CN115022078A (en) | Controller built-in network safety protection method and device and electronic equipment | |
CN113098746A (en) | CAN bus communication method and device for work machine | |
CN105635159B (en) | Method for blocking and system based on keyword | |
CN115001630B (en) | Data transmission method, device, equipment and storage medium | |
CN113098880A (en) | Method, system, equipment and readable storage medium for identifying replay attack | |
CN113132060A (en) | Message data transmission method and device | |
CN105262757A (en) | Data access method on the basis of IP protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220621 Address after: 518000 office building 5C, Hony Plaza, No. 1, Financial Street, Nanshan street, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong Applicant after: Shenzhen Qianhai UFIDA Lihe Technology Service Co.,Ltd. Address before: No. 6, Dixin Third Road, Wudi County, Binzhou City, Shandong Province 251900 Applicant before: Peng Lina |
|
GR01 | Patent grant | ||
GR01 | Patent grant |