A method for preventing short-term bifurcation and double-spend attack on a block chain network
A block chain and block technology, applied in the Internet/IT/financial field, to achieve the effect of easy implementation, reduced possibility, and small changes
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0027] The technical solutions in the embodiments of the present invention will be described clearly and completely below. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0028] In the embodiment of the present invention, a method for preventing short-term bifurcation double-spending attacks on a blockchain network includes the following steps:
[0029] Add a CA certificate issuance and update center to the blockchain network; all nodes that want to participate in mining must submit a certificate issuance application to the CA certificate issuance and update center, and the CA certificate issuance and update center conducts individual / organization real-name review; CA The certificate issuance an...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap