A method for preventing short-term bifurcation and double-spend attack on a block chain network

A block chain and block technology, applied in the Internet/IT/financial field, to achieve the effect of easy implementation, reduced possibility, and small changes

Active Publication Date: 2018-12-18
WEALEDGER NETWORK TECH CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] At present, there is no effective method in the blockchain network (POW consensus network/POS consensus network) to prevent malicious individuals or organizations (generally mining pools) with a large amou

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] The technical solutions in the embodiments of the present invention will be described clearly and completely below. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0028] In the embodiment of the present invention, a method for preventing short-term bifurcation double-spending attacks on a blockchain network includes the following steps:

[0029] Add a CA certificate issuance and update center to the blockchain network; all nodes that want to participate in mining must submit a certificate issuance application to the CA certificate issuance and update center, and the CA certificate issuance and update center conducts individual / organization real-name review; CA The certificate issuance an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing short-term bifurcation and double-spend attack on a block chain network. The method comprises the following steps: adding a CA certificate issuing and updating center to the block chain network; transforming the block data structure, adding signature and public key fields based on CA certificate; adding certificate validity verification of signatureand public key to the consensus algorithm of block chain network nodes; improving consensus algorithm; in the improved consensus algorithm, adding short bifurcation malicious double-spend attack riskidentification. The method has small modification to the original chain, is easy to realize, only increases the CA center and modifies and adds the necessary consensus algorithm, can effectively reduce the possibility of short-term bifurcation double-spend attack, and provides effective real-name system evidence for the judicial investigation after the event through the real-name system CA certificate.

Description

technical field [0001] The present invention relates to the Internet / IT / financial field, in particular to a method for preventing short-term bifurcation double-spending attacks on blockchain networks. Background technique [0002] Blockchain technology, also known as distributed ledger technology, is an Internet database technology characterized by decentralization, openness and transparency. It was the underlying technology of Bitcoin at the earliest and is currently widely used in financial and other fields. At present, the BTG network has been attacked by a short-lived fork and double spend, which has caused a large amount of digital token losses to the exchange, and has once again questioned the security of the blockchain. [0003] Short-lived fork double-spending attack refers to: [0004] 1) The attacker takes advantage of the computing power (for the POW blockchain network) / equity (for the POS blockchain network) of the control node to fork the target chain (chain, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06Q20/38
CPCG06F21/562G06Q20/3829H04L9/3247H04L9/3268H04L9/3239H04L63/0823H04L63/126H04L63/1466H04L63/1441H04L9/50H04L9/0643H04L9/30
Inventor 程文彬郭光武肖坤
Owner WEALEDGER NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products