Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system for preventing vulnerabilities in a chunk chain due to a pause period

A block chain and block chain technology, applied in the system field of loopholes, can solve problems such as system fragility and easy to be attacked, and achieve the effect of ensuring reliable security and preventing loopholes

Inactive Publication Date: 2018-12-25
佛山伊苏巨森科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a fixed flaw in blockchain applications, that is, the system is vulnerable and vulnerable to attacks caused by network suspension or pause periods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] A system for preventing vulnerabilities in a blockchain due to a dead period, the system comprising: at least one hardware processor configured to: submit a first cross transaction to be added to a first blockchain, the said first cross-transaction includes cross-reference information for a second segment; said cross-transaction corresponds to said first cross-transaction; characterized in that said second cross-link transaction is submitted for addition to a second block chain , the second cross-link transaction is used to add to the second blockchain, the second cross-transaction includes cross-reference information corresponding to the first cross-link transaction, the first and second cross-link processes are configured as Used by users of at least one of the first and second blockchains to verify at least a portion of one of the first and second blockchains after a period of inactivity in one of the first and second blockchains blockchain. The first and second cro...

Embodiment 2

[0017] The present invention proposes a system for protecting the reliability of block chain transactions, the transaction includes first and second cross transactions, each of which includes: the identifier of the first block chain; The identifier of the second blockchain; the message digest of the last block of said first blockchain the block containing the first cross-link transaction; the last block of the second block chain preceding the block containing the second cross-link transaction and the transaction digest of the corresponding cross-transaction digitally signed by the party's private key. The system includes submitting, by a computing device associated with a party, a first cross-transaction for addition to a first blockchain, the first cross-transaction comprising a cross-transaction, a first cross-transaction corresponding to the first cross-transaction Reference information for two cross-transactions; the second cross-transaction is submitted by the computing d...

Embodiment 3

[0027] The present invention proposes a system for securing the reliability of blockchain transactions, said system comprising: submitting, by a computing device associated with a party, a first cross transaction for addition to a first blockchain, said second a cross transaction comprising cross transactions, reference information for a second cross transaction corresponding to said first cross transaction; said second cross transaction submitted by said computing device associated with said party for addition to a second zone block chain, the second cross-transaction includes first cross-reference information corresponding to the first cross-transaction, the first cross-link transaction and the second cross-link transaction are configured to be accessible by the first block chain and a user of at least one of said second blockchains to verify said first and At least a portion of one of the second blockchains the first and second blockchains. Further, the first and second cr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for preventing vulnerabilities in a chunk chain due to a pause period. The system includes at least one hardware processor configured to submit a first cross-transaction corresponding to thecross-transaction for addition to a first block chain, the first cross-transaction including cross-reference information for a second segment; characterized by submitting the second crosslinked transaction for addition to a second block chain, the second cross-linking transaction being added to the second block chain, the second cross-transaction including cross-reference information correspondingto the first cross-linked transaction. The first and second crosslinking processes are configured to be used together by a user of at least one of the first and second block chains to verify at leasta portion of the block chain of one of the first and second block chains after a quiescent period in one of the first and second block chains.

Description

technical field [0001] The present invention relates to the field of block chain applications, in particular, to a system for preventing loopholes in block chains due to dead periods. Background technique [0002] Blockchain is one of the hottest fields right now. Among them, Bitcoin is the most typical application of blockchain. The success of Bitcoin does not depend on the scalability of computing efficiency or resource consumption. Specialized Bitcoin hardware is designed by experts to perform only one specific function: repeatedly solving a very specific and resource-intensive computational problem. Blockchain technology uses block chain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, uses cryptography to ensure the security of data transmission and access, and utilizes intelligence composed of automated script codes. A new distributed infrastructure and computing method for programming and manipulating da...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3829G06Q20/3825
Inventor 刘祎马克西姆·马修斯天柏岚·马修斯
Owner 佛山伊苏巨森科技有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More