An optimization method of block chain tamper-proof technology

An optimization method and technology of blockchain, applied in the field of blockchain, can solve problems such as application impact, destruction of original data of the ledger, and acquisition of historical transaction data by smart contracts, achieving the effect of high verification efficiency and few verification times

Active Publication Date: 2018-12-28
黄芸芸
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if an attacker tries to tamper with the historical data of the node and the original data of the ledger is destroyed, then the smart contract cannot obtain accurate historical transaction data through the ledger of the node, and all applications based on the historical data of the ledger will be affected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An optimization method of block chain tamper-proof technology
  • An optimization method of block chain tamper-proof technology
  • An optimization method of block chain tamper-proof technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The technical scheme of the present invention will be further described in detail below in conjunction with the accompanying drawings:

[0036] Suppose node A maintains a image 3 In the block chain shown, each block is interconnected by the hash value of the previous block according to the timestamp T. There are currently n blocks, and the content of each block includes: block data D and the previous block The hash pointer pre_H of the block.

[0037] The hash pointer on the blockchain can be simplified to:

[0038] pre_H(1)=hash(D(1))

[0039] pre_H(2)=hash(pre_H(1)||D(1))

[0040] ...

[0041] pre_H(n-2)=hash(pre_H(n-3)||D(n-2))

[0042] pre_H(n-1)=hash(pre_H(n-2)||D(n-1))

[0043] pre_H(n)=hash(pre_H(n-1)||D(n))

[0044] The anti-tamper detection mechanism is as follows:

[0045] 1. Start the first test, which mainly performs inter-block pre_H comparison test on the entire blockchain, such as figure 1 As shown, if pre_H(m)=hash(pre_H(m-1)||D(m)), the test passes; otherwise, the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for discovering tampering with the account book data stored in a node on a block chain. The method firstly traverses and verifies whether all blocks except the last block in the block chain stored in the node are tampered with. If there are tampered blocks in the verification node, the pre_H is recorded for recovering the data. When a new block is added to the nodeblock chain, the pre_H stored in the new block and the data stored in the new block are signed with the private key of the node and stored separately. The pre_H and data stored in the latest block arecompared with the pre_H and data stored in the signature to verify whether the data in the new block has been tampered with and to locate and recover the data in the previously tampered block.

Description

Technical field [0001] The invention relates to the technical field of block chains, in particular to an optimization method of block chain anti-tampering technology. Background technique [0002] Blockchain is the underlying technology of digital virtual currencies such as Bitcoin. Through decentralized data records, all nodes in the entire network maintain data together to achieve safe data storage, which is unforgeable, unmodifiable, and traceable. , Anonymity and other characteristics. [0003] The decentralized technical solution of the blockchain is based on the block as the basic unit to manage and store data. The block is composed of two parts of the data structure, namely the block header and the Merkle tree structure. The header of the block includes the temporary random number that can be modified by the miner, the hash value of the previous block, the timestamp, the difficulty of mining, the root of the transaction tree and other data. The other part of the block is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q40/04
CPCG06Q20/382G06Q40/04
Inventor 黄芸芸蒲军
Owner 黄芸芸
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products