Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An optimization method for blockchain anti-tampering technology

An optimization method and blockchain technology, applied in the blockchain field, can solve problems such as application impact, destruction of ledger original data, and acquisition of historical transaction data by smart contracts, achieving high verification efficiency and fewer verification times

Active Publication Date: 2021-07-27
黄芸芸
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if an attacker tries to tamper with the historical data of the node and the original data of the ledger is destroyed, then the smart contract cannot obtain accurate historical transaction data through the ledger of the node, and all applications based on the historical data of the ledger will be affected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An optimization method for blockchain anti-tampering technology
  • An optimization method for blockchain anti-tampering technology
  • An optimization method for blockchain anti-tampering technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0036] Suppose node A maintains a image 3 In the blockchain shown, each block is interconnected through the hash value of the previous block according to the timestamp T. There are currently n blocks, and the content of each block includes: the data D of the block and the previous block Hash pointer pre_H of the block.

[0037] The hash pointer on the blockchain can be simplified as:

[0038] pre_H(1)=hash(D(1))

[0039] pre_H(2)=hash(pre_H(1)||D(1))

[0040] ...

[0041] pre_H(n-2)=hash(pre_H(n-3)||D(n-2))

[0042] pre_H(n-1)=hash(pre_H(n-2)||D(n-1))

[0043] pre_H(n)=hash(pre_H(n-1)||D(n))

[0044] The anti-tampering detection mechanism is as follows:

[0045] 1. Start the first detection, mainly to perform inter-block pre_H comparison detection on the entire blockchain, such as figure 1 As shown, if pre_H(m)=hash(pre_H(m-1)||D(m)), the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a method for discovering that the ledger data stored in a certain node on the blockchain has been tampered with. The method first traverses to verify whether all blocks in the blockchain stored in the verification node except the last block have been tampered with. If there is a tampered block in the verification node, the record pre_H is used to restore the data. When a new block is added to the block chain of the node, the pre_H and data stored in the new block are signed with the private key of the node and stored separately. During the detection, the pre_H and data stored in the latest block are compared with the pre_H and data in the stored signature, so as to verify whether the data of the newly entered block has been tampered with, and locate and restore the data in the previously tampered block .

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to an optimization method for anti-tampering technology of block chains. Background technique [0002] Blockchain is the underlying technology of digital virtual currencies such as Bitcoin. Through decentralized data records, all nodes in the entire network jointly maintain data to achieve secure data storage. It is unforgeable, non-tamperable, and traceable. , anonymity and so on. [0003] The decentralized technical solution of the blockchain is based on the block as the basic unit to manage and store data. A block consists of two parts of the data structure, namely the block header and the Merkle tree structure. The header of the block includes data such as a temporary random number that can be modified by miners, the hash value of the previous block, timestamp, mining difficulty, and the root of the transaction tree. Another part of the block is a Merkle tree, which stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/38G06Q40/04
CPCG06Q20/382G06Q40/04
Inventor 黄芸芸蒲军
Owner 黄芸芸
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products