Double-flower attack resistance processing method and device based on a block chain

A processing method and technology of blockchain, applied in the field of blockchain, can solve the problems affecting transaction processing efficiency, blockchain bifurcation, etc., and achieve the effect of improving transaction processing efficiency

Active Publication Date: 2019-03-19
北京医拍智能科技有限公司
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When two transactions that are very close in time are confirmed by different nodes according to the timestamp, the blockchain will fork, which will affect the efficiency of transaction processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-flower attack resistance processing method and device based on a block chain
  • Double-flower attack resistance processing method and device based on a block chain
  • Double-flower attack resistance processing method and device based on a block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0024] figure 1 It shows a blockchain-based anti-double-spend attack processing method provided by an embodiment of the present invention, including:

[0025] S11. The target service node in the target block chain obtains the double-spend transaction information initiated by the transaction initiation node, the double-spend transaction informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a double-flower attack resistance processing method and device based on a block chain. The method comprises the following steps of: obtaining a sample; each processing service node in the target block chain acquires the double-flower transaction information initiated by the transaction initiation node; determining any one piece of transaction information from the double-flower transaction information as transaction confirmation information; and sharing broadcast information corresponding to the first transaction information and the second transaction information to other processing service nodes, and finally, determining the confirmation number corresponding to the first transaction information and the second transaction information according to thereceived broadcast information and the sent broadcast information. The processing result is obtained according to the confirmation number, the double-pattern transaction information is confirmed randomly, confirmation does not need to be carried out according to the timestamp, and the purposes of improving transaction processing efficiency, saving server operation resources and reducing cost areachieved.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of blockchain, and in particular to a method and device for processing anti-double spend attacks based on blockchain. Background technique [0002] Among the existing blockchain projects, the most authoritative and representative one is Bitcoin. Bitcoin uses Proof-of-work (POW) to solve the double-spend transaction problem. It mainly relies on two conditions of unconsumed transaction output (UTXO) and timestamp to process. [0003] Each transaction must first confirm the previous situation of the corresponding bitcoin, and check whether it exists in the payer's UTXO. After each UTXO is initiated, the node will only confirm the transaction received first according to the timestamp. When two transactions that are very close in time are confirmed by different nodes according to the timestamp, the blockchain will fork, which will affect the efficiency of transaction processing. Con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38
CPCG06Q20/3829
Inventor 温德亮吴诗展蒋占伟
Owner 北京医拍智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products