Unlock instant, AI-driven research and patent intelligence for your innovation.

Methods, device and equipment for preventing double spend attack and computer readable memory medium

A computer and user node technology, applied in the field of blockchain, can solve problems such as malicious user double-spending attack, user data information cannot be synchronized in time, etc.

Active Publication Date: 2019-04-16
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method, device, device and computer-readable storage medium for avoiding double-spend attacks, which are used for double-spend attacks by malicious users due to management problems and user data information that cannot be synchronized in time due to management problems. technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods, device and equipment for preventing double spend attack and computer readable memory medium
  • Methods, device and equipment for preventing double spend attack and computer readable memory medium
  • Methods, device and equipment for preventing double spend attack and computer readable memory medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0027] The method for avoiding double flower attack provided by the present invention can be applied to figure 1 The communication system shown. Such as figure 1 As shown, the communication system includes: an access network device 11 , a terminal device 12 and a server 13 . It should be noted, figure 1 The communication system shown can be applied to different network standards, f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides methods, device and equipment for preventing a double spend attack and a computer readable memory medium. A method comprises the steps that a user node obtains an operator listcorresponding to a league chain; the user node determines a to-be-transferred operator from the operator list; and the user node sends broadcast information according to the to-be-transferred operator, wherein the broadcast information comprises a to-be-transferred operator identity, an identity corresponding to the user node and public key information, each operator node in the league chain updates a user list according to the broadcast information, and a mining node in the league chain writes the broadcast information into an account book of the league chain. Security of the league chain canbe ensured. The security of user accounts is ensured.

Description

technical field [0001] The present invention relates to the field of block chains, in particular to a method, device, equipment and computer-readable storage medium for avoiding double-spending attacks. Background technique [0002] Number portability can also be referred to as number portability and mobile phone number change. Specifically, a mobile phone user with a mobile operator's number can transfer to another operator's network and enjoy other operator's telecommunications services. On the one hand, number portability can reduce the cost of network transfer for users and bring convenience to consumers. On the other hand, number portability can also optimize the market structure, achieve effective competition through market control measures, and improve consumer welfare. [0003] However, after the number portability transfer is implemented, due to management problems, user data information cannot be synchronized in time. Therefore, there may be hackers who pretend to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04W8/28H04W12/04H04W12/12H04W12/122
CPCH04L9/3247H04L63/1441H04L65/1016H04W8/28H04W12/04H04W12/12
Inventor 田新雪马书惠肖征荣
Owner CHINA UNITED NETWORK COMM GRP CO LTD