Transaction group attack protection method and device and storage medium

A transaction and equipment technology, applied in the field of blockchain, to achieve the effect of enhancing protection and increasing attack costs

Pending Publication Date: 2019-09-03
HANGZHOU FUZAMEI TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There is a loophole in the verification mechanism, so that an attacker in the network can construct a transaction group that is not repeated with the historical transaction group through at least one illegal transaction that is repeated with the historical transaction and several legal transactions that are not repeated with the historical transaction group, so that the transaction group Can pass the verification of the existing blockchain system and enter the memory pool of the blockchain node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transaction group attack protection method and device and storage medium
  • Transaction group attack protection method and device and storage medium
  • Transaction group attack protection method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0023] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0024] figure 1 It is a flow chart of a protection method for a transaction group attack provided by an embodiment of the present invention.

[0025] Such as figure 1 As shown, in this embodiment, the present invention provides a protection method for transaction group attacks, including:

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a transaction group attack protection method and device and a storage medium, and the method comprises the steps of detecting whether a first transaction to be stored in a memory pool has a transaction group: if yes, expanding the first transaction according to a transaction group structure, and obtaining a plurality of second transactions; traversing and detecting whether illegal transactions exist in the second transactions or not: if so, generating the error information and reporting the error information, and deleting the first transaction; and if not, storing the first transaction into a memory pool. According to the invention, each transaction in the transaction group is illegally detected before the transaction group is stored in the memory pool, and the transaction group comprising the illegal transaction is deleted, so that the transaction group comprising the illegal transaction cannot enter the memory pool, and the memory pool cannot be jammed by caching a large number of transaction groups comprising the illegal transaction.

Description

technical field [0001] The present application relates to the technical field of blockchain, and in particular to a protection method, device and storage medium for transaction group attacks. Background technique [0002] Transactions in the current blockchain system include single transactions and transaction groups. A transaction group is a special transaction formed by encapsulating multiple transactions. The execution results of multiple transactions in the same transaction group are the same, that is, they are executed successfully at the same time, or, Simultaneous execution failed. Based on the execution mechanism of the above transaction group, when there is an illegal transaction in a transaction group, all transactions in the transaction group will fail to execute. [0003] In the current blockchain system, the verification of a transaction group is the same as the verification of a single transaction, that is, by comparing the transaction hashes of historical tra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q40/04
CPCG06Q20/3827G06Q40/04
Inventor 何玉斌王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products