Block chain anomaly identification method and system, equipment and storage medium
An anomaly identification and blockchain technology, applied in the blockchain field, can solve problems such as injustice, user loss, and decline in user trust, and achieve the effect of accurately locating abnormal rollbacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] A blockchain anomaly identification method, such as figure 1 As shown, including: S101, obtain the share of the mining address; S102, sort the mining address according to the number of shares; S103, select N mining addresses according to the share within the set window value range, as a mining address group; S104. Calculate the difference ΔP between the maximum share and the minimum share of the mining address in the mining address group; S105. Keep the mining address group whose ΔP is less than the set share reference difference, and discard the mining address group whose ΔP is greater than the set share reference difference. Address group; S106. Sliding the window to obtain the mining address group whose ΔP is less than the set share reference difference.
[0029] N is the set window value. The set window value and the set share reference difference are all empirical values, which are determined by considering the number of nodes in the blockchain network system and t...
Embodiment 2
[0039] A block chain abnormal identification system, according to the above-mentioned a block chain abnormal identification method, a mining address share statistics module, used to select qualified mining address groups according to the above-mentioned method; abnormal mining A mining address group identifying unit, configured to identify abnormal mining address groups according to the method described above. The abnormal mining address group identification unit is also used to check the rollback number of each mining address in the abnormal mining address group, locate the mining address whose rollback number is too large, and complete the positioning of the abnormal mining address.
[0040] The system can exist in the blockchain network in a centralized (similar to existing centralized application software) or decentralized form (such as smart contracts, DAPP, etc.), and is used to detect whether the mining address mining is abnormal or not.
Embodiment 3
[0042] An apparatus comprising: one or more processors; memory for storing one or more programs which, when executed by the one or more processors, cause the One or more processors execute the method as described above.
[0043]A storage medium storing a computer program, when the program is executed by a processor, implements the method described in Embodiment 1 above.
[0044] image 3 It is a schematic structural diagram of a device provided by an embodiment of the present invention.
[0045] Such as image 3 As shown, as another aspect, the present application also provides a device 500, including one or more central processing units (CPU) 501, which can be 508 programs loaded into random access memory (RAM) 503 to execute various appropriate actions and processes. In the RAM 503, various programs and data necessary for the operation of the device 500 are also stored. The CPU 501 , ROM 502 , and RAM 503 are connected to each other via a bus 504 . An input / output (I / O...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com