Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for preventing blockchain attacks

A block chain and acquisition module technology, applied in the field of communication, can solve problems such as the small scale of altcoins, and achieve the effect of promoting development, improving security and reliability

Active Publication Date: 2022-04-26
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To this end, the present invention provides a method and device for preventing block chain attacks to solve the problem in the prior art that a certain node can control more than half of the computing power in the block chain at low cost due to the small scale of counterfeit coins. The problem of block reversal to achieve double-spend attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing blockchain attacks
  • Method and device for preventing blockchain attacks
  • Method and device for preventing blockchain attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] An embodiment of the present application provides a method for preventing blockchain attacks, which can be applied to a device for preventing blockchain attacks, and the device can be placed in a server corresponding to an accounting node to solve the above problems.

[0035] figure 1 It is a flow chart of the method for preventing blockchain attacks in this embodiment. The method specifically includes the following steps.

[0036] Step 110, obtain the first join duration of the node joining the blockchain and the magnitude of the first computing capability of the node.

[0037] It should be noted that when a bookkeeping node joins a new blockchain, each bookkeeping node in the blockchain will set an identifier for the bookkeeping node to join the blockchain to record The time information of the accounting node joining the blockchain, such as the first joining time.

[0038] In some specific implementations, before obtaining the order of magnitude steps of the first ...

Embodiment 2

[0052] The embodiment of this application provides a method for preventing blockchain attacks. This embodiment is roughly the same as Embodiment 1. The main difference is that after applying to the blockchain to update the first security deposit, it is also necessary to judge the blockchain Whether a fork occurs, and when it is determined that the blockchain has forked, determine and submit the second deposit of the node to the blockchain based on the position information of the node relative to the forked node. When the blockchain forks, the bookkeeping node submits the second deposit to ensure the legitimacy of the operation of the bookkeeping node.

[0053] figure 2 It is a flow chart of the method for preventing blockchain attacks in this embodiment. The method can be applied to a device for preventing blockchain attacks, and the device can be placed in the server corresponding to the accounting node. The method may include the following steps.

[0054] Step 210, obtain...

Embodiment 3

[0071] image 3 It is a schematic structural diagram of a device for preventing blockchain attacks provided by the embodiment of the present application. For the specific implementation of the device, please refer to the relevant descriptions of Embodiment 1 or Embodiment 2, and the repetitions will not be repeated. It is worth noting that the specific implementation of the device in this embodiment is not limited to the above embodiments, and other undescribed embodiments are also within the protection scope of the device.

[0072] Such as image 3 As shown, the device for preventing block chain attacks in this embodiment specifically includes: the first acquisition module 301 is used to obtain the first joining duration of the node joining the block chain and the order of magnitude of the first computing power of the node; The obtaining module 302 is used to obtain a second product value from the block chain, wherein the block chain includes N bookkeeping nodes, and the sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for preventing block chain attacks. The method includes: obtaining the first joining time length of the node joining the block chain and the order of magnitude of the first computing ability of the node; obtaining the second The product value, wherein, the block chain includes N bookkeeping nodes, the second product value is a value obtained by summing the product values ​​of the N bookkeeping nodes, and N is a positive integer greater than or equal to 1; according to the first The joining time, the order of magnitude of the first computing power, the second product value and the total amount of blockchain mining rewards within the preset time period are calculated to obtain the first deposit; among them, the first deposit is used to ensure the legality of the operation of this node property; apply to the block chain to update the first security deposit. Prevent a certain node from mastering more than half of the computing power of the blockchain by bribing a large number of mining nodes, and then realize block reversal to achieve the purpose of double-spend attacks, improve the security and reliability of the blockchain, and promote the development of the blockchain.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and device for preventing block chain attacks. Background technique [0002] A double spend attack is when the same money is spent twice. For example, the attacker transfers 100 bitcoins (Bitcoin, BTC) to the victim's account in exchange for 5 million RMB from the victim, generating the first transaction. After obtaining the transfer of the victim, the attacker sends a second transaction to himself, that is, a transaction of 100 BTC transferred to the attacker himself. Finally, the longest chain contains the second transaction, and the attacker and the victim The first transaction between the attackers is considered a "didn't happen" transaction because it exists in a shorter fork. [0003] There are many ways to realize the double-spending attack, for example, 51% computing power attack. A 51% computing power attack is a double-spending attack by controlling 5...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32G06Q40/04
CPCH04L63/1441H04L9/3247G06Q40/04
Inventor 田新雪万刚严斌峰
Owner CHINA UNITED NETWORK COMM GRP CO LTD