Method and device for preventing blockchain attacks
A block chain and acquisition module technology, applied in the field of communication, can solve problems such as the small scale of altcoins, and achieve the effect of promoting development, improving security and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] An embodiment of the present application provides a method for preventing blockchain attacks, which can be applied to a device for preventing blockchain attacks, and the device can be placed in a server corresponding to an accounting node to solve the above problems.
[0035] figure 1 It is a flow chart of the method for preventing blockchain attacks in this embodiment. The method specifically includes the following steps.
[0036] Step 110, obtain the first join duration of the node joining the blockchain and the magnitude of the first computing capability of the node.
[0037] It should be noted that when a bookkeeping node joins a new blockchain, each bookkeeping node in the blockchain will set an identifier for the bookkeeping node to join the blockchain to record The time information of the accounting node joining the blockchain, such as the first joining time.
[0038] In some specific implementations, before obtaining the order of magnitude steps of the first ...
Embodiment 2
[0052] The embodiment of this application provides a method for preventing blockchain attacks. This embodiment is roughly the same as Embodiment 1. The main difference is that after applying to the blockchain to update the first security deposit, it is also necessary to judge the blockchain Whether a fork occurs, and when it is determined that the blockchain has forked, determine and submit the second deposit of the node to the blockchain based on the position information of the node relative to the forked node. When the blockchain forks, the bookkeeping node submits the second deposit to ensure the legitimacy of the operation of the bookkeeping node.
[0053] figure 2 It is a flow chart of the method for preventing blockchain attacks in this embodiment. The method can be applied to a device for preventing blockchain attacks, and the device can be placed in the server corresponding to the accounting node. The method may include the following steps.
[0054] Step 210, obtain...
Embodiment 3
[0071] image 3 It is a schematic structural diagram of a device for preventing blockchain attacks provided by the embodiment of the present application. For the specific implementation of the device, please refer to the relevant descriptions of Embodiment 1 or Embodiment 2, and the repetitions will not be repeated. It is worth noting that the specific implementation of the device in this embodiment is not limited to the above embodiments, and other undescribed embodiments are also within the protection scope of the device.
[0072] Such as image 3 As shown, the device for preventing block chain attacks in this embodiment specifically includes: the first acquisition module 301 is used to obtain the first joining duration of the node joining the block chain and the order of magnitude of the first computing power of the node; The obtaining module 302 is used to obtain a second product value from the block chain, wherein the block chain includes N bookkeeping nodes, and the sec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


