CN110191130B - Method, device and storage medium for defending against false transaction attacks - Google Patents

Method, device and storage medium for defending against false transaction attacks Download PDF

Info

Publication number
CN110191130B
CN110191130B CN201910469441.9A CN201910469441A CN110191130B CN 110191130 B CN110191130 B CN 110191130B CN 201910469441 A CN201910469441 A CN 201910469441A CN 110191130 B CN110191130 B CN 110191130B
Authority
CN
China
Prior art keywords
module
block
transaction
memory pool
execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910469441.9A
Other languages
Chinese (zh)
Other versions
CN110191130A (en
Inventor
何玉斌
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201910469441.9A priority Critical patent/CN110191130B/en
Publication of CN110191130A publication Critical patent/CN110191130A/en
Application granted granted Critical
Publication of CN110191130B publication Critical patent/CN110191130B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5016Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5022Mechanisms to release resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Memory System Of A Hierarchy Structure (AREA)
  • Retry When Errors Occur (AREA)

Abstract

The invention provides a method, equipment and a storage medium for defending against false transaction attacks, wherein the method comprises the following steps: in response to the success of mining, the consensus module pulls a plurality of transactions from the memory pool module and caches the transactions, packages each pulled transaction to generate a first block, and sends the first block to the execution module; the execution module receives and executes each transaction of the first block and sends an execution result of the first block to the consensus module; the consensus module generates first notification information according to an execution result of the first block sent by the execution module and sends the first notification information to the memory pool module; and the memory pool module deletes each transaction which fails to be executed in the first block from the memory pool according to the first notification message. The invention realizes the reduction of the congestion of the memory pool and improves the safety of the block chain.

Description

Method, device and storage medium for defending against false transaction attacks
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, a device, and a storage medium for defending against false transaction attacks.
Background
In the existing block chain technology, because the process of the transaction pulled from the memory pool module by the consensus module and the process of the transaction broadcast to other nodes of the block chain by the memory pool module are simultaneously carried out, in order to ensure that the pulled transaction can be broadcast to other nodes, the pulled transaction cannot be directly deleted from the memory pool after the transaction is pulled from the memory pool module; after the pulled transaction is executed, deleting the transaction which is successfully executed in the memory pool module; the memory pool module deletes the overtime transaction at regular time.
Based on the mechanism, an attacker can send a large number of transactions which cannot be executed successfully, the transactions jam a memory pool before timeout, and the consensus module is repeatedly pulled to the transactions, so that the normal transactions are influenced to be executed in a packaging mode.
Disclosure of Invention
In view of the foregoing drawbacks and deficiencies of the prior art, it is desirable to provide a method, device, and storage medium for defending against false transaction attacks, which reduces congestion in a memory pool and improves security of a block chain.
In a first aspect, the present invention provides a method for defending against false transaction attacks, the method being applied to a node of a blockchain, the method including:
in response to the success of mining, the consensus module pulls a plurality of transactions from the memory pool module and caches the transactions, packages each pulled transaction to generate a first block, and sends the first block to the execution module;
the execution module receives and executes each transaction of the first block and sends an execution result of the first block to the consensus module;
the consensus module generates first notification information according to an execution result of the first block sent by the execution module and sends the first notification information to the memory pool module;
and the memory pool module deletes each transaction which fails to be executed in the first block from the memory pool according to the first notification message.
In a second aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a method of defending against false transaction attacks provided according to embodiments of the present invention.
In a third aspect, the present invention also provides a storage medium storing a computer program that causes a computer to execute the method for defending against a false transaction attack provided according to the embodiments of the present invention.
In the method, the device and the storage medium for defending against false transaction attacks provided by the embodiments of the present invention, in response to the success of mining, the consensus module pulls a plurality of transactions from the memory pool module and caches the transactions, packages each pulled transaction to generate a first block, and sends the first block to the execution module; the execution module receives and executes each transaction of the first block and sends an execution result of the first block to the consensus module; the consensus module generates first notification information according to an execution result of the first block sent by the execution module and sends the first notification information to the memory pool module; and the memory pool module deletes each transaction which fails to be executed in the first block from the memory pool according to the first notification information, so that the congestion of the memory pool is reduced, and the safety of the block chain is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of a method for defending against false transaction attacks according to an embodiment of the present invention.
FIG. 2 is a flow diagram of a preferred embodiment of the method shown in FIG. 1.
FIG. 3 is a flow diagram of a preferred embodiment of the method shown in FIG. 1.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a method for defending against false transaction attacks according to an embodiment of the present invention. As shown in fig. 1, in this embodiment, the present invention provides a method for defending against false transaction attacks, where the method is applied to a node of a blockchain, and the method includes:
s12: in response to the success of mining, the consensus module pulls a plurality of transactions from the memory pool module and caches the transactions, packages each pulled transaction to generate a first block, and sends the first block to the execution module;
s13: the execution module receives and executes each transaction of the first block and sends an execution result of the first block to the consensus module;
s14: the consensus module generates first notification information according to an execution result of the first block sent by the execution module and sends the first notification information to the memory pool module;
s15: and the memory pool module deletes each transaction which fails to be executed in the first block from the memory pool according to the first notification message.
Specifically, the node a is configured with a memory pool module, a consensus module and an execution module; the consensus module pulls a plurality of transactions from the memory pool and caches the transactions, and the consensus module does not pull other transactions from the memory pool any more before the pulled transactions are deleted by the consensus module; assuming that the consensus module pulls 10 transactions tx 1-tx 10 from the memory pool and caches the transactions, after the execution module executes tx 1-tx 10, the tx 1-tx 9 are executed successfully, the tx10 is executed unsuccessfully, and the first notification information includes each transaction executed successfully;
in step S12, in response to the success of mining, the consensus module pulls 10 transactions tx1 to tx10 from the memory pool module and buffers them, packs tx1 to tx10 to generate a first block, and sends it to the execution module;
s13: the execution module receives and executes tx 1-tx 10 of the first block and sends an execution result of the first block to the consensus module;
s14: the consensus module generates first notification information tx 1-tx 9 according to the execution result of the first block sent by the execution module, and sends the first notification information tx 1-tx 9 to the memory pool module;
s15: the memory pool module deletes each transaction tx10 that failed to execute in the first block from the memory pool according to the first notification information tx 1-tx 9.
In the embodiment, the method for defending against the wrong transaction provided by the invention is exemplarily explained by taking the case that the consensus module draws 10 transactions and the first notification information comprises each transaction which is successfully executed; in more embodiments, the transaction amount pulled from the memory pool by the consensus module may be configured to any reasonable amount according to the total number of transactions that can be cached by the memory pool module, for example, the total number of transactions that can be cached by the memory pool module is 10000, and the transaction amount pulled from the memory pool by the consensus module may be configured to be reasonable amounts such as 100, 200, and the like, and may not exceed 10000, so that the same technical effect may be achieved.
In further embodiments, the first notification message may be further configured to include transactions that have failed to be executed, and if the first notification message is configured to include transactions that have failed to be executed, in step S14, the consensus module generates the first notification message tx10 according to the execution result of the first chunk sent by the execution module, and sends the first notification message tx10 to the memory pool module; in step S15, the memory pool module deletes each transaction tx10 that failed to execute in the first block from the memory pool according to the first notification information tx 10; the first notification information may also be configured to include an execution result of each transaction (tx 1-tx 9: success, tx 10: failure), if configured to include the execution result of each transaction, in step S14, the consensus module generates first notification information (tx 1-tx 9: success, tx 10: failure) according to the execution result of the first block sent by the execution module, and sends the first notification information (tx 1-tx 9: success, tx 10: failure) to the memory pool module; in step S15, the memory pool module deletes each transaction tx10 that failed to execute in the first block from the memory pool according to the first notification information (tx 1-tx 9: success, tx 10: failure), thereby achieving the same technical effect.
In further embodiments, the first notification information may further include transaction hashes of respective transactions that are successfully executed (tx1) -hash (tx9), and if the first notification information is configured to include transaction hashes of respective transactions that are successfully executed, in step S14, the consensus module generates first notification information hashes (tx1) -hash (tx9) according to the execution result of the first block sent by the execution module, and sends the first notification information hashes (tx1) -hash (tx9) to the memory pool module; in step S15, the memory pool module deletes each transaction tx10 that failed to execute in the first block from the memory pool according to the first notification information hash (tx1) -hash (tx9), so as to achieve the same technical effect.
In the embodiment, in response to the success of mining, the consensus module pulls a plurality of transactions from the memory pool module and caches the transactions, packages each pulled transaction to generate a first block, and sends the first block to the execution module; the execution module receives and executes each transaction of the first block and sends an execution result of the first block to the consensus module; the consensus module generates first notification information according to an execution result of the first block sent by the execution module and sends the first notification information to the memory pool module; and the memory pool module deletes each transaction which fails to be executed in the first block from the memory pool according to the first notification information, so that the congestion of the memory pool is reduced, and the safety of the block chain is improved.
FIG. 2 is a flow diagram of a preferred embodiment of the method shown in FIG. 1. As shown in fig. 2, in a preferred embodiment, after the execution module receives and executes the transactions of the first block and sends the execution result of the first block to the consensus module, the method further includes:
s16: the execution module sends an execution result of executing the first block to the storage module;
s17: the storage module receives and stores the execution result of the first block and broadcasts the execution result of the first block to other nodes of the block chain;
s18: the storage module generates second notification information according to the execution result of the first block and sends the second notification information to the memory pool module;
s19: and the memory pool module deletes each transaction which is successfully executed in the first block from the memory pool according to the second notification information.
Assuming that the second notification information includes each transaction that was successfully performed;
in step S16, the execution module sends the execution result of executing the first tile to the storage module;
in step S17, the storage module receives and stores the execution result of the first chunk, and broadcasts the execution result of the first chunk to other nodes of the chunk chain;
in step S18, the memory module generates second notification information tx1 to tx9 according to the execution result of the first block, and sends the second notification information tx1 to tx9 to the memory pool module;
in step S19, the memory pool module deletes the transactions tx1 tx9 successfully executed in the first block from the memory pool according to the second notification message.
In further embodiments, the second notification information may be further configured to include each transaction that has failed to be executed, include an execution result of each transaction, include a transaction hash of each transaction that has succeeded in being executed, include a transaction hash of each transaction that has failed to be executed, include a transaction hash of each transaction and an execution result of each transaction, and the same technical effect may be achieved.
In a preferred embodiment, after the consensus module generates the first notification information according to the execution result of the first block sent by the execution module and sends the first notification information to the memory pool module, the method further includes: the consensus module deletes each pulled transaction.
FIG. 3 is a flow diagram of a preferred embodiment of the method shown in FIG. 1. As shown in fig. 3, in a preferred embodiment, in response to a successful mine mining, the consensus module pulls a plurality of transactions from the memory pool module and buffers the transactions, packages each pulled transaction to generate a first block, and before sending the first block to the execution module, the method further includes:
s10: the memory pool module receives the transaction sent by each client and the transaction broadcast by the node of each block chain, and detects the correctness of each received transaction:
if so, step S11 is executed to broadcast each received transaction to other nodes of the blockchain.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 4, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to an embodiment of the present disclosure, the method for defending against false transaction attacks described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing a method of defending against false transaction attacks. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the method of defending against false transaction attacks described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (6)

1. A method for defending against false transaction attacks, the method being applied to a node of a blockchain, the method comprising:
in response to the success of mining, the consensus module pulls a plurality of transactions from the memory pool module and caches the transactions, packages each pulled transaction to generate a first block, and sends the first block to the execution module;
the execution module receives and executes each transaction of the first block, and sends an execution result of the first block to the consensus module;
the consensus module generates first notification information according to an execution result of the first block sent by the execution module, and sends the first notification information to the memory pool module;
and the memory pool module deletes each transaction which fails to be executed in the first block from the memory pool according to the first notification message.
2. The method of claim 1, wherein the executing module receives and executes each transaction of the first block, and after sending the execution result of the first block to the consensus module, the method further comprises:
the execution module sends an execution result of executing the first block to a storage module;
the storage module receives and stores the execution result of the first block and broadcasts the execution result of the first block to other nodes of a block chain;
the storage module generates second notification information according to the execution result of the first block and sends the second notification information to a memory pool module;
and the memory pool module deletes each transaction which is executed successfully in the first block from the memory pool according to the second notification information.
3. The method of claim 1, wherein the recognizing module generates a first notification message according to the execution result of the first block sent by the executing module, and sends the first notification message to the memory pool module, and further comprising:
the consensus module deletes each of the pulled transactions.
4. The method of claim 1, wherein, prior to the identifying module pulling and buffering a number of transactions from a memory pool module in response to a mine excavation success, and packaging each pulled transaction to generate a first block and sending the first block to an execution module, further comprising:
the memory pool module receives the transaction sent by each client and the transaction broadcast by the node of each block chain, and detects the correctness of each received transaction:
if so, the received transactions are broadcast to other nodes of the blockchain.
5. A computer device, the device comprising:
one or more processors;
memory storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-4.
6. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-4.
CN201910469441.9A 2019-05-31 2019-05-31 Method, device and storage medium for defending against false transaction attacks Active CN110191130B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910469441.9A CN110191130B (en) 2019-05-31 2019-05-31 Method, device and storage medium for defending against false transaction attacks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910469441.9A CN110191130B (en) 2019-05-31 2019-05-31 Method, device and storage medium for defending against false transaction attacks

Publications (2)

Publication Number Publication Date
CN110191130A CN110191130A (en) 2019-08-30
CN110191130B true CN110191130B (en) 2021-07-06

Family

ID=67719406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910469441.9A Active CN110191130B (en) 2019-05-31 2019-05-31 Method, device and storage medium for defending against false transaction attacks

Country Status (1)

Country Link
CN (1) CN110191130B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107481011A (en) * 2017-08-11 2017-12-15 杭州秘猿科技有限公司 A kind of transaction rapid acknowledgment method based on license chain
CN109087098A (en) * 2018-07-27 2018-12-25 杭州复杂美科技有限公司 A kind of transaction processing method, system, equipment and storage medium for permitting chain
WO2018234988A1 (en) * 2017-06-20 2018-12-27 nChain Holdings Limited Methods and systems for a consistent distributed memory pool in a blockchain network
CN109150598A (en) * 2018-08-10 2019-01-04 上交所技术有限责任公司 A kind of BFT common recognition algorithm bandwidth utilization rate improved method based on block piece
CN109304033A (en) * 2018-08-31 2019-02-05 杭州复杂美科技有限公司 A kind of computer game system and method, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180114218A1 (en) * 2016-10-26 2018-04-26 International Business Machines Corporation Blockchain: automatic fork protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018234988A1 (en) * 2017-06-20 2018-12-27 nChain Holdings Limited Methods and systems for a consistent distributed memory pool in a blockchain network
CN107481011A (en) * 2017-08-11 2017-12-15 杭州秘猿科技有限公司 A kind of transaction rapid acknowledgment method based on license chain
CN109087098A (en) * 2018-07-27 2018-12-25 杭州复杂美科技有限公司 A kind of transaction processing method, system, equipment and storage medium for permitting chain
CN109150598A (en) * 2018-08-10 2019-01-04 上交所技术有限责任公司 A kind of BFT common recognition algorithm bandwidth utilization rate improved method based on block piece
CN109304033A (en) * 2018-08-31 2019-02-05 杭州复杂美科技有限公司 A kind of computer game system and method, equipment and storage medium

Also Published As

Publication number Publication date
CN110191130A (en) 2019-08-30

Similar Documents

Publication Publication Date Title
CN109410045B (en) Parallel chain consensus method, equipment and storage medium
US8769536B2 (en) Processing a batched unit of work
CN110401720B (en) Information processing method, device, system, application server and medium
CN110516150B (en) Parallel chain transaction pushing method, equipment and storage medium
US9747217B2 (en) Distributed history buffer flush and restore handling in a parallel slice design
CN112583811B (en) Wallet finding method, equipment and storage medium
CN106294357A (en) Data processing method and stream calculation system
CN110188103A (en) Data account checking method, device, equipment and storage medium
CN109981715B (en) Session management method and device
EP4092554A1 (en) Real-time streaming graph queries
CN110868276A (en) Data transmission method and system for Internet of things equipment and electronic equipment
CN103377043A (en) Message queue achieving method and system and message queue processing system
CN111078696A (en) Block generation method, device and storage medium
CN110191130B (en) Method, device and storage medium for defending against false transaction attacks
CN111523896B (en) Attack prevention method, apparatus and storage medium
US7346690B1 (en) Deferred piggybacked messaging mechanism for session reuse
CN109801168B (en) Block chain transaction verification method, equipment and storage medium
US10402234B2 (en) Fine-grain synchronization in data-parallel jobs
WO2022171190A1 (en) Fixed execution sequence transaction method, and apparatus
CN111639939A (en) Block restoring method, equipment and storage medium
KR101518111B1 (en) Anti-malware system and data processing method thereof
CN111526211B (en) Asset transfer method, device and storage medium
CN110990490A (en) Method, device, equipment and medium for posting block chain in block chain network
CN111292028A (en) Inventory information processing method and system, computer system and readable storage medium
CN113744055B (en) Cross-link message transmission method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant