CN110197377A - A kind of block chain transaction validation verification method, apparatus and electronic equipment - Google Patents

A kind of block chain transaction validation verification method, apparatus and electronic equipment Download PDF

Info

Publication number
CN110197377A
CN110197377A CN201910505649.1A CN201910505649A CN110197377A CN 110197377 A CN110197377 A CN 110197377A CN 201910505649 A CN201910505649 A CN 201910505649A CN 110197377 A CN110197377 A CN 110197377A
Authority
CN
China
Prior art keywords
block
transaction
interval
network
network state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910505649.1A
Other languages
Chinese (zh)
Inventor
张亚宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cryptape Co ltd
Original Assignee
Cryptape Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cryptape Co ltd filed Critical Cryptape Co ltd
Priority to CN201910505649.1A priority Critical patent/CN110197377A/en
Publication of CN110197377A publication Critical patent/CN110197377A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This specification embodiment is related to a kind of block chain transaction validation verification method, apparatus, system and electronic equipment, is applied in the exchange of assets of block chain, specifically includes that treating the validity interval for being packaged transaction and its first connected transaction is configured;Wherein, the place block of the first connected transaction is the first block;Next block of first block is added up to interval of the current block under normal network conditions, obtains an accumulation interval;When the accumulation interval is greater than the validity interval, judgement is described effective wait be packaged transaction;Otherwise, judge the transaction invalid to be packaged.It by being guaranteed the minimum transaction and the actual interval of first connected transaction according to network condition adjustment, automatically prolongs the entry-into-force time of trading of guaranteeing the minimum in Network Abnormal, allows exchange of assets side to there is enough time and strategy reply network to do evil behavior, efficiently solve network attack risk.

Description

A kind of block chain transaction validation verification method, apparatus and electronic equipment
Technical field
This specification embodiment be related to network technique field more particularly to a kind of block chain transaction validation verification method, Apparatus system and electronic equipment.
Background technique
There is the decentralization of different assets exchange in block catenary system, due to exchange both sides have it is incredible because Element needs to guarantee to the maximum extent using safer exchange scheme the assets security of both sides.Currently, assets atom exchanges (Atomic Swap) is more commonly used scheme.With use bit coin (Bitcoin, i.e. BTC) exchange ether mill (Ethereum, That is ETH) for, user A is exchanged using 1 BTC assets with 3 ETH assets of user B.
User A need to create a real consumption transaction TX1, i.e. transaction content is that the 1BTC of oneself is sent to user B's Account;Creation one is guaranteed the minimum the TX2 that trades simultaneously, and transaction content is after the certain time interval with TX1, by 1BTC to be exchanged The account of A oneself is returned, TX1 is the first connected transaction of TX2.The trade purpose of TX2 of guaranteeing the minimum is: not having in exchange of assets Successfully after a certain period of time (such as user B goes back on one's word, and there is no 3ETH is sent to A account), as long as TX2 meets the time with TX1 Interval is the packing that comes into effect, then A can still bring back one's own assets.
But in actual operation, generally the passage of institute's having time between first connected transaction and transaction of guaranteeing the minimum is carried out tired Meter.If after user A takes the assets of user B away, carrying out malicious network attacks and causing network congestion, B can not take 1BTC away in time, And TX2 reaches the entry-into-force time.Final A has taken all assets, causes the loss of B.
Summary of the invention
This specification embodiment provides a kind of block chain transaction validation verification method, apparatus and electronic equipment, to solve Certainly in the prior art between first connected transaction and transaction of guaranteeing the minimum the problem of network attack risk brought by Fixed Time Interval.
In order to solve the above-mentioned technical problem, this specification embodiment adopts the following technical solutions:
In a first aspect, providing a kind of block chain transaction validation verification method, it is applied in the exchange of assets of block chain, institute The method of stating includes:
The validity interval for treating packing transaction and its first connected transaction is configured;
Wherein, the place block of the first connected transaction is the first block;
Next block of first block is added up to interval of the current block under normal network conditions, is obtained One accumulation interval;
When the accumulation interval is greater than the validity interval, judgement is described effective wait be packaged transaction;Otherwise, described in judgement Transaction invalid to be packaged.
Second aspect provides a kind of block chain transaction validation verification device, is applied in the exchange of assets of block chain, institute Stating device includes:
Setup module, the validity interval for treating packing transaction and its first connected transaction are configured;
Wherein, the place block of the first connected transaction is the first block;
Accumulation module carries out next block of first block to interval of the current block under normal network conditions It is accumulative, obtain an accumulation interval;
Judgment module, for when the accumulation interval is greater than the validity interval, judging that the transaction to be packaged has Effect;Otherwise, judge the transaction invalid to be packaged.
The third aspect provides a kind of electronic equipment, comprising: one or more processors and memory, wherein memory Comprising the one or more computer programs that can be executed by the one or more processors, so that the one or more processors Execute the block chain transaction validation verification method that each embodiment provides according to the present invention.
Fourth aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count Calculation machine executes the block chain transaction validation verification method that each embodiment provides according to the present invention.
At least one above-mentioned technical solution that this specification embodiment uses can reach following the utility model has the advantages that transaction of guaranteeing the minimum Actual interval between first connected transaction can be according to network condition adjust automatically, and automatically prolong its transaction in Network Abnormal Entry-into-force time allows exchange of assets side to have time enough and strategy reply network to do evil behavior, to protect itself fictitious assets Safety.Efficiently solve network attack risk brought by Fixed Time Interval between first connected transaction and transaction of guaranteeing the minimum.In addition, Transaction validity interval both can be the interval on temporal meaning, be also possible to the interval of block height, more friendly to user.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification embodiment are not paying creative labor for those of ordinary skill in the art Under the premise of dynamic property, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the step schematic diagram for the block chain transaction validation verification method that this specification embodiment provides;
Fig. 2 is the structural schematic diagram for the block chain transaction validation verification device that this specification embodiment provides;
Fig. 3 is the structural schematic diagram for the electronic equipment that this specification embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of this specification embodiment clearer, have below in conjunction with this specification The technical solution of this specification embodiment is clearly and completely described in body embodiment and corresponding attached drawing.Obviously, described Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this Field those of ordinary skill every other embodiment obtained without making creative work, belongs to this explanation The range of book embodiment protection.
Below in conjunction with attached drawing, the technical solution that each embodiment of this specification provides is described in detail.
Still by taking user A is with 3 ETH of 1 BTC exchange user B as an example, exchange of assets process is as follows:
(1) A provides digital x at random, and carries out Hash processing to it, obtains hash (x);
(2) A creates real consumption transaction TX1, and transaction content is the account that 1BTC is sent to B.
At least one of 2. transaction TX1 must satisfy condition and 1. can be performed:
Condition is 1.: B discloses x, and TX1 has the signature of B,
Condition is 2.: TX1 has the signature of two side of A, B;
(3) A creates guarantee the minimum trade TX2 corresponding with first connected transaction TX1, and transaction content is to send out 1BTC from TX1 The account of A is returned, and to the validity interval Interval-A of TX2 setting one and TX1, then A signs to TX2;
(4) TX2 is sent to B by A;
(5) B signs to TX2 and returns to A, and TX2 possesses the signature of A, B simultaneously at this time, condition is met 2., due to effective The presence of property interval Interval-A, TX2 can not come into force at once;
(6) A is submitted on TX1 to network.But BTC can not really be sent to the account of B at this time, because B discloses x not yet, Condition is not met 1.;
(7) corresponding with A, B creates real consumption transaction TX3, and transaction content is the account that 3ETH is sent to A. At least one of 4. transaction TX3 must satisfy condition and 3. can be performed:
Condition is 3.: A discloses x, and TX3 has the signature of A,
Condition is 4.: TX3 has the signature of two side of A, B
(8) B creates guarantee the minimum trade TX4 corresponding with first connected transaction TX3, and transaction content is to send out 3ETH from TX3 The account of B is returned, and to the validity interval Interval-B of TX4 setting one and TX3, then B signs to TX4
(9) TX4 is sent to A by B;
(10) A signs to TX4 and returns to B, and TX4 possesses the signature of A, B simultaneously at this time, condition is met 4., due to having The presence of effect property interval Interval-B, TX4 can not come into force at once;
(11) B is submitted on TX3 to network;
(12) A takes wherein the TX3 x generated in step (1) using oneself and the signature (meeting condition 3.) of oneself away 3ETH;
(13) since A exposes x in step (12), B then can be used x and take 1BTC (meeting condition 1.) in TX1 away.
Complete exchange of assets under the scene of mutual mistrust by above procedure user A and B, wherein transaction it is effective Property interval plays important function, such as:
When step (6) carry out, B is not intended to swap with A, then without remaining operations, A is remained at validity interval When Interval-A meets, 1BTC returned in oneself account in 48 hours by the TX2 that trades of guaranteeing the minimum after being initiated such as TX1, because Meet condition 2. for TX2 at this time.
In step (12), after A takes the 3ETH of B away, due to the presence of validity interval Interval-A, A still can not horse On take oneself 1BTC away, and B has time enough to take 1BTC away from TX2 after knowing x.
It can be seen that the guaranteeing the minimum transaction for being provided with validity interval is gone back on one's word to user and situations such as subjective malignant is occupied can have The prevention of effect, but how to compare validity interval and validation verification is carried out to transaction of guaranteeing the minimum, then it is asking for emphasis solution of the present invention Topic.
Embodiment one
Shown in referring to Fig.1, a kind of block chain provided for this specification embodiment trade validation verification method the step of Schematic diagram, the method are applied in the exchange of assets of block chain, and the transaction to be packaged that need to verify validity can provide for block chain Produce the transaction of guaranteeing the minimum in exchange, for example, transaction TX2 or TX4 as mentioned above.
The block chain transaction validation verification method may comprise steps of:
Step 101: the validity interval for treating packing transaction and its first connected transaction is configured;Wherein, it is described The place block of first connected transaction is the first block;
Step 102: next block of first block is carried out to interval of the current block under normal network conditions It is accumulative, obtain an accumulation interval;
Step 103: when the accumulation interval is greater than the validity interval, judgement is described effective wait be packaged transaction;Otherwise, Judge the transaction invalid to be packaged.
Optionally, the method also includes: effective transaction is packed into new block, and by the temporal information of the block, Its block head is written in block height and network state.
Optionally, the validity interval includes validity time interval or validity block vertical separation.
Optionally, in the method, to next block of first block to current block under normal network conditions Interval added up, obtain an accumulation interval, further include steps of
To each block of next block of first block into the difference in height of current block, remember in the build of interrogation zone The network state of record;
When the network state is abnormal, the time difference of the block and its previous block does not charge to the accumulation interval;
When the network state is normal, the time difference of the block and its previous block charges to the accumulation interval;
Or;
To each block of next block of first block into the difference in height of current block, remember in the build of interrogation zone The network state of record;
When the network state is abnormal, the difference in height of the block and its previous block does not charge to the accumulation interval;
When the network state is normal, the difference in height of the block and its previous block charges to the accumulation interval.
Optionally, when there is transaction congestion or Client-initiated Network Abnormal is requested, judge the network state to be different Often.
Optionally, the transaction congestion further comprises:
When the number of transaction in single block is greater than the first given threshold, it is judged as transaction congestion
And/or;
When the tranaction costs summation in single block is greater than the second given threshold, it is judged as transaction congestion.
It is further to concrete methods of realizing below to be illustrated, it should be appreciated that the citing is only this specification embodiment Preferred embodiment, be not intended to limit the protection scope of this specification embodiment.
The setting at the validity interval can be by adding the domain since, to have described in indicating in the data structure of transaction Effect property interval, user write setting value in the domain since.
When effective transaction is packed into new block, the domain timestop is added within a block, if detected in block out Network Abnormal then sets true for timestop;If detecting that network condition is normal when block out, timestop is arranged For false;The timestop information write area build.
In the calculating of the accumulation interval, to next block of first block into the difference in height of current block Each block, the timestop recorded in the build of interrogation zone.If timestop is true, the block and its previous block Time difference/block difference in height is not counted in accumulation interval;If timestop is false, the block and its previous block when Between difference/block difference in height be included in accumulation interval.When the calculated accumulation interval is greater than the validity interval being arranged in since When, judge that described wait be packaged transaction be effective, otherwise transaction invalid to be packaged described in judgement.
It, can one of by the following method in network state whether in Yi Chang judgement:
Configuration item congested_size is arranged to block, when the transaction data in block is greater than congested_size When, then it is judged as transaction congestion, network condition is abnormal;
Configuration item congested_fee is arranged to block, when the tranaction costs summation in block is greater than congested_fee When, then it is judged as transaction congestion, network condition is abnormal;
Configuration item blockchain_anomaly is managed to block setting network-external, when the configuration item is by user setting When true, i.e., expression user initiates Network Abnormal request, then judges network condition for exception.
Judge it can be seen from described above whether effective according to as the interval under normal network conditions wait be packaged transaction The accumulative validity interval with setting is made comparisons, and under network abnormal situation, actual time passage or block height are cumulative Including being not counted in.Therefore in transaction executes, the actual interval of first connected transaction and transaction of guaranteeing the minimum is not fixed, but according to network State voluntarily adjusts, and efficiently solves network attack wind brought by Fixed Time Interval between first connected transaction and transaction of guaranteeing the minimum Danger.
In A, B process of exchange described above, after A has taken 3ETH away in step 12, even if by network attack means, Network congestion is caused, congestion time/block height does not calculate in accumulation interval.Coming into force for TX2 needs longer time passage/block Height is cumulative.User B is still taken away the assets of 1BTC by the sufficient time, protects the fictitious assets safety of itself.In addition, transaction has Effect property interval both can be the interval on temporal meaning, be also possible to the interval of block height, more friendly to user.
Embodiment two
Referring to shown in Fig. 2, for the structural representation for the block chain transaction validation verification device that this specification embodiment provides Figure, the device mainly includes:
Setup module 201, the validity interval for treating packing transaction and its first connected transaction are configured;
Wherein, the place block of the first connected transaction is the first block;
Accumulation module 202, the interval to next block of first block to current block under normal network conditions Added up, obtains an accumulation interval;
Judgment module 203, for when the accumulation interval is greater than the validity interval, judgement to be described wait be packaged transaction Effectively;Otherwise, judge the transaction invalid to be packaged.
Optionally, which further comprises:
Packetization module, for effective transaction to be packed into new block;
Writing module, for its block head to be written in the temporal information of the block, block height and network state.
Optionally, the accumulation module further comprises
Enquiry module, for each block of the next block to first block into the difference in height of current block, The network state recorded in the build of interrogation zone;
Computing module, for when the network state is abnormal, the time difference of the block and its previous block not to be remembered Enter the accumulation interval;When the network state is normal, the time difference of the block and its previous block is charged to described tired Meter interval;
Or;
The computing module is used for when the network state is abnormal, and the difference in height of the block and its previous block is not remembered Enter the accumulation interval;When the network state is normal, the difference in height of the block and its previous block is charged to described accumulative Interval.
Optionally, described device further comprises Network anomaly detection module, is detecting Client-initiated Network Abnormal When number of transaction when request, or in single block is greater than the first given threshold, or the tranaction costs summation in single block is big When the second given threshold, judge network state for exception.
Judge it can be seen from described above whether effective according to as the interval under normal network conditions wait be packaged transaction The accumulative validity interval with setting is made comparisons, and under network abnormal situation, actual time passage or block height are cumulative Including being not counted in.Therefore in transaction executes, the actual interval of first connected transaction and transaction of guaranteeing the minimum is not fixed, but according to network State voluntarily adjusts, and efficiently solves network attack wind brought by Fixed Time Interval between first connected transaction and transaction of guaranteeing the minimum Danger.
Embodiment three
The electronic equipment of this specification embodiment is discussed in detail referring to Fig. 3.Referring to FIG. 3, in hardware view, the electricity Sub- equipment includes one or more processors and memory.Optionally further comprising internal bus, network interface.Wherein, memory It may include memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non- Volatile memory (Non-VolatileMemory), for example, at least 1 magnetic disk storage etc..Certainly, which may be used also It can include hardware required for other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be industry Standard architecture (Industry Standard Architecture, ISA) bus, Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, Control bus etc..Only to be indicated with a four-headed arrow in Fig. 3, it is not intended that an only bus or one kind convenient for indicating The bus of type.
Memory, for storing computer program.Specifically, computer program may include program code, described program Code includes computer operation instruction.Memory may include memory and nonvolatile memory, and provide instruction to processor And data.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer Block chain transaction validation verification device is formed on face.Processor executes the program that memory is stored, and is specifically used for executing Performed method operation when block chain transaction validation verification device described previously is as executing subject.
Method disclosed in the above-mentioned embodiment illustrated in fig. 1 such as this specification can be applied in processor, or by processor It realizes.Processor may be a kind of IC chip, the processing capacity with signal.During realization, the above method Each step can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.Above-mentioned processor It can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance Body pipe logical device, discrete hardware components.It may be implemented or execute disclosed each method, the step in this specification embodiment And logic diagram.General processor can be microprocessor or the processor is also possible to any conventional processor etc..Knot The step of closing method disclosed in this specification embodiment can be embodied directly in hardware decoding processor and execute completion, Huo Zheyong Hardware and software module combination in decoding processor execute completion.Software module can be located at random access memory, flash memory, read-only The storage medium of this fields such as memory, programmable read only memory or electrically erasable programmable memory, register maturation In.The storage medium is located at memory, and processor reads the information in memory, and the step of the above method is completed in conjunction with its hardware Suddenly.
The method that the electronic equipment can also carry out Fig. 1, and realize block chain transaction validation verification embodiment shown in Fig. 1 Function, details are not described herein for this specification embodiment.
Certainly, other than software realization mode, other realization sides are not precluded in the electronic equipment of this specification embodiment Formula, such as logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is simultaneously unlimited Due to each logic unit, it is also possible to hardware or logical device.
Example IV
This specification embodiment also provides a kind of storage medium for being stored with computer program, the computer-readable storage Media storage one or more program, one or more of programs are used by the processor to execute the block chain for being described in the application Transaction validation verification method.
The computer readable storage medium can be computer-readable storage medium included in the device of above-described embodiment Matter;It is also possible to individualism, without the computer readable storage medium in supplying equipment.Wherein, described computer-readable Storage medium, such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc..
In short, being not intended to limit this specification the foregoing is merely the preferred embodiment of this specification embodiment The protection scope of embodiment.It is all this specification embodiment spirit and principle within, made any modification, equivalent replacement, Improve etc., it should be included within the protection scope of this specification embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
Various embodiments are described in a progressive manner in this specification embodiment, identical phase between each embodiment As partially may refer to each other, each embodiment focuses on the differences from other embodiments.This field skill Art personnel should be appreciated that invention scope involved in the application is not limited to skill made of the specific combination of above-mentioned technical characteristic Art scheme, while should also cover in the case where not departing from the application design, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (12)

  1. A kind of validation verification method 1. block chain is traded, is applied in the exchange of assets of block chain, which comprises
    The validity interval for treating packing transaction and its first connected transaction is configured;
    Wherein, the place block of the first connected transaction is the first block;
    Next block of first block is added up to interval of the current block under normal network conditions, it is tired to obtain one Meter interval;
    When the accumulation interval is greater than the validity interval, judgement is described effective wait be packaged transaction;Otherwise, judgement is described wait beat Packet transaction invalid.
  2. 2. the method as described in claim 1 further comprises: effective transaction being packed into new block, and by the block Its block head is written in temporal information, block height and network state.
  3. 3. method according to claim 2 further comprises: the validity interval include validity time interval or effectively Property block vertical separation.
  4. 4. method as claimed in claim 3, wherein to next block of first block to current block in proper network Interval under state is added up, and is obtained an accumulation interval, is further included steps of
    To each block of next block of first block into the difference in height of current block, recorded in the build of interrogation zone The network state;
    When the network state is abnormal, the time difference of the block and its previous block does not charge to the accumulation interval;
    When the network state is normal, the time difference of the block and its previous block charges to the accumulation interval;
    Or;
    To each block of next block of first block into the difference in height of current block, recorded in the build of interrogation zone The network state;
    When the network state is abnormal, the difference in height of the block and its previous block does not charge to the accumulation interval;
    When the network state is normal, the difference in height of the block and its previous block charges to the accumulation interval.
  5. 5. method according to claim 2 further comprises, when transaction congestion or the request of Client-initiated Network Abnormal, Judge the network state for exception.
  6. 6. method as claimed in claim 5, wherein the transaction congestion further comprises:
    When the number of transaction in single block is greater than the first given threshold, it is judged as transaction congestion
    And/or;
    When the tranaction costs summation in single block is greater than the second given threshold, it is judged as transaction congestion.
  7. The validation verification device 7. a kind of block chain is traded, is applied in the exchange of assets of block chain, described device includes:
    Setup module, the validity interval for treating packing transaction and its first connected transaction are configured;
    Wherein, the place block of the first connected transaction is the first block;
    Accumulation module carries out to interval of the current block under normal network conditions next block of first block tired Meter, obtains an accumulation interval;
    Judgment module, for when the accumulation interval is greater than the validity interval, judgement to be described effective wait be packaged transaction;It is no Then, judge the transaction invalid to be packaged.
  8. 8. device as claimed in claim 7, further comprises:
    Packetization module, for effective transaction to be packed into new block;
    Writing module, for its block head to be written in the temporal information of the block, block height and network state.
  9. 9. device as claimed in claim 8, the accumulation module further comprise
    Enquiry module, for each block of the next block to first block into the difference in height of current block, inquiry The network state recorded in block head;
    Computing module, for when the network state is abnormal, the time difference of the block and its previous block not to be charged to institute Accumulation interval is stated, when the network state is normal, the time difference of the block and its previous block is charged between described add up Every;
    Or;
    The computing module is used for when the network state is abnormal, and the difference in height of the block and its previous block does not charge to institute State accumulation interval;When the network state is normal, the difference in height of the block and its previous block charges to the accumulation interval.
  10. 10. device as claimed in claim 8, further comprises, Network anomaly detection module, for detecting user's initiation Network Abnormal request when, or when number of transaction in single block is greater than the first given threshold, or the transaction in single block When expense summation is greater than the second given threshold, judge network state for exception.
  11. 11. a kind of electronic equipment, comprising:
    One or more processors;
    Memory, for storing one or more computer programs;
    When one or more of programs are executed by one or more of processors, so that one or more of processors Execute such as method of any of claims 1-6.
  12. 12. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed Benefit requires method described in any one of 1-6.
CN201910505649.1A 2019-06-12 2019-06-12 A kind of block chain transaction validation verification method, apparatus and electronic equipment Pending CN110197377A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910505649.1A CN110197377A (en) 2019-06-12 2019-06-12 A kind of block chain transaction validation verification method, apparatus and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910505649.1A CN110197377A (en) 2019-06-12 2019-06-12 A kind of block chain transaction validation verification method, apparatus and electronic equipment

Publications (1)

Publication Number Publication Date
CN110197377A true CN110197377A (en) 2019-09-03

Family

ID=67754493

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910505649.1A Pending CN110197377A (en) 2019-06-12 2019-06-12 A kind of block chain transaction validation verification method, apparatus and electronic equipment

Country Status (1)

Country Link
CN (1) CN110197377A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110648125A (en) * 2019-09-10 2020-01-03 杭州秘猿科技有限公司 Packaging transaction method and device and electronic equipment
CN111786797A (en) * 2020-07-03 2020-10-16 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN116757849A (en) * 2023-08-14 2023-09-15 中资科技(江苏)有限公司 Asset management system and method based on block chain

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110648125A (en) * 2019-09-10 2020-01-03 杭州秘猿科技有限公司 Packaging transaction method and device and electronic equipment
CN110648125B (en) * 2019-09-10 2022-08-02 杭州秘猿科技有限公司 Packaging transaction method and device, electronic equipment and storage medium
CN111786797A (en) * 2020-07-03 2020-10-16 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN111786797B (en) * 2020-07-03 2022-10-18 四川阵风科技有限公司 Time effectiveness verification method for three-party communication
CN116757849A (en) * 2023-08-14 2023-09-15 中资科技(江苏)有限公司 Asset management system and method based on block chain
CN116757849B (en) * 2023-08-14 2023-10-20 中资科技(江苏)有限公司 Asset management system and method based on block chain

Similar Documents

Publication Publication Date Title
TWI733057B (en) Method and device for resource transfer and fund transfer
TWI698820B (en) Consensus verification method and device
TWI737183B (en) File similarity detection method and system based on blockchain and non-transient computer readable media
CN109003175B (en) Account checking method and system based on block chain
TWI715217B (en) Screen recording and evidence collection method, system and electronic equipment based on blockchain
CN110197377A (en) A kind of block chain transaction validation verification method, apparatus and electronic equipment
EP3780541B1 (en) Identity information identification method and device
US20210158454A1 (en) Method and device for data processing based on blockchain
US11100284B2 (en) Blockchain-based text similarity detection method, apparatus and electronic device
KR20190025005A (en) Method and device for controlling data risk
CN110490773A (en) A kind of record screen evidence collecting method, device and electronic equipment based on block chain
EP3267382A1 (en) Method and device for processing electronic currency
WO2020134898A1 (en) Hash information processing method and system for storage records in block of blockchain
TWI737118B (en) Method, device and electronic equipment for reconciliation based on alliance chain
CN110505311A (en) A kind of across the chain exchange method of isomorphism block chain and system
CN109474682A (en) A kind of block chain network transmission method, device and electronic equipment
US20200372511A1 (en) Information Reminding Method and Apparatus, and Electronic Device
CN110246039A (en) Transaction detection method, apparatus and electronic equipment based on alliance's chain
CN101595500A (en) The secure execution environments that decomposes
US20240078551A1 (en) Blockchain-based user element authorization methods and apparatuses
CN106572056B (en) A kind of risk monitoring and control method and device
CN109389377A (en) A kind of contactless static signature method, apparatus, electronic equipment and system
CN108717629A (en) A kind of intelligent payment method, system and electronic equipment
CN110443612A (en) A kind of dividing method of submitting an expense account, device and electronic equipment based on block chain
CN111028083A (en) Evaluation method, device and system for address of block chain wallet and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190903

RJ01 Rejection of invention patent application after publication