CN111614646A - Malicious transaction deletion method and device for alliance chain and electronic equipment - Google Patents

Malicious transaction deletion method and device for alliance chain and electronic equipment Download PDF

Info

Publication number
CN111614646A
CN111614646A CN202010405482.4A CN202010405482A CN111614646A CN 111614646 A CN111614646 A CN 111614646A CN 202010405482 A CN202010405482 A CN 202010405482A CN 111614646 A CN111614646 A CN 111614646A
Authority
CN
China
Prior art keywords
transaction
chain
malicious
block height
alliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010405482.4A
Other languages
Chinese (zh)
Inventor
王晓亮
李耀荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Rivtower Technology Co Ltd
Original Assignee
Hangzhou Rivtower Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Rivtower Technology Co Ltd filed Critical Hangzhou Rivtower Technology Co Ltd
Priority to CN202010405482.4A priority Critical patent/CN111614646A/en
Publication of CN111614646A publication Critical patent/CN111614646A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The embodiment of the specification relates to a method, a device and electronic equipment for deleting malicious transactions in a alliance chain, and specifically comprises the following steps: when the alliance chain normally runs, collecting transaction information on the chain in real time; after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block; determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction; deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes; restarting all the alliance chain nodes to enable the alliance chain to work normally; and replaying all other transaction information except the malicious transaction from the first block height to the current block height. By utilizing the characteristic that the alliance chain can control all nodes, and deleting all transactions from the block where the malicious transaction is located to the current block, the technical requirement that the alliance chain controls the chain transmission of the malicious information in the prior art is met.

Description

Malicious transaction deletion method and device for alliance chain and electronic equipment
Technical Field
The embodiment of the specification relates to the technical field of networks, in particular to a method and a device for deleting malicious transactions of a alliance chain and electronic equipment.
Background
The blockchain adopts a decentralized storage technology, achieves multi-copy storage through a consensus mechanism, and the storage mode takes transaction as a basic unit. Public chains are open to all users, requiring the deactivation of participants with tokens in order to encourage ordinary users to actively participate. The alliance chain is mostly used for cooperation between organizations and institutions, has a certain admission threshold, and needs to perform certain management and compliance control on each node. In real-world applications, it is sometimes necessary to control some malicious information dissemination; in a federation chain system, it is also desirable to be able to remove some malicious transaction that has occurred.
Disclosure of Invention
The embodiment of the specification provides a method and a device for deleting malicious transactions of a alliance chain and electronic equipment, and aims to solve the technical requirement that the alliance chain controls the chain propagation of malicious information in the prior art.
In order to solve the above technical problem, the embodiments of the present specification adopt the following technical solutions:
in a first aspect, a method for deleting a malicious transaction in a federation chain is provided, the method comprising:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
In a second aspect, there is provided a federation chain malicious transaction deletion apparatus, the apparatus comprising:
a transaction information collection unit: the system is used for collecting the transaction information on the chain in real time when the alliance chain operates normally;
a node suspension unit: the system is used for suspending all alliance chain nodes after discovering malicious transactions and determining the current block height;
a block height determination unit: the height of a first block where the malicious transaction is located is determined according to the transaction hash of the malicious transaction;
a block deleting unit: means for deleting all blocks in the interval from the first block height to a current block height in all federation link nodes;
a node restarting unit: the method is used for restarting all the alliance chain nodes to enable the alliance chain to work normally;
a transaction playback unit: the system is used for replaying all transaction information except the malicious transaction in the interval from the first block height to the current block height.
In a third aspect, an electronic device is provided, including:
a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
In a fourth aspect, the present invention also provides a computer-readable storage medium storing one or more programs which, when executed by an electronic device including a plurality of application programs, cause the electronic device to perform:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects: by utilizing the characteristic that the alliance chain can control all nodes, and deleting all transactions from the block where the malicious transaction is located to the current block, the technical requirement that the alliance chain controls the chain transmission of the malicious information in the prior art is met. Meanwhile, through transaction replay, other normal transaction information is guaranteed to be still stored in a chain.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative efforts.
Fig. 1 is a schematic diagram illustrating steps of a method for deleting a malicious transaction in a federation chain according to an embodiment of the present specification;
fig. 2 is an operation schematic diagram of a malicious transaction deletion method of a federation chain according to an embodiment of the present specification;
fig. 3 is a schematic structural diagram of a malicious transaction deletion apparatus in a federation chain according to an embodiment of the present specification;
fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of this specification.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without any creative effort belong to the protection scope of the embodiments in the present specification.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
It should be noted that, in the public chain scenario, since the number of participating nodes is extremely large and uncontrollable, and there is no way to clearly know the location of the data copy, it is very difficult to completely delete an occurred transaction. In a alliance chain scene, the nodes which have joined the alliance chain can be clearly known, and the storage positions of all data copies can be clearly known, so that the theoretical feasibility of completely deleting a malicious transaction in the alliance chain is ensured. The precondition for the implementation of the present invention is that the blockchain is a federation chain, and all nodes participating in blockchain storage in the federation chain can be directly or indirectly controlled.
Example one
Referring to fig. 1, a malicious transaction deletion method for a federation chain provided for an embodiment of the present specification includes:
step 102: when the alliance chain normally runs, collecting transaction information on the chain in real time;
step 104: after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
step 106: determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
step 108: deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
step 110: restarting all the alliance chain nodes to enable the alliance chain to work normally;
step 112: and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
For example, as described below with reference to the operation diagram of fig. 2, when the federation chain is in normal operation, the transaction information on the chain is collected in real time; after the malicious transaction tx is found, suspending all alliance link nodes and determining the height h of the current block; determining a first block height h1 of the malicious transaction tx according to the transaction hash of the malicious transaction tx; deleting all blocks in the interval from the first block height to the current block height [ h1, h ] in all federation chain nodes; restarting all the alliance chain nodes to enable the alliance chain to work normally; all transaction information tx1, tx2 … … except the malicious transaction tx within the interval from the first tile height to the current tile height h1, h are replayed.
Optionally, in step 112, replaying all transaction information except the malicious transaction from the first block height to the current block height may further include:
after all alliance chain nodes are suspended, reading all transaction information except the malicious transaction from the first block height to the current block height from the collected alliance chain transaction information, and storing the transaction information in a transaction replay cache region;
and after all the alliance link nodes are restarted, all the transaction information in the transaction replay cache region is replayed.
Optionally, the replaying all the transaction information delivered to the replay buffer may further include: and sending the transaction content in the transaction information to a alliance chain for re-execution.
Optionally, in step 102, when the federation chain runs normally, the real-time collection of transaction information on the chain may further include the following steps:
monitoring the fast-out information of the alliance chain, and reading all transaction hashes of the specified blocks from the chain when the block height is increased;
reading transaction information from the chain according to the obtained transaction hash;
the transaction information is stored in a cache.
Alternatively, determining the current block height may be implemented by selecting one of the following ways:
checking a block height log output by the alliance chain; or
And checking the real-time block height displayed by the alliance chain browser.
According to the technical scheme, the technical requirement that the alliance chain controls the chain transmission of malicious information in the prior art is met by utilizing the characteristic that the alliance chain can control all nodes and deleting all transactions from the block where the malicious transaction is located to the current block. Meanwhile, through transaction replay, other normal transaction information is guaranteed to be still stored in a chain.
Example two
Referring to fig. 3, a schematic structural diagram of a malicious transaction deletion apparatus in a federation chain provided in this specification is mainly shown, where the apparatus mainly includes:
the transaction information collection unit 202: the system is used for collecting the transaction information on the chain in real time when the alliance chain operates normally;
node suspension unit 204: the system is used for suspending all alliance chain nodes after discovering malicious transactions and determining the current block height;
the block height determination unit 206: the height of a first block where the malicious transaction is located is determined according to the transaction hash of the malicious transaction;
the block deletion unit 208: means for deleting all blocks in the interval from the first block height to a current block height in all federation link nodes;
the node restart unit 210: the method is used for restarting all the alliance chain nodes to enable the alliance chain to work normally;
transaction playback unit 212: the system is used for replaying all transaction information except the malicious transaction in the interval from the first block height to the current block height.
Optionally, the transaction playback unit 212 further includes:
after all alliance chain nodes are suspended, reading all transaction information except the malicious transaction from the first block height to the current block height from the collected alliance chain transaction information, and storing the transaction information in a transaction replay cache region;
and after all the alliance link nodes are restarted, all the transaction information in the transaction replay cache region is replayed.
Optionally, the replaying all the transaction information delivered to the replay buffer may further include: and sending the transaction content in the transaction information to a alliance chain for re-execution.
Optionally, the transaction information collecting unit 202 further includes:
transaction hash reading unit 202-1: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for monitoring the fast-out information of a alliance chain, and reading all transaction hashes of a specified block from the chain when the block height is increased;
transaction information reading unit 202-2: the system is used for reading transaction information from the chain according to the obtained transaction hash;
transaction information caching unit 202-3: for storing the transaction information in the cache.
Alternatively, determining the current block height may be implemented by selecting one of the following ways:
checking a block height log output by the alliance chain; or
And checking the real-time block height displayed by the alliance chain browser.
Through the technical scheme of the specification: by utilizing the characteristic that the alliance chain can control all nodes, and deleting all transactions from the block where the malicious transaction is located to the current block, the technical requirement that the alliance chain controls the chain transmission of the malicious information in the prior art is met. Meanwhile, through transaction replay, other normal transaction information is guaranteed to be still stored in a chain.
It should be understood that the malicious transaction deletion apparatus in the second embodiment may execute all technical solutions related to the malicious transaction deletion method in the form of a functional module, and implement corresponding technical effects, which are not described herein again.
EXAMPLE III
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. Referring to fig. 4, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads a corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the block chain consensus device on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
The method performed by the apparatus according to the embodiments shown in fig. 1 and fig. 2 of the present specification may be implemented in a processor or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gates or transistor logic devices, discrete hardware components. The methods, steps, and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may also execute the method in fig. 1 and fig. 2, and implement the functions of the corresponding apparatus in the embodiments shown in fig. 1 and fig. 2, which are not described herein again in this specification.
Of course, besides the software implementation, the electronic device of the embodiment of the present disclosure does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
By utilizing the characteristic that the alliance chain can control all nodes, and deleting all transactions from the block where the malicious transaction is located to the current block, the technical requirement that the alliance chain controls the chain transmission of the malicious information in the prior art is met. Meanwhile, through transaction replay, other normal transaction information is guaranteed to be still stored in a chain.
Example four
Embodiments of the present specification also propose a computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a portable electronic device comprising a plurality of application programs, are capable of causing the portable electronic device to perform the method of the embodiments shown in fig. 1 and 2, and in particular to perform the method of:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
By utilizing the characteristic that the alliance chain can control all nodes, and deleting all transactions from the block where the malicious transaction is located to the current block, the technical requirement that the alliance chain controls the chain transmission of the malicious information in the prior art is met. Meanwhile, through transaction replay, other normal transaction information is guaranteed to be still stored in a chain.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present specification shall be included in the protection scope of the present specification.
The system, apparatus, module or unit illustrated in one or more of the above embodiments may be implemented by a computer chip or an entity, or by an article of manufacture with a certain functionality. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRA M), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically erasable programmable read only memory (EEP ROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.

Claims (12)

1. A federation chain malicious transaction deletion method, the method comprising:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
2. The method of claim 1, wherein replaying all transaction information except the malicious transaction from the first block height to the current block height further comprises:
after all alliance chain nodes are suspended, reading all transaction information except the malicious transaction from the first block height to the current block height from the collected alliance chain transaction information, and storing the transaction information in a transaction replay cache region;
and after all the alliance link nodes are restarted, all the transaction information in the transaction replay cache region is replayed.
3. The method of claim 2, wherein all transaction information submitted to the replay buffer is replayed, further comprising: and sending the transaction content in the transaction information to a alliance chain for re-execution.
4. The method of claim 1, wherein the online transaction information is collected in real time while the federation chain is operating normally; further comprising:
monitoring the fast-out information of the alliance chain, and reading all transaction hashes of the specified blocks from the chain when the block height is increased;
reading transaction information from the chain according to the obtained transaction hash;
the transaction information is stored in a cache.
5. The method of claim 1, wherein determining a current block height further comprises:
checking a block height log output by the alliance chain; or
And checking the real-time block height displayed by the alliance chain browser.
6. A federation chain malicious transaction deletion apparatus, the apparatus comprising:
a transaction information collection unit: the system is used for collecting the transaction information on the chain in real time when the alliance chain operates normally;
a node suspension unit: the system is used for suspending all alliance chain nodes after discovering malicious transactions and determining the current block height;
a block height determination unit: the height of a first block where the malicious transaction is located is determined according to the transaction hash of the malicious transaction;
a block deleting unit: means for deleting all blocks in the interval from the first block height to a current block height in all federation link nodes;
a node restarting unit: the method is used for restarting all the alliance chain nodes to enable the alliance chain to work normally;
a transaction playback unit: the system is used for replaying all transaction information except the malicious transaction in the interval from the first block height to the current block height.
7. The apparatus of claim 6, wherein the transaction playback unit further comprises:
after all alliance chain nodes are suspended, reading all transaction information except the malicious transaction from the first block height to the current block height from the collected alliance chain transaction information, and storing the transaction information in a transaction replay cache region;
and after all the alliance link nodes are restarted, all the transaction information in the transaction replay cache region is replayed.
8. The apparatus of claim 7, wherein all transaction information submitted to the replay buffer is replayed, further comprising: and sending the transaction content in the transaction information to a alliance chain for re-execution.
9. The apparatus of claim 6, wherein the transaction information collection unit further comprises:
a transaction hash reading unit: the system comprises a data processing module, a data processing module and a data processing module, wherein the data processing module is used for monitoring the fast-out information of a alliance chain, and reading all transaction hashes of a specified block from the chain when the block height is increased;
a transaction information reading unit: the system is used for reading transaction information from the chain according to the obtained transaction hash;
transaction information caching unit: for storing the transaction information in the cache.
10. The apparatus of claim 6, wherein determining a current block height further comprises:
checking a block height log output by the alliance chain; or
And checking the real-time block height displayed by the alliance chain browser.
11. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
12. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to perform:
when the alliance chain normally runs, collecting transaction information on the chain in real time;
after the malicious transaction is found, suspending all alliance link nodes and determining the height of the current block;
determining the height of a first block where the malicious transaction is located according to the transaction hash of the malicious transaction;
deleting all blocks in an interval from the first block height to a current block height in all alliance-link nodes;
restarting all the alliance chain nodes to enable the alliance chain to work normally;
and replaying all other transaction information except the malicious transaction from the first block height to the current block height.
CN202010405482.4A 2020-05-14 2020-05-14 Malicious transaction deletion method and device for alliance chain and electronic equipment Pending CN111614646A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010405482.4A CN111614646A (en) 2020-05-14 2020-05-14 Malicious transaction deletion method and device for alliance chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010405482.4A CN111614646A (en) 2020-05-14 2020-05-14 Malicious transaction deletion method and device for alliance chain and electronic equipment

Publications (1)

Publication Number Publication Date
CN111614646A true CN111614646A (en) 2020-09-01

Family

ID=72201471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010405482.4A Pending CN111614646A (en) 2020-05-14 2020-05-14 Malicious transaction deletion method and device for alliance chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN111614646A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN110049087A (en) * 2018-12-28 2019-07-23 阿里巴巴集团控股有限公司 A kind of reliability verification method, system, device and the equipment of alliance's chain
CN110611701A (en) * 2018-08-21 2019-12-24 汇链丰(北京)科技有限公司 Parameter configuration and transaction processing method based on block chain
CN111026569A (en) * 2019-10-25 2020-04-17 贵阳信息技术研究院(中科院软件所贵阳分部) Method for repairing designated block data in alliance chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN110611701A (en) * 2018-08-21 2019-12-24 汇链丰(北京)科技有限公司 Parameter configuration and transaction processing method based on block chain
CN110049087A (en) * 2018-12-28 2019-07-23 阿里巴巴集团控股有限公司 A kind of reliability verification method, system, device and the equipment of alliance's chain
CN111026569A (en) * 2019-10-25 2020-04-17 贵阳信息技术研究院(中科院软件所贵阳分部) Method for repairing designated block data in alliance chain

Similar Documents

Publication Publication Date Title
CN109658238B (en) Data processing method and device
CN113840012B (en) Block chain-based screen recording evidence obtaining method and system and electronic equipment
CN108846749B (en) Partitioned transaction execution system and method based on block chain technology
CN111383031B (en) Intelligent contract execution method and system in block chain and electronic equipment
EP3816924B1 (en) Method for accepting blockchain evidence storage transaction and system
CN110020859B (en) Parallel execution block chain consensus method and device and electronic equipment
CN113205416A (en) Service processing method and system based on block chain prediction machine
US10031948B1 (en) Idempotence service
CN109582398B (en) State processing method and device and electronic equipment
CN110648136A (en) Consensus and transaction synchronous parallel processing method and device and electronic equipment
CN111882322A (en) Method and device for packaging transactions in sequence and electronic equipment
CN111698244A (en) Method and device for rapidly participating in consensus of newly added nodes and electronic equipment
CN110648125B (en) Packaging transaction method and device, electronic equipment and storage medium
CN112988470B (en) Consensus method, consensus node and system in alliance chain
CN110768894A (en) Method and equipment for deleting session message
CN113836232A (en) Consensus method and system in alliance chain
CN111382179B (en) Data processing method and device and electronic equipment
CN112558872A (en) Data processing method and device, storage medium and electronic equipment
CN111709748A (en) Transaction execution method and device with service attribute and electronic equipment
CN111614646A (en) Malicious transaction deletion method and device for alliance chain and electronic equipment
CN111159298A (en) Service request processing method and device, electronic equipment and storage medium
CN110599139B (en) Block output method and device in block chain consensus algorithm
CN113761581A (en) Authority control method and device in block chain and electronic equipment
CN112232954A (en) Dynamic adjustment method and device for proposal timeout threshold value and electronic equipment
CN113407156A (en) Method and system for generating random number based on decentralized verifiable delay function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200901

RJ01 Rejection of invention patent application after publication