CN107171810B - Verification method and device of block chain - Google Patents

Verification method and device of block chain Download PDF

Info

Publication number
CN107171810B
CN107171810B CN201710502379.XA CN201710502379A CN107171810B CN 107171810 B CN107171810 B CN 107171810B CN 201710502379 A CN201710502379 A CN 201710502379A CN 107171810 B CN107171810 B CN 107171810B
Authority
CN
China
Prior art keywords
block
node
chain
block chain
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710502379.XA
Other languages
Chinese (zh)
Other versions
CN107171810A (en
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710502379.XA priority Critical patent/CN107171810B/en
Publication of CN107171810A publication Critical patent/CN107171810A/en
Application granted granted Critical
Publication of CN107171810B publication Critical patent/CN107171810B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme

Abstract

The embodiment of the invention provides a verification method and device of a block chain. The method comprises the following steps: a first node in the network acquires a public key of a second node for creating a public chain from a created block; the first node determines whether a block chain where the first node is located comprises a target block or not according to the public key; if the block chain in which the first node is located comprises the target block, the first node determines that the block chain is a legal block chain; and if the block chain where the first node is located does not comprise the target block, the first node determines that the block chain is an illegal block chain. According to the embodiment of the invention, the public key of the initiator of the public chain is obtained by the participant of the public chain, and whether the block chain in which the participant of the public chain is located comprises the block signed by the initiator is determined according to the public key.

Description

Verification method and device of block chain
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a verification method and device of a block chain.
Background
The block chain is a chain data structure formed by combining data blocks in a sequential connection mode according to a time sequence, and is a distributed account book which is guaranteed in a cryptographic mode and cannot be tampered and forged. Broadly speaking, the blockchain technique is a completely new distributed infrastructure and computing paradigm that utilizes blockchain data structures to verify and store data, utilizes distributed node consensus algorithms to generate and update data, cryptographically secure data transmission and access, and utilizes intelligent contracts composed of automated script code to program and manipulate data.
Public chain refers to a block chain that anyone can read, send a transaction, and have a valid confirmation of the transaction, and participate in the consensus process.
If a hacker user exists in the public chain, the hacker user can easily obtain the accounting right of the whole network, the operation of the whole system is influenced, and even more, a malicious attacker even has the capability of forging a brand-new block chain account book, so that the newly added node in the network can not normally trade.
Disclosure of Invention
The embodiment of the invention provides a verification method and a verification device for a block chain, which are used for enabling a participant to find that a hacker user obtains the accounting right of the whole network or forge a brand-new block chain account book.
One aspect of the embodiments of the present invention is to provide a method for verifying a block chain, including:
a first node in the network acquires a public key of a second node for creating a public chain from a created block;
the first node determines whether a block chain where the first node is located comprises a target block according to the public key, wherein the target block is a block signed by the second node;
if the block chain in which the first node is located comprises the target block, the first node determines that the block chain is a legal block chain;
and if the block chain where the first node is located does not comprise the target block, the first node determines that the block chain is an illegal block chain.
Another aspect of the embodiments of the present invention is to provide an apparatus for verifying a blockchain, including:
the acquisition module is used for acquiring a public key of a second node for creating a public chain from the founding block;
a determining module, configured to determine, according to the public key, whether a block chain where the first node is located includes a target block, where the target block is a block signed by the second node; if the block chain where the first node is located comprises the target block, determining that the block chain is a legal block chain; and if the block chain where the first node is located does not comprise the target block, determining that the block chain is an illegal block chain.
According to the verification method and device for the block chain provided by the embodiment of the invention, the public key of the initiator of the public chain is obtained by the participant of the public chain, whether the block chain in which the participant of the public chain is located includes the block signed by the initiator is determined according to the public key, if the block chain in which the participant is located includes the block signed by the initiator, the block chain in which the participant is located is determined to be legal, and if the block chain in which the participant is located does not include the block signed by the initiator, the block chain in which the participant is located is determined to be illegal.
Drawings
Fig. 1 is a flowchart of a verification method for a blockchain according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a founder block according to an embodiment of the present invention;
fig. 3 is a block diagram of an apparatus for verifying a block chain according to an embodiment of the present invention;
fig. 4 is a block diagram of an apparatus for verifying a block chain according to another embodiment of the present invention.
Detailed Description
Fig. 1 is a flowchart of a verification method for a blockchain according to an embodiment of the present invention; fig. 2 is a schematic structural diagram of a founding block according to an embodiment of the invention. The embodiment of the invention provides a verification method of a block chain, aiming at the problems that in the prior art, a hacker user can easily obtain the accounting right of the whole network, the operation of the whole system is influenced, and even more, a malicious attacker even has the capacity of forging a brand-new block chain account book, so that a newly added node in a network can not normally transact, and the method comprises the following specific steps:
step S101, a first node in the network acquires a public key of a second node for creating a public chain from a created block.
The so-called foundational block is the first block of the bitcoin world, which is set to the 0 block by the new version of the bitcoin system, and the 1 block by the old version of the bitcoin system. In this embodiment, the created block may be the first born block of the blockchain world.
The first node may be a participant of the public chain, the second node may be an initiator of the public chain, the initiator of the public chain needs to sign some blocks, and once all participants see that a block is signed by the initiator, the block chain in which the block is located is considered to be legal and not forged. When the initiator of the public chain signs some blocks, it may specifically follow a predetermined algorithm rule, for example, sign one for every 100 blocks; or to sign a block according to a difficulty value, e.g., if the difficulty value of a block is below a threshold, then the block or a block next to the block is signed. This is true for a malicious user who forges the entire blockchain, since he cannot obtain the signature of the initiator, because even if the block is signed, it will be discovered by other participants, and thus the forged blockchain is discarded by other participants.
As shown in fig. 2, the founding block includes: a block head and a block body; wherein the block header includes: block height, header hash, parent block hash value, Merkle root, timestamp, difficulty value, and random number; the block main body includes: all transaction information in this block.
The created block may be block 1 in the whole block chain, and the second node, i.e. the initiator of the public chain, first declares its public key, that is, publishes its public key. All first nodes, i.e. participants of the public chain, can extract the public key from the created block and verify the signed block based on the public key. Specifically, the second node, i.e. the initiator of the public link, generates the created block as shown in fig. 2, and the second node may put its public key into the hash value of the parent block in the block header of the created block, or may generate a hash value from the public key of the initiator of the public link through the SHA256 algorithm, and put the hash value into the hash value of the parent block in the block header of the created block.
In addition, the second node, i.e. the initiator of the public chain, may also record the transaction information in the local memory into the block main body as shown in fig. 2, generate a Merkle tree of all transaction information in the block main body, store the value of the Merkle tree root in the Merkle root of the block header, store the current time in the timestamp field, and set the difficulty value in the block header to a preset appropriate difficulty value.
In addition, the parent block hash value of the created block is the public key of the second node; the parent block hash value of a block other than the created block is the head hash value of the previous block of the block. The initiator of the public chain continues to create blocks in subsequent blockchains after creating the created block. The difference between the subsequently created block and the created block is that the parent block hash value of the created block is the public key of the initiator of the public chain, and the parent block hash value of the block in the subsequently created block chain is the head hash of the previous block of the block.
As the number of blocks in the block chain increases, the originator of the public chain needs to sign some blocks, the signature is to distinguish whether the block is a forged block, and the signature is selected according to a predetermined algorithm rule, for example, one signature is signed every 100 blocks; or the difficulty value is below a certain threshold, the block or the next block to the block is signed.
A first node, i.e., a participant of the public chain, may obtain the public key of a second node, i.e., the originator of the public chain, from the parent tile hash value of the created tile shown in fig. 2.
Step S102, the first node determines whether a block chain where the first node is located includes a target block according to the public key, wherein the target block is a block signed by the second node.
The first node, i.e., the participant of the public chain, detects whether the block chain in which the first node is located includes a block signed by the second node according to the public key obtained from the created block.
Optionally, the first node periodically determines, according to the public key, whether a block chain in which the first node is located includes a target block. For example, the first node detects at regular intervals whether the block chain in which the first node is located includes the block signed by the second node.
Or, the first node receives broadcast information of the second node, where the broadcast information is used to indicate that the second node signed the current block; the first node determines whether it is in a block chain in which the current block is located.
For example, after the initiator of the public chain of the second node signs a block each time, the initiator broadcasts information to the first node, that is, a participant of the public chain, where the broadcast information is used to indicate that the second node signs the current block, and the first node detects whether the block chain in which the first node is located includes a block signed by the second node according to the broadcast information.
Or, after a period of time, for example, a preset fixed time, the first node does not receive the broadcast information of the second node, and then detects whether the block chain in which the first node is located includes a block signed by the second node.
Step S103, if the block chain where the first node is located comprises the target block, the first node determines that the block chain is a legal block chain.
If the block chain where the first node is located comprises the target block, the block chain is proved to be a legal block chain and continues to follow the block chain, the block chain is verified, the verified result is broadcasted through the P2P network, and the node writes the transaction into an account book at the same time.
Step S104, if the block chain where the first node is located does not include the target block, the first node determines that the block chain is an illegal block chain.
If the block chain where the first node is located does not include the target block, the block chain is proved to be illegal, the block chain does not continue to follow the block chain, and the result of the verification failure is broadcasted through the P2P network, so that nodes in other P2P networks can be warned conveniently.
The method and the device for verifying the block chain of the public chain have the advantages that the public key of the initiator of the public chain is obtained through the participant of the public chain, whether the block chain in which the participant of the public chain is located comprises the block signed by the initiator or not is determined according to the public key, the block chain in which the participant is located is determined to be legal if the block chain in which the participant is located comprises the block signed by the initiator, and the block chain in which the participant is located is determined to be illegal if the block chain in which the participant is located does not comprise the block signed by the initiator.
Fig. 3 is a block diagram of an apparatus for verifying a block chain according to an embodiment of the present invention. The verification apparatus of a block chain according to the embodiment of the present invention may execute the processing procedure provided by the verification method of a block chain, as shown in fig. 3, where the verification apparatus 30 of a block chain is located at a first node in a network according to the above-mentioned embodiment, and the verification apparatus 30 of a block chain includes: the acquiring module 31 and the determining module 32 are used for acquiring a public key of a second node creating a public chain from the founding block; the determining module 32 is configured to determine, according to the public key, whether a block chain where the first node is located includes a target block, where the target block is a block signed by the second node; if the block chain where the first node is located comprises the target block, determining that the block chain is a legal block chain; and if the block chain where the first node is located does not comprise the target block, determining that the block chain is an illegal block chain.
The verification apparatus for a block chain according to the embodiment of the present invention may be specifically configured to execute the method embodiment provided in fig. 1, and specific functions are not described herein again.
The method and the device for verifying the block chain of the public chain have the advantages that the public key of the initiator of the public chain is obtained through the participant of the public chain, whether the block chain in which the participant of the public chain is located comprises the block signed by the initiator or not is determined according to the public key, the block chain in which the participant is located is determined to be legal if the block chain in which the participant is located comprises the block signed by the initiator, and the block chain in which the participant is located is determined to be illegal if the block chain in which the participant is located does not comprise the block signed by the initiator.
Fig. 4 is a block diagram of an apparatus for verifying a block chain according to another embodiment of the present invention. On the basis of the foregoing embodiment, the determining module 32 is specifically configured to periodically determine, according to the public key, whether the block chain where the first node is located includes the target block.
Alternatively, the block chain verification apparatus 30 further includes: a receiving module 33, where the receiving module 33 is configured to receive broadcast information of the second node, where the broadcast information is used to indicate that the second node signs a current tile; the determining module 32 is specifically configured to determine whether the first node is in a block chain in which the current block is located.
The founding block comprises: a block head and a block body; the block head includes: block height, header hash value, parent block hash value, Merkle root, timestamp, difficulty value, and random number; the block main body includes: transaction information.
The parent block hash value of the created block is the public key of the second node; the parent block hash value of a block other than the created block is the head hash value of the previous block of the block.
The verification apparatus for a block chain according to the embodiment of the present invention may be specifically configured to execute the method embodiment provided in fig. 1, and specific functions are not described herein again.
The method and the device for verifying the block chain of the public chain have the advantages that the public key of the initiator of the public chain is obtained through the participant of the public chain, whether the block chain in which the participant of the public chain is located comprises the block signed by the initiator or not is determined according to the public key, the block chain in which the participant is located is determined to be legal if the block chain in which the participant is located comprises the block signed by the initiator, and the block chain in which the participant is located is determined to be illegal if the block chain in which the participant is located does not comprise the block signed by the initiator.
In summary, in the embodiment of the present invention, a public key of an initiator of a public chain is obtained by a participant of the public chain, and according to the public key, it is determined whether a block chain in which the participant of the public chain is located includes a block signed by the initiator, if the block chain in which the participant is located includes a block signed by the initiator, it is determined that the block chain in which the participant is located is legal, and if the block chain in which the participant is located does not include a block signed by the initiator, it is determined that the block chain in which the participant is located is illegal.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (6)

1. A method for verifying a blockchain, comprising:
a first node in the network acquires a public key of a second node for creating a public chain from a created block;
the first node determines whether a block chain where the first node is located comprises a target block according to the public key, wherein the target block is a block signed by the second node;
if the block chain in which the first node is located comprises the target block, the first node determines that the block chain is a legal block chain;
if the block chain where the first node is located does not comprise the target block, the first node determines that the block chain is an illegal block chain;
the determining, by the first node, whether a block chain in which the first node is located includes a target block according to the public key includes:
the first node periodically determines whether a block chain where the first node is located comprises a target block according to the public key; alternatively, the first and second electrodes may be,
the first node receives broadcast information of the second node, wherein the broadcast information is used for indicating that the second node signs a current block;
the first node determines whether it is in a block chain in which the current block is located.
2. The method of claim 1, wherein the founder block comprises: a block head and a block body;
the block head includes: block height, header hash value, parent block hash value, Merkle root, timestamp, difficulty value, and random number;
the block main body includes: transaction information.
3. The method of claim 2, wherein the parent block hash value of the created block is a public key of the second node;
the parent block hash value of a block other than the created block is the head hash value of the previous block of the block.
4. An apparatus for blockchain authentication, the apparatus for blockchain authentication located at a first node in a network, comprising:
the acquisition module is used for acquiring a public key of a second node for creating a public chain from the founding block;
a determining module, configured to determine, according to the public key, whether a block chain where the first node is located includes a target block, where the target block is a block signed by the second node; if the block chain where the first node is located comprises the target block, determining that the block chain is a legal block chain; if the block chain where the first node is located does not include the target block, determining that the block chain is an illegal block chain;
the device, still include:
a receiving module, configured to receive broadcast information of the second node, where the broadcast information is used to indicate that the second node signs a current block;
the determining module is specifically configured to periodically determine, according to the public key, whether a block chain in which the first node is located includes a target block; alternatively, the first and second electrodes may be,
the determining module is specifically configured to determine whether the first node is in a block chain in which the current block is located.
5. The apparatus for verifying a blockchain according to claim 4, wherein the created block includes: a block head and a block body;
the block head includes: block height, header hash value, parent block hash value, Merkle root, timestamp, difficulty value, and random number;
the block main body includes: transaction information.
6. The apparatus according to claim 5, wherein the parent block hash value of the created block is a public key of the second node;
the parent block hash value of a block other than the created block is the head hash value of the previous block of the block.
CN201710502379.XA 2017-06-27 2017-06-27 Verification method and device of block chain Active CN107171810B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710502379.XA CN107171810B (en) 2017-06-27 2017-06-27 Verification method and device of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710502379.XA CN107171810B (en) 2017-06-27 2017-06-27 Verification method and device of block chain

Publications (2)

Publication Number Publication Date
CN107171810A CN107171810A (en) 2017-09-15
CN107171810B true CN107171810B (en) 2020-03-13

Family

ID=59826673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710502379.XA Active CN107171810B (en) 2017-06-27 2017-06-27 Verification method and device of block chain

Country Status (1)

Country Link
CN (1) CN107171810B (en)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107623865A (en) * 2017-09-26 2018-01-23 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107465698A (en) * 2017-09-26 2017-12-12 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN108512650B (en) * 2018-02-28 2021-03-09 南京思利华信息科技有限公司 Block chain-oriented dynamic hash calculation method, device, node and storage medium
CN110298657A (en) * 2018-03-21 2019-10-01 中思博安科技(北京)有限公司 A kind of block chain common recognition method, relevant apparatus and system
CN108769230B (en) * 2018-06-06 2021-06-18 腾讯科技(深圳)有限公司 Transaction data storage method, device, server and storage medium
CN108848096B (en) * 2018-06-25 2021-06-01 中国联合网络通信集团有限公司 Method, device, equipment and computer readable storage medium for processing service contract
CN108876378B (en) * 2018-07-11 2022-04-19 北京国泰网信科技有限公司 Public link data encryption backup method
CN109102287B (en) * 2018-08-13 2021-09-07 中国联合网络通信集团有限公司 Block chain accounting method, device, equipment and storage medium
CN109408319B (en) * 2018-08-30 2020-09-29 中国地质大学(武汉) Software running technology state monitoring method based on block chain
CN109213901B (en) * 2018-09-18 2020-12-01 百度在线网络技术(北京)有限公司 Data synchronization method, device, equipment and medium of block chain
CN109409879A (en) * 2018-10-16 2019-03-01 广东恒聚互联控股有限公司 A method of enhancing block chain security performance
CN109460996B (en) * 2018-10-26 2020-08-28 全链通有限公司 Public block chain processing method, device and computer readable storage medium
CN110033367A (en) * 2018-11-28 2019-07-19 阿里巴巴集团控股有限公司 Based on the contract record method and device of block chain, electronic equipment
CN109741039B (en) * 2019-01-07 2021-01-19 深圳市红砖坊技术有限公司 Accounting method, mine pool server, terminal equipment, mine excavation node and mine pool
CN109869870A (en) * 2019-01-24 2019-06-11 杭州美时美刻物联网科技有限公司 A kind of indoor air circulation system based on block chain technology
CN110032892A (en) * 2019-01-29 2019-07-19 香港贝尔科技有限公司 A kind of innovatory algorithm based on block chain DPOS common recognition mechanism
CN111445247B (en) * 2020-04-09 2021-05-28 堡垒科技有限公司 Method and apparatus for preventing block chain forking
CN113141354A (en) * 2021-04-13 2021-07-20 武汉天梯科技股份有限公司 Automatic block chain repairing method
CN113256289B (en) * 2021-05-17 2023-06-30 网易(杭州)网络有限公司 Block chain judging method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678182A (en) * 2015-12-29 2016-06-15 布比(北京)网络技术有限公司 Method and apparatus for data operation controlling
WO2017006134A1 (en) * 2015-07-08 2017-01-12 Barclays Bank Plc Secure digital data operations
CN106384236A (en) * 2016-08-31 2017-02-08 江苏通付盾科技有限公司 Blockchain based CA (Certificate Authority) management method, device and system
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106385319B (en) * 2016-09-29 2020-11-27 江苏通付盾科技有限公司 Method and system for verifying information in block chain network
CN106452785B (en) * 2016-09-29 2019-05-17 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106656974B (en) * 2016-10-17 2019-07-16 江苏通付盾科技有限公司 The grouping common recognition method and system of block chain
CN106503589A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 The method of calibration of block chain Transaction Information correctness, apparatus and system
CN106506146A (en) * 2016-10-26 2017-03-15 北京瑞卓喜投科技发展有限公司 Based on the Transaction Information method of calibration of block chain technology, apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017006134A1 (en) * 2015-07-08 2017-01-12 Barclays Bank Plc Secure digital data operations
CN105678182A (en) * 2015-12-29 2016-06-15 布比(北京)网络技术有限公司 Method and apparatus for data operation controlling
CN106384236A (en) * 2016-08-31 2017-02-08 江苏通付盾科技有限公司 Blockchain based CA (Certificate Authority) management method, device and system
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode

Also Published As

Publication number Publication date
CN107171810A (en) 2017-09-15

Similar Documents

Publication Publication Date Title
CN107171810B (en) Verification method and device of block chain
CN107276765B (en) Processing method and device for consensus in block chain
CN107396360B (en) Block verification method and device
CN109936457B (en) Block chain multi-party witness method, device, equipment and computer readable storage medium
US11501533B2 (en) Media authentication using distributed ledger
CN109102287B (en) Block chain accounting method, device, equipment and storage medium
CN107480990B (en) Block chain accounting method and device
US11271717B2 (en) Blockchain consensus methods and systems
CN109542888B (en) Data modification and synchronization method, device, equipment and storage medium of block chain
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN106453415B (en) Block chain-based equipment authentication method, authentication server and user equipment
CN107493340B (en) Data distribution verification method, device and system in block chain network
CN109493204B (en) Service accounting method based on block chain and terminal equipment
CN107491519B (en) Method and device for inquiring block chain account book
CN111163182B (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
EP3669521A1 (en) Method and system for publicly verifiable proofs of retrievability in blockchains
KR20210003234A (en) Maintaining blocks of a blockchain in a segmented blockchain network
CN110690974B (en) Block chain based data verification method, device, equipment and readable storage medium
CN108509615B (en) Consensus establishing method and device based on drawing mechanism and readable storage medium
CN111191294B (en) Single-node accounting method, system, equipment and storage medium based on block chain
CN109166040B (en) Transaction auditing method, device, equipment and storage medium based on block chain
CN111314067A (en) Block storage method and device, computer equipment and storage medium
CN111010284B (en) Processing method of block to be identified, related device and block chain system
CN112749968B (en) Service data recording method and device based on block chain
US20200402026A1 (en) Blockchain management system, blockchain management apparatus, information providing apparatus, and blockchain management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant