CN107231239A - Create generation block method for anti-counterfeit and device - Google Patents
Create generation block method for anti-counterfeit and device Download PDFInfo
- Publication number
- CN107231239A CN107231239A CN201710502391.0A CN201710502391A CN107231239A CN 107231239 A CN107231239 A CN 107231239A CN 201710502391 A CN201710502391 A CN 201710502391A CN 107231239 A CN107231239 A CN 107231239A
- Authority
- CN
- China
- Prior art keywords
- node
- block
- wound generation
- original
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present invention provides a kind of wound generation block method for anti-counterfeit and device.This method includes:The pre- new node for adding block chain network sends the solicited message that request adds block chain network to seed node;New node receives the wound generation block of seed node feedback;New node is verified according to the public key of original node to the block in block chain.The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art, original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network, other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned;In addition, the public key of the original node in the wound generation block come to this block chain carry out authenticity verification, improve the security of block.
Description
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of wound generation block method for anti-counterfeit and device.
Background technology
Block chain is a kind of database of decentralization, and it includes a list for being referred to as block, there is sustainable growth
And the record of marshalling.At a new block chain application development initial stage, because participant is fewer, the difficulty of overall block
Angle value can only be than relatively low, while the number of block is also fewer, it is easy to is forged by attacker together with wound generation block, so that
Puppet produces a brand-new block chain.
If wound generation block is forged, the public key in wound generation block may be revised as the public key of oneself by attacker, and
Signed using the private key of attacker, even if then participant's checking can also pass through, it is impossible to detect.Especially for block
The chain early stage of development, the participant newly added is likely to that the block chain of forgery can be obtained at the very start, so as to produce fascination.So exist
Occur two entirely different chains, the chain that a part of node maintenance is forged in block chain, and another part node maintenance is normal
Chain.Here key is that have two entirely different wound generation blocks.
Do not prevent from also creating the method that generation block is forged in the prior art.
The content of the invention
The embodiment of the present invention provides a kind of wound generation block method for anti-counterfeit and device, so that attacker forges wound generation block and lost
Lose.
The one side of the embodiment of the present invention is to provide a kind of wound generation block method for anti-counterfeit, including:
The request that the pre- new node for adding block chain network sends the request addition block chain network to seed node is believed
Breath, the new node is previously stored with the address information of the seed node;
The new node receives the wound generation block of the seed node feedback, and the wound generation block includes the public affairs of original node
Key, the original node is the node for creating the wound generation block, and the original node is used to carry out the block in block chain
Signature;
The new node is verified according to the public key of the original node to the block in the block chain.
The other side of the embodiment of the present invention is to provide a kind of wound generation block false proof device, the anti-camouflage of wound generation block
Setting in the pre- new node for adding block chain network, including:
Sending module, for sending the solicited message that request adds the block chain network, the new section to seed node
Point is previously stored with the address information of the seed node;
Receiving module, the wound generation block for receiving the seed node feedback, the wound generation block includes original node
Public key, the original node be create it is described wound generation block node, the original node be used for the block in block chain
Signed;
Authentication module, is verified for the public key according to the original node to the block in the block chain.
Wound generation block method for anti-counterfeit and device provided in an embodiment of the present invention, distribute original node by seed node and create
Wound generation block, compared in the prior art, original node directly distributes wound generation block, so that with ensure that the IP of original node
Location will not come forth out, it is to avoid original node is by assault;In addition, the address of seed node is solidificated in block chain network
In other nodes client software in, other nodes that can be allowed in block chain network are from the security node preassigned
Wound generation block is obtained, the security that node obtains wound generation block is improved;In addition, original node in the wound generation block
Public key to carry out authenticity verification to this block chain, improves the security of block.So that attacker forges wound generation block
Failure.
Brief description of the drawings
Fig. 1 is wound generation block method for anti-counterfeit flow chart provided in an embodiment of the present invention;
Fig. 2 is the applicable network architecture diagram of wound generation block method for anti-counterfeit provided in an embodiment of the present invention;
Fig. 3 is the structure chart provided in an embodiment of the present invention for creating generation block false proof device.
Embodiment
Fig. 1 is wound generation block method for anti-counterfeit flow chart provided in an embodiment of the present invention;Fig. 2 is provided in an embodiment of the present invention
Create the applicable network architecture diagram of generation block method for anti-counterfeit.The embodiment of the present invention is easily forged that there is provided wound for wound generation block
Generation block method for anti-counterfeit, this method is comprised the following steps that:
Step S101, the pre- new node for adding block chain network send request to seed node and add the block chain network
Solicited message, the new node is previously stored with the address information of the seed node.
As shown in Fig. 2 original node 21 and seed node 22 connect block chain network 23 respectively, original node 21 is used to create
Wound generation block is built, the wound generation block is specifically first block in the bit coin world, and the bit coin system of redaction sets it
For No. 0 block, and the bit coin default of legacy version its serial number 1.Wound generation block in the present embodiment can be understood as
The block of first birth in the block chain world.Original node 21 can be originated by the public key publication of oneself in wound generation block
Node 21 in wound generation block by the public key publication of oneself by declaring the signature verification key of oneself.All participants are
The authentication secret can be extracted from wound generation block, and is verified to originating the block after node 21 is signed.Optionally, in area
In block chain network 23, original node 21 can have one or more, if original node 21 has multiple, multiple original nodes 21
Using identical public private key pair.
The wound generation block that original node 21 is created is sent to seed node 22, and the number of seed node 22 can be many
Individual, that is, the wound generation block that originating node 21 can be created is sent to multiple seed nodes, will be created by multiple seed nodes 22
Generation block is sent to other nodes, can so ensure the IP address of original node 21 and will not come forth out, so that
Original node 21 can be as common hiding nodes in block chain network 23, it is to avoid original node 21 is by assault.
In addition, original node 21 as common hiding nodes in block chain network 23, receive seed node 22 same
The book keeping operation life that step is come into block after, the block is signed according to signature is regular, it is then again that the block after signature is wide
Broadcast to other nodes, or each seed node can also be broadcast to, it is then by each seed node that the newly-generated block is wide
Broadcast is gone.So original node 21 is difficult to be found, in addition, in this embodiment it is assumed that the private key of original node 21 is to pacify very much
Complete, originate the compromised possibility very little of the private key of node 21.
In addition, the address of the seed node in a block chain network can be published to other sections in block chain network
Point, it is also possible in the client software for other nodes being solidificated in block chain network.
If a certain node is wanted to add block chain network, as shown in Fig. 2 24 represent the pre- new node for adding block chain network,
New node 24 first installs the client software of the block chain as a node newly added, then according to the client software
The seed node address of inside solidification, the solicited message that request adds block chain network 23 is sent to seed node 22.
Step S102, the new node receive the wound generation block of the seed node feedback, and the wound generation block includes wound
The public key of beginning node, the original node is the node for creating the wound generation block, and the original node is used in block chain
Block signed.
The request that seed node 22 receives the transmission of new node 24 is added after the solicited message of block chain network 23, seed section
Wound generation block is sent to new node 24 by point 22, and wound generation block includes the public key of original node 21.
In addition, the new node is received in the neighboring node list that the seed node is sent, the neighboring node list
The identification information of neighbor node including the new node.The new node is according to the neighboring node list, to the neighbours
Node sends the solicited message of acquisition request block chain account book.In the neighboring node list identification information of neighbor node be by
According to the priority ranking of the neighbor node of the new node;The priority of the neighbor node is according to the neighbor node
What the network segment where IP address and the network segment where the IP address of the new node were determined.
When new node 24 sends the solicited message of the request addition block chain network to seed node 22, seed node 22
The neighbor node of new node 24 can also be determined according to the corresponding network segment of IP address of new node 24, seed node 22 is to new section
While point 24 sends wound generation block, neighboring node list can also be issued in the lump to new node 24, in the neighboring node list
The identification information of neighbor node including new node 24, optionally, in neighboring node list the identification information of neighbor node be by
According to the priority ranking of the neighbor node of the new node, the priority of neighbor node is IP according to the neighbor node
What the network segment where location and the network segment where the IP address of the new node were determined, for example, existing with the IP address of the new node
The priority of the neighbor node of the same network segment is higher.
New node 24 obtains the identification information of first neighbor node, optionally, first neighbour from neighboring node list
Occupy the highest priority of node, and first neighbor node into neighboring node list sends acquisition request block chain account book
Solicited message, if after preset time, new node 24 is not received by the block chain that the neighbor node of highest priority is returned
Account book, then select second neighbor node from neighboring node list, and the priority of second neighbor node is less than first
The priority of neighbor node, and to the solicited message of second neighbor node transmission acquisition request block chain account book, if in advance
If after the time, new node 24 is not received by the block chain account book that second neighbor node is returned, then is arranged from neighbor node
The 3rd neighbor node is selected in table, the like.
Step S103, the new node are tested the block in the block chain according to the public key of the original node
Card.
In the present embodiment, the neighbor node 25 of new node 24 can also send block to new node 24, and new node 24 will
The block that neighbor node 25 is sent is associated with wound generation block according to the cryptographic Hash of these blocks, obtains a whole piece block
Chain, further, the public key of original node 21 of the new node 24 in the wound generation block are true to be carried out to this block chain
Property checking, specifically, new node 24 obtains the public key of original node 21 from wound generation block, and according to the public key of original node 21
Block in block chain is verified, if the new node according to the public key of the original node in the block chain
Block is verified, it is determined that the block is legal block;If the new node is according to the public key of the original node
To the block authentication failed in the block chain, it is determined that the block is the block forged.
The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art,
Original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original
Node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network,
Other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve node acquisition
Create the security of generation block;In addition, the public key of the original node in the wound generation block is true to be carried out to this block chain
Property checking, improve the security of block.So that attacker forges the block failure of wound generation.
Fig. 3 is the structure chart provided in an embodiment of the present invention for creating generation block false proof device.Wound provided in an embodiment of the present invention
Generation block false proof device can perform the handling process that wound generation block method for anti-counterfeit embodiment is provided, wound generation block false proof device position
In the new node of the pre- addition block chain network described in above-described embodiment, as shown in figure 3, wound generation block false proof device 30 is wrapped
Include:Sending module 31, receiving module 32, authentication module 33, wherein, sending module 31 is used to send request addition to seed node
The solicited message of the block chain network, the new node is previously stored with the address information of the seed node;Receiving module
32 are used to receive the wound generation block that the seed node feeds back, and the wound generation block includes the public key of original node, described original
Node is the node for creating the wound generation block, and the original node is used to sign to the block in block chain;Verify mould
Block 33 is used to verify the block in the block chain according to the public key of the original node.
Wound generation block false proof device provided in an embodiment of the present invention can be specifically for performing the method that above-mentioned Fig. 1 is provided
Embodiment, here is omitted for concrete function.
The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art,
Original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original
Node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network,
Other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve node acquisition
Create the security of generation block;In addition, the public key of the original node in the wound generation block is true to be carried out to this block chain
Property checking, improve the security of block.So that attacker forges the block failure of wound generation.
On the basis of above-described embodiment, receiving module 32 is additionally operable to:Receive the neighbor node that the seed node is sent
List, the neighboring node list includes the identification information of the neighbor node of the new node.Sending module 31 is additionally operable to:Root
According to the neighboring node list, the solicited message of acquisition request block chain account book is sent to the neighbor node.Neighbours' section
The identification information of neighbor node is the priority ranking of the neighbor node according to the new node in point list;Neighbours' section
The priority of point is the network segment where the IP address of the network segment according to where the IP address of the neighbor node and the new node
Determine.Authentication module 33 specifically for:If the new node is according to the public key of the original node in the block chain
Block be verified, it is determined that the block be legal block;If the new node is according to the public affairs of the original node
Key is to the block authentication failed in the block chain, it is determined that the block is the block forged.
Wound generation block false proof device provided in an embodiment of the present invention can be specifically for performing the method that above-mentioned Fig. 1 is provided
Embodiment, here is omitted for concrete function.
The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art,
Original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original
Node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network,
Other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve node acquisition
Create the security of generation block;In addition, the public key of the original node in the wound generation block is true to be carried out to this block chain
Property checking, improve the security of block.So that attacker forges the block failure of wound generation.
In summary, the embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared to existing
Have in technology, original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, keeps away
Original node is exempted from by assault;In addition, the address of seed node is solidificated in the client of other nodes in block chain network
Hold in software, other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve
Node obtains the security of wound generation block;In addition, the public key of the original node in the wound generation block is come to this block
Chain carries out authenticity verification, improves the security of block.So that attacker forges the block failure of wound generation.
, can be by it in several embodiments provided by the present invention, it should be understood that disclosed apparatus and method
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied
Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed
Coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical of device or unit by some interfaces
Letter connection, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer
Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each
The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division progress for example, in practical application, can distribute complete by different functional modules by above-mentioned functions as needed
Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On
The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
1. one kind wound generation block method for anti-counterfeit, it is characterised in that including:
The pre- new node for adding block chain network sends the solicited message that request adds the block chain network, institute to seed node
State the address information that new node is previously stored with the seed node;
The new node receives the wound generation block of the seed node feedback, and the wound generation block includes the public key of original node,
The original node is the node for creating the wound generation block, and the original node is used to sign the block in block chain
Name;
The new node is verified according to the public key of the original node to the block in the block chain.
2. according to the method described in claim 1, it is characterised in that also include:
The new node receives the neighboring node list that the seed node is sent, and the neighboring node list includes described new
The identification information of the neighbor node of node.
3. method according to claim 2, it is characterised in that also include:
The new node sends the request of acquisition request block chain account book to the neighbor node according to the neighboring node list
Information.
4. method according to claim 3, it is characterised in that the identification information of neighbor node in the neighboring node list
It is the priority ranking of the neighbor node according to the new node;
The priority of the neighbor node is the IP of the network segment according to where the IP address of the neighbor node and the new node
What the network segment where address was determined.
5. the method according to claim any one of 1-4, it is characterised in that the new node is according to the original node
Public key verifies to the block in the block chain, including:
If the new node is verified according to the public key of the original node to the block in the block chain, it is determined that institute
Block is stated for legal block;
If the new node is according to the public key of the original node to the block authentication failed in the block chain, it is determined that institute
The block for stating block to forge.
6. one kind wound generation block false proof device, it is characterised in that the wound generation block false proof device is located at pre- addition block link network
The new node of network, including:
Sending module, for sending the solicited message that request adds the block chain network to seed node, the new node is pre-
First be stored with the address information of the seed node;
Receiving module, the wound generation block for receiving the seed node feedback, the wound generation block includes the public affairs of original node
Key, the original node is the node for creating the wound generation block, and the original node is used to carry out the block in block chain
Signature;
Authentication module, is verified for the public key according to the original node to the block in the block chain.
7. wound generation block false proof device according to claim 6, it is characterised in that the receiving module is additionally operable to:Receive
The neighboring node list that the seed node is sent, the neighboring node list includes the mark of the neighbor node of the new node
Know information.
8. wound generation block false proof device according to claim 7, it is characterised in that the sending module is additionally operable to:According to
The neighboring node list, the solicited message of acquisition request block chain account book is sent to the neighbor node.
9. wound generation block false proof device according to claim 8, it is characterised in that neighbours save in the neighboring node list
The identification information of point is the priority ranking of the neighbor node according to the new node;
The priority of the neighbor node is the IP of the network segment according to where the IP address of the neighbor node and the new node
What the network segment where address was determined.
10. the wound generation block false proof device according to claim any one of 6-9, it is characterised in that the authentication module tool
Body is used for:
If the new node is verified according to the public key of the original node to the block in the block chain, it is determined that institute
Block is stated for legal block;
If the new node is according to the public key of the original node to the block authentication failed in the block chain, it is determined that institute
The block for stating block to forge.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710502391.0A CN107231239B (en) | 2017-06-27 | 2017-06-27 | Create generation block method for anti-counterfeit and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710502391.0A CN107231239B (en) | 2017-06-27 | 2017-06-27 | Create generation block method for anti-counterfeit and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107231239A true CN107231239A (en) | 2017-10-03 |
CN107231239B CN107231239B (en) | 2019-06-25 |
Family
ID=59935640
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710502391.0A Active CN107231239B (en) | 2017-06-27 | 2017-06-27 | Create generation block method for anti-counterfeit and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107231239B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107995270A (en) * | 2017-11-24 | 2018-05-04 | 成都赤乌软件技术有限公司 | A kind of method that distributed document storage is realized based on block chain |
CN108665275A (en) * | 2018-02-20 | 2018-10-16 | 泰山·约克·维纳斯基 | The system and method for block chain project management |
CN108810157A (en) * | 2018-06-20 | 2018-11-13 | 泰链(厦门)科技有限公司 | The connection method of block chain network, medium, apparatus and system |
CN109194750A (en) * | 2018-09-10 | 2019-01-11 | 杭州链汇通区块链科技有限公司 | Anti-attack method, the device of block catenary system and block chain super node |
CN109302307A (en) * | 2018-08-16 | 2019-02-01 | 泰链(厦门)科技有限公司 | Network host, the method based on network host rapid deployment block chain node |
CN109728954A (en) * | 2019-01-04 | 2019-05-07 | 深圳壹账通智能科技有限公司 | Alliance's chain node management system and method |
CN109995764A (en) * | 2019-03-07 | 2019-07-09 | 北京华安普特网络科技有限公司 | A kind of DDOS attack defence method based on block chain |
CN110266763A (en) * | 2019-05-20 | 2019-09-20 | 深圳壹账通智能科技有限公司 | Block chain network implementation method, system and the storage medium of cross-network segment interconnection |
KR102041720B1 (en) * | 2018-07-20 | 2019-11-06 | 숭실대학교산학협력단 | Implementing system of flexible blockchain framework and p2p network constructing method thereof, recording medium for performing the method |
CN110581892A (en) * | 2019-09-17 | 2019-12-17 | 上海保险交易所股份有限公司 | Block chain based network connection and recovery mechanism |
CN110799966A (en) * | 2018-04-22 | 2020-02-14 | 因特比有限公司 | Method and system for hosting a new blockchain using existing blockchain nodes |
CN110956542A (en) * | 2019-11-07 | 2020-04-03 | 支付宝(杭州)信息技术有限公司 | Block chain system and operation method, device and equipment thereof |
CN112055077A (en) * | 2020-09-02 | 2020-12-08 | 杭州复杂美科技有限公司 | Block link access method, device and storage medium |
CN112235340A (en) * | 2020-09-01 | 2021-01-15 | 迅鳐成都科技有限公司 | Distributed block chain networking method, device, system and storage medium |
CN113206893A (en) * | 2021-07-05 | 2021-08-03 | 支付宝(杭州)信息技术有限公司 | Method for block synchronization and node joining block chain network |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580233A (en) * | 2015-01-16 | 2015-04-29 | 重庆邮电大学 | Internet of Things smart home security gateway system |
CN106452785A (en) * | 2016-09-29 | 2017-02-22 | 财付通支付科技有限公司 | Block chain network, branch node and block chain network application method |
KR101723405B1 (en) * | 2016-07-04 | 2017-04-06 | 주식회사 코인플러그 | Certificate authentication system and method based on block chain |
CN106651332A (en) * | 2016-12-29 | 2017-05-10 | 先锋支付有限公司 | Block chain and method for generating new block in block chain |
CN106709734A (en) * | 2016-12-21 | 2017-05-24 | 毛巨林 | Multiple-two-dimensional code tracing method based on digital identity and system thereof |
CN106789041A (en) * | 2017-02-15 | 2017-05-31 | 江苏信源久安信息科技有限公司 | A kind of credible block chain method of decentralization certificate |
CN106789920A (en) * | 2016-11-25 | 2017-05-31 | 深圳前海微众银行股份有限公司 | The joint connecting method and device of block chain |
-
2017
- 2017-06-27 CN CN201710502391.0A patent/CN107231239B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580233A (en) * | 2015-01-16 | 2015-04-29 | 重庆邮电大学 | Internet of Things smart home security gateway system |
KR101723405B1 (en) * | 2016-07-04 | 2017-04-06 | 주식회사 코인플러그 | Certificate authentication system and method based on block chain |
CN106452785A (en) * | 2016-09-29 | 2017-02-22 | 财付通支付科技有限公司 | Block chain network, branch node and block chain network application method |
CN106789920A (en) * | 2016-11-25 | 2017-05-31 | 深圳前海微众银行股份有限公司 | The joint connecting method and device of block chain |
CN106709734A (en) * | 2016-12-21 | 2017-05-24 | 毛巨林 | Multiple-two-dimensional code tracing method based on digital identity and system thereof |
CN106651332A (en) * | 2016-12-29 | 2017-05-10 | 先锋支付有限公司 | Block chain and method for generating new block in block chain |
CN106789041A (en) * | 2017-02-15 | 2017-05-31 | 江苏信源久安信息科技有限公司 | A kind of credible block chain method of decentralization certificate |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107995270A (en) * | 2017-11-24 | 2018-05-04 | 成都赤乌软件技术有限公司 | A kind of method that distributed document storage is realized based on block chain |
CN108665275A (en) * | 2018-02-20 | 2018-10-16 | 泰山·约克·维纳斯基 | The system and method for block chain project management |
CN110799966A (en) * | 2018-04-22 | 2020-02-14 | 因特比有限公司 | Method and system for hosting a new blockchain using existing blockchain nodes |
CN108810157A (en) * | 2018-06-20 | 2018-11-13 | 泰链(厦门)科技有限公司 | The connection method of block chain network, medium, apparatus and system |
KR102041720B1 (en) * | 2018-07-20 | 2019-11-06 | 숭실대학교산학협력단 | Implementing system of flexible blockchain framework and p2p network constructing method thereof, recording medium for performing the method |
CN109302307A (en) * | 2018-08-16 | 2019-02-01 | 泰链(厦门)科技有限公司 | Network host, the method based on network host rapid deployment block chain node |
CN109302307B (en) * | 2018-08-16 | 2021-06-04 | 泰链(厦门)科技有限公司 | Network host and method for rapidly deploying block chain nodes based on network host |
CN109194750A (en) * | 2018-09-10 | 2019-01-11 | 杭州链汇通区块链科技有限公司 | Anti-attack method, the device of block catenary system and block chain super node |
CN109728954A (en) * | 2019-01-04 | 2019-05-07 | 深圳壹账通智能科技有限公司 | Alliance's chain node management system and method |
CN109728954B (en) * | 2019-01-04 | 2022-03-04 | 深圳壹账通智能科技有限公司 | Federation node point management system and method |
CN109995764A (en) * | 2019-03-07 | 2019-07-09 | 北京华安普特网络科技有限公司 | A kind of DDOS attack defence method based on block chain |
CN110266763A (en) * | 2019-05-20 | 2019-09-20 | 深圳壹账通智能科技有限公司 | Block chain network implementation method, system and the storage medium of cross-network segment interconnection |
CN110581892A (en) * | 2019-09-17 | 2019-12-17 | 上海保险交易所股份有限公司 | Block chain based network connection and recovery mechanism |
CN110581892B (en) * | 2019-09-17 | 2022-04-01 | 上海保险交易所股份有限公司 | Block chain based network connection and recovery mechanism |
CN110956542A (en) * | 2019-11-07 | 2020-04-03 | 支付宝(杭州)信息技术有限公司 | Block chain system and operation method, device and equipment thereof |
WO2021088421A1 (en) * | 2019-11-07 | 2021-05-14 | 支付宝(杭州)信息技术有限公司 | Blockchain system and operation method therefor, apparatus, and device |
CN110956542B (en) * | 2019-11-07 | 2021-05-18 | 支付宝(杭州)信息技术有限公司 | Block chain system and operation method, device and equipment thereof |
CN112235340A (en) * | 2020-09-01 | 2021-01-15 | 迅鳐成都科技有限公司 | Distributed block chain networking method, device, system and storage medium |
CN112055077A (en) * | 2020-09-02 | 2020-12-08 | 杭州复杂美科技有限公司 | Block link access method, device and storage medium |
CN112055077B (en) * | 2020-09-02 | 2023-04-18 | 杭州复杂美科技有限公司 | Block link access method, device and storage medium |
CN113206893B (en) * | 2021-07-05 | 2021-09-14 | 支付宝(杭州)信息技术有限公司 | Method for block synchronization and node joining block chain network |
CN113206893A (en) * | 2021-07-05 | 2021-08-03 | 支付宝(杭州)信息技术有限公司 | Method for block synchronization and node joining block chain network |
WO2023279971A1 (en) * | 2021-07-05 | 2023-01-12 | 支付宝(杭州)信息技术有限公司 | Block synchronization method, and method for making node join blockchain network |
Also Published As
Publication number | Publication date |
---|---|
CN107231239B (en) | 2019-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107231239A (en) | Create generation block method for anti-counterfeit and device | |
CN107171810A (en) | The verification method and device of block chain | |
CN109936457B (en) | Block chain multi-party witness method, device, equipment and computer readable storage medium | |
CN107396360A (en) | Block verification method and device | |
CN107276765A (en) | The processing method and processing device known together in block chain | |
CN107147501A (en) | Timestamp processing method and processing device | |
US20190251527A1 (en) | System, Method, and Computer Program Product for a Distributed, Cryptographically Secured Proof-of-Intent Transaction Network | |
CN110399424B (en) | Block generation method, block generation device, block chain node and storage medium | |
CN111865587B (en) | Data processing method, block link point device, electronic device, and computer program | |
CN107493162A (en) | The implementation method and device of block chain node | |
CN108646983A (en) | The treating method and apparatus of storage service data on block chain | |
EP4002181A1 (en) | A consensus method and framework for a blockchain system | |
CN107480990A (en) | Block chain bookkeeping methods and device | |
CN107078903A (en) | Digging ore deposit method, device and the node device of block chain | |
CN107005574A (en) | Block generation method and device and block chain network | |
WO2022099966A1 (en) | Blockchain-based ddos attack joint defense system and method | |
CN108352009A (en) | Block chain generating means, block chain generation method, block chain verification device, block chain verification method and program | |
CN108292395A (en) | Block chain generating means, block chain generation method, block chain verification device, block chain verification method and program | |
CN109102287A (en) | Block chain bookkeeping methods, device, equipment and storage medium | |
CN106452785A (en) | Block chain network, branch node and block chain network application method | |
CN108810119A (en) | block chain processing method, device and block chain node | |
KR20200032449A (en) | A method for establishing agreement between nodes in a Blockchain network and a Blockchain system | |
CN108038954A (en) | Transaction operation method and digging ore deposit node based on block chain | |
CN107276762A (en) | The method of work and device of a kind of multi-protocols block chain | |
CN109242299A (en) | Distribution digs mine method, digs mine machine and block catenary system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |