CN107231239A - Create generation block method for anti-counterfeit and device - Google Patents

Create generation block method for anti-counterfeit and device Download PDF

Info

Publication number
CN107231239A
CN107231239A CN201710502391.0A CN201710502391A CN107231239A CN 107231239 A CN107231239 A CN 107231239A CN 201710502391 A CN201710502391 A CN 201710502391A CN 107231239 A CN107231239 A CN 107231239A
Authority
CN
China
Prior art keywords
node
block
wound generation
original
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710502391.0A
Other languages
Chinese (zh)
Other versions
CN107231239B (en
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710502391.0A priority Critical patent/CN107231239B/en
Publication of CN107231239A publication Critical patent/CN107231239A/en
Application granted granted Critical
Publication of CN107231239B publication Critical patent/CN107231239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides a kind of wound generation block method for anti-counterfeit and device.This method includes:The pre- new node for adding block chain network sends the solicited message that request adds block chain network to seed node;New node receives the wound generation block of seed node feedback;New node is verified according to the public key of original node to the block in block chain.The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art, original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network, other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned;In addition, the public key of the original node in the wound generation block come to this block chain carry out authenticity verification, improve the security of block.

Description

Create generation block method for anti-counterfeit and device
Technical field
The present embodiments relate to communication technical field, more particularly to a kind of wound generation block method for anti-counterfeit and device.
Background technology
Block chain is a kind of database of decentralization, and it includes a list for being referred to as block, there is sustainable growth And the record of marshalling.At a new block chain application development initial stage, because participant is fewer, the difficulty of overall block Angle value can only be than relatively low, while the number of block is also fewer, it is easy to is forged by attacker together with wound generation block, so that Puppet produces a brand-new block chain.
If wound generation block is forged, the public key in wound generation block may be revised as the public key of oneself by attacker, and Signed using the private key of attacker, even if then participant's checking can also pass through, it is impossible to detect.Especially for block The chain early stage of development, the participant newly added is likely to that the block chain of forgery can be obtained at the very start, so as to produce fascination.So exist Occur two entirely different chains, the chain that a part of node maintenance is forged in block chain, and another part node maintenance is normal Chain.Here key is that have two entirely different wound generation blocks.
Do not prevent from also creating the method that generation block is forged in the prior art.
The content of the invention
The embodiment of the present invention provides a kind of wound generation block method for anti-counterfeit and device, so that attacker forges wound generation block and lost Lose.
The one side of the embodiment of the present invention is to provide a kind of wound generation block method for anti-counterfeit, including:
The request that the pre- new node for adding block chain network sends the request addition block chain network to seed node is believed Breath, the new node is previously stored with the address information of the seed node;
The new node receives the wound generation block of the seed node feedback, and the wound generation block includes the public affairs of original node Key, the original node is the node for creating the wound generation block, and the original node is used to carry out the block in block chain Signature;
The new node is verified according to the public key of the original node to the block in the block chain.
The other side of the embodiment of the present invention is to provide a kind of wound generation block false proof device, the anti-camouflage of wound generation block Setting in the pre- new node for adding block chain network, including:
Sending module, for sending the solicited message that request adds the block chain network, the new section to seed node Point is previously stored with the address information of the seed node;
Receiving module, the wound generation block for receiving the seed node feedback, the wound generation block includes original node Public key, the original node be create it is described wound generation block node, the original node be used for the block in block chain Signed;
Authentication module, is verified for the public key according to the original node to the block in the block chain.
Wound generation block method for anti-counterfeit and device provided in an embodiment of the present invention, distribute original node by seed node and create Wound generation block, compared in the prior art, original node directly distributes wound generation block, so that with ensure that the IP of original node Location will not come forth out, it is to avoid original node is by assault;In addition, the address of seed node is solidificated in block chain network In other nodes client software in, other nodes that can be allowed in block chain network are from the security node preassigned Wound generation block is obtained, the security that node obtains wound generation block is improved;In addition, original node in the wound generation block Public key to carry out authenticity verification to this block chain, improves the security of block.So that attacker forges wound generation block Failure.
Brief description of the drawings
Fig. 1 is wound generation block method for anti-counterfeit flow chart provided in an embodiment of the present invention;
Fig. 2 is the applicable network architecture diagram of wound generation block method for anti-counterfeit provided in an embodiment of the present invention;
Fig. 3 is the structure chart provided in an embodiment of the present invention for creating generation block false proof device.
Embodiment
Fig. 1 is wound generation block method for anti-counterfeit flow chart provided in an embodiment of the present invention;Fig. 2 is provided in an embodiment of the present invention Create the applicable network architecture diagram of generation block method for anti-counterfeit.The embodiment of the present invention is easily forged that there is provided wound for wound generation block Generation block method for anti-counterfeit, this method is comprised the following steps that:
Step S101, the pre- new node for adding block chain network send request to seed node and add the block chain network Solicited message, the new node is previously stored with the address information of the seed node.
As shown in Fig. 2 original node 21 and seed node 22 connect block chain network 23 respectively, original node 21 is used to create Wound generation block is built, the wound generation block is specifically first block in the bit coin world, and the bit coin system of redaction sets it For No. 0 block, and the bit coin default of legacy version its serial number 1.Wound generation block in the present embodiment can be understood as The block of first birth in the block chain world.Original node 21 can be originated by the public key publication of oneself in wound generation block Node 21 in wound generation block by the public key publication of oneself by declaring the signature verification key of oneself.All participants are The authentication secret can be extracted from wound generation block, and is verified to originating the block after node 21 is signed.Optionally, in area In block chain network 23, original node 21 can have one or more, if original node 21 has multiple, multiple original nodes 21 Using identical public private key pair.
The wound generation block that original node 21 is created is sent to seed node 22, and the number of seed node 22 can be many Individual, that is, the wound generation block that originating node 21 can be created is sent to multiple seed nodes, will be created by multiple seed nodes 22 Generation block is sent to other nodes, can so ensure the IP address of original node 21 and will not come forth out, so that Original node 21 can be as common hiding nodes in block chain network 23, it is to avoid original node 21 is by assault.
In addition, original node 21 as common hiding nodes in block chain network 23, receive seed node 22 same The book keeping operation life that step is come into block after, the block is signed according to signature is regular, it is then again that the block after signature is wide Broadcast to other nodes, or each seed node can also be broadcast to, it is then by each seed node that the newly-generated block is wide Broadcast is gone.So original node 21 is difficult to be found, in addition, in this embodiment it is assumed that the private key of original node 21 is to pacify very much Complete, originate the compromised possibility very little of the private key of node 21.
In addition, the address of the seed node in a block chain network can be published to other sections in block chain network Point, it is also possible in the client software for other nodes being solidificated in block chain network.
If a certain node is wanted to add block chain network, as shown in Fig. 2 24 represent the pre- new node for adding block chain network, New node 24 first installs the client software of the block chain as a node newly added, then according to the client software The seed node address of inside solidification, the solicited message that request adds block chain network 23 is sent to seed node 22.
Step S102, the new node receive the wound generation block of the seed node feedback, and the wound generation block includes wound The public key of beginning node, the original node is the node for creating the wound generation block, and the original node is used in block chain Block signed.
The request that seed node 22 receives the transmission of new node 24 is added after the solicited message of block chain network 23, seed section Wound generation block is sent to new node 24 by point 22, and wound generation block includes the public key of original node 21.
In addition, the new node is received in the neighboring node list that the seed node is sent, the neighboring node list The identification information of neighbor node including the new node.The new node is according to the neighboring node list, to the neighbours Node sends the solicited message of acquisition request block chain account book.In the neighboring node list identification information of neighbor node be by According to the priority ranking of the neighbor node of the new node;The priority of the neighbor node is according to the neighbor node What the network segment where IP address and the network segment where the IP address of the new node were determined.
When new node 24 sends the solicited message of the request addition block chain network to seed node 22, seed node 22 The neighbor node of new node 24 can also be determined according to the corresponding network segment of IP address of new node 24, seed node 22 is to new section While point 24 sends wound generation block, neighboring node list can also be issued in the lump to new node 24, in the neighboring node list The identification information of neighbor node including new node 24, optionally, in neighboring node list the identification information of neighbor node be by According to the priority ranking of the neighbor node of the new node, the priority of neighbor node is IP according to the neighbor node What the network segment where location and the network segment where the IP address of the new node were determined, for example, existing with the IP address of the new node The priority of the neighbor node of the same network segment is higher.
New node 24 obtains the identification information of first neighbor node, optionally, first neighbour from neighboring node list Occupy the highest priority of node, and first neighbor node into neighboring node list sends acquisition request block chain account book Solicited message, if after preset time, new node 24 is not received by the block chain that the neighbor node of highest priority is returned Account book, then select second neighbor node from neighboring node list, and the priority of second neighbor node is less than first The priority of neighbor node, and to the solicited message of second neighbor node transmission acquisition request block chain account book, if in advance If after the time, new node 24 is not received by the block chain account book that second neighbor node is returned, then is arranged from neighbor node The 3rd neighbor node is selected in table, the like.
Step S103, the new node are tested the block in the block chain according to the public key of the original node Card.
In the present embodiment, the neighbor node 25 of new node 24 can also send block to new node 24, and new node 24 will The block that neighbor node 25 is sent is associated with wound generation block according to the cryptographic Hash of these blocks, obtains a whole piece block Chain, further, the public key of original node 21 of the new node 24 in the wound generation block are true to be carried out to this block chain Property checking, specifically, new node 24 obtains the public key of original node 21 from wound generation block, and according to the public key of original node 21 Block in block chain is verified, if the new node according to the public key of the original node in the block chain Block is verified, it is determined that the block is legal block;If the new node is according to the public key of the original node To the block authentication failed in the block chain, it is determined that the block is the block forged.
The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art, Original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original Node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network, Other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve node acquisition Create the security of generation block;In addition, the public key of the original node in the wound generation block is true to be carried out to this block chain Property checking, improve the security of block.So that attacker forges the block failure of wound generation.
Fig. 3 is the structure chart provided in an embodiment of the present invention for creating generation block false proof device.Wound provided in an embodiment of the present invention Generation block false proof device can perform the handling process that wound generation block method for anti-counterfeit embodiment is provided, wound generation block false proof device position In the new node of the pre- addition block chain network described in above-described embodiment, as shown in figure 3, wound generation block false proof device 30 is wrapped Include:Sending module 31, receiving module 32, authentication module 33, wherein, sending module 31 is used to send request addition to seed node The solicited message of the block chain network, the new node is previously stored with the address information of the seed node;Receiving module 32 are used to receive the wound generation block that the seed node feeds back, and the wound generation block includes the public key of original node, described original Node is the node for creating the wound generation block, and the original node is used to sign to the block in block chain;Verify mould Block 33 is used to verify the block in the block chain according to the public key of the original node.
Wound generation block false proof device provided in an embodiment of the present invention can be specifically for performing the method that above-mentioned Fig. 1 is provided Embodiment, here is omitted for concrete function.
The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art, Original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original Node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network, Other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve node acquisition Create the security of generation block;In addition, the public key of the original node in the wound generation block is true to be carried out to this block chain Property checking, improve the security of block.So that attacker forges the block failure of wound generation.
On the basis of above-described embodiment, receiving module 32 is additionally operable to:Receive the neighbor node that the seed node is sent List, the neighboring node list includes the identification information of the neighbor node of the new node.Sending module 31 is additionally operable to:Root According to the neighboring node list, the solicited message of acquisition request block chain account book is sent to the neighbor node.Neighbours' section The identification information of neighbor node is the priority ranking of the neighbor node according to the new node in point list;Neighbours' section The priority of point is the network segment where the IP address of the network segment according to where the IP address of the neighbor node and the new node Determine.Authentication module 33 specifically for:If the new node is according to the public key of the original node in the block chain Block be verified, it is determined that the block be legal block;If the new node is according to the public affairs of the original node Key is to the block authentication failed in the block chain, it is determined that the block is the block forged.
Wound generation block false proof device provided in an embodiment of the present invention can be specifically for performing the method that above-mentioned Fig. 1 is provided Embodiment, here is omitted for concrete function.
The embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared in the prior art, Original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, it is to avoid original Node is by assault;In addition, the address of seed node is solidificated in the client software of other nodes in block chain network, Other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve node acquisition Create the security of generation block;In addition, the public key of the original node in the wound generation block is true to be carried out to this block chain Property checking, improve the security of block.So that attacker forges the block failure of wound generation.
In summary, the embodiment of the present invention distributes the wound generation block that original node is created by seed node, compared to existing Have in technology, original node directly distributes wound generation block, so that ensure that the IP address of original node will not come forth out, keeps away Original node is exempted from by assault;In addition, the address of seed node is solidificated in the client of other nodes in block chain network Hold in software, other nodes that can be allowed in block chain network obtain wound generation block from the security node preassigned, improve Node obtains the security of wound generation block;In addition, the public key of the original node in the wound generation block is come to this block Chain carries out authenticity verification, improves the security of block.So that attacker forges the block failure of wound generation.
, can be by it in several embodiments provided by the present invention, it should be understood that disclosed apparatus and method Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed Coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLINGs or logical of device or unit by some interfaces Letter connection, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer Equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform the present invention each The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division progress for example, in practical application, can distribute complete by different functional modules by above-mentioned functions as needed Into the internal structure of device being divided into different functional modules, to complete all or part of function described above.On The specific work process of the device of description is stated, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. one kind wound generation block method for anti-counterfeit, it is characterised in that including:
The pre- new node for adding block chain network sends the solicited message that request adds the block chain network, institute to seed node State the address information that new node is previously stored with the seed node;
The new node receives the wound generation block of the seed node feedback, and the wound generation block includes the public key of original node, The original node is the node for creating the wound generation block, and the original node is used to sign the block in block chain Name;
The new node is verified according to the public key of the original node to the block in the block chain.
2. according to the method described in claim 1, it is characterised in that also include:
The new node receives the neighboring node list that the seed node is sent, and the neighboring node list includes described new The identification information of the neighbor node of node.
3. method according to claim 2, it is characterised in that also include:
The new node sends the request of acquisition request block chain account book to the neighbor node according to the neighboring node list Information.
4. method according to claim 3, it is characterised in that the identification information of neighbor node in the neighboring node list It is the priority ranking of the neighbor node according to the new node;
The priority of the neighbor node is the IP of the network segment according to where the IP address of the neighbor node and the new node What the network segment where address was determined.
5. the method according to claim any one of 1-4, it is characterised in that the new node is according to the original node Public key verifies to the block in the block chain, including:
If the new node is verified according to the public key of the original node to the block in the block chain, it is determined that institute Block is stated for legal block;
If the new node is according to the public key of the original node to the block authentication failed in the block chain, it is determined that institute The block for stating block to forge.
6. one kind wound generation block false proof device, it is characterised in that the wound generation block false proof device is located at pre- addition block link network The new node of network, including:
Sending module, for sending the solicited message that request adds the block chain network to seed node, the new node is pre- First be stored with the address information of the seed node;
Receiving module, the wound generation block for receiving the seed node feedback, the wound generation block includes the public affairs of original node Key, the original node is the node for creating the wound generation block, and the original node is used to carry out the block in block chain Signature;
Authentication module, is verified for the public key according to the original node to the block in the block chain.
7. wound generation block false proof device according to claim 6, it is characterised in that the receiving module is additionally operable to:Receive The neighboring node list that the seed node is sent, the neighboring node list includes the mark of the neighbor node of the new node Know information.
8. wound generation block false proof device according to claim 7, it is characterised in that the sending module is additionally operable to:According to The neighboring node list, the solicited message of acquisition request block chain account book is sent to the neighbor node.
9. wound generation block false proof device according to claim 8, it is characterised in that neighbours save in the neighboring node list The identification information of point is the priority ranking of the neighbor node according to the new node;
The priority of the neighbor node is the IP of the network segment according to where the IP address of the neighbor node and the new node What the network segment where address was determined.
10. the wound generation block false proof device according to claim any one of 6-9, it is characterised in that the authentication module tool Body is used for:
If the new node is verified according to the public key of the original node to the block in the block chain, it is determined that institute Block is stated for legal block;
If the new node is according to the public key of the original node to the block authentication failed in the block chain, it is determined that institute The block for stating block to forge.
CN201710502391.0A 2017-06-27 2017-06-27 Create generation block method for anti-counterfeit and device Active CN107231239B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710502391.0A CN107231239B (en) 2017-06-27 2017-06-27 Create generation block method for anti-counterfeit and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710502391.0A CN107231239B (en) 2017-06-27 2017-06-27 Create generation block method for anti-counterfeit and device

Publications (2)

Publication Number Publication Date
CN107231239A true CN107231239A (en) 2017-10-03
CN107231239B CN107231239B (en) 2019-06-25

Family

ID=59935640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710502391.0A Active CN107231239B (en) 2017-06-27 2017-06-27 Create generation block method for anti-counterfeit and device

Country Status (1)

Country Link
CN (1) CN107231239B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995270A (en) * 2017-11-24 2018-05-04 成都赤乌软件技术有限公司 A kind of method that distributed document storage is realized based on block chain
CN108665275A (en) * 2018-02-20 2018-10-16 泰山·约克·维纳斯基 The system and method for block chain project management
CN108810157A (en) * 2018-06-20 2018-11-13 泰链(厦门)科技有限公司 The connection method of block chain network, medium, apparatus and system
CN109194750A (en) * 2018-09-10 2019-01-11 杭州链汇通区块链科技有限公司 Anti-attack method, the device of block catenary system and block chain super node
CN109302307A (en) * 2018-08-16 2019-02-01 泰链(厦门)科技有限公司 Network host, the method based on network host rapid deployment block chain node
CN109728954A (en) * 2019-01-04 2019-05-07 深圳壹账通智能科技有限公司 Alliance's chain node management system and method
CN109995764A (en) * 2019-03-07 2019-07-09 北京华安普特网络科技有限公司 A kind of DDOS attack defence method based on block chain
CN110266763A (en) * 2019-05-20 2019-09-20 深圳壹账通智能科技有限公司 Block chain network implementation method, system and the storage medium of cross-network segment interconnection
KR102041720B1 (en) * 2018-07-20 2019-11-06 숭실대학교산학협력단 Implementing system of flexible blockchain framework and p2p network constructing method thereof, recording medium for performing the method
CN110581892A (en) * 2019-09-17 2019-12-17 上海保险交易所股份有限公司 Block chain based network connection and recovery mechanism
CN110799966A (en) * 2018-04-22 2020-02-14 因特比有限公司 Method and system for hosting a new blockchain using existing blockchain nodes
CN110956542A (en) * 2019-11-07 2020-04-03 支付宝(杭州)信息技术有限公司 Block chain system and operation method, device and equipment thereof
CN112055077A (en) * 2020-09-02 2020-12-08 杭州复杂美科技有限公司 Block link access method, device and storage medium
CN112235340A (en) * 2020-09-01 2021-01-15 迅鳐成都科技有限公司 Distributed block chain networking method, device, system and storage medium
CN113206893A (en) * 2021-07-05 2021-08-03 支付宝(杭州)信息技术有限公司 Method for block synchronization and node joining block chain network

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580233A (en) * 2015-01-16 2015-04-29 重庆邮电大学 Internet of Things smart home security gateway system
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
KR101723405B1 (en) * 2016-07-04 2017-04-06 주식회사 코인플러그 Certificate authentication system and method based on block chain
CN106651332A (en) * 2016-12-29 2017-05-10 先锋支付有限公司 Block chain and method for generating new block in block chain
CN106709734A (en) * 2016-12-21 2017-05-24 毛巨林 Multiple-two-dimensional code tracing method based on digital identity and system thereof
CN106789041A (en) * 2017-02-15 2017-05-31 江苏信源久安信息科技有限公司 A kind of credible block chain method of decentralization certificate
CN106789920A (en) * 2016-11-25 2017-05-31 深圳前海微众银行股份有限公司 The joint connecting method and device of block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104580233A (en) * 2015-01-16 2015-04-29 重庆邮电大学 Internet of Things smart home security gateway system
KR101723405B1 (en) * 2016-07-04 2017-04-06 주식회사 코인플러그 Certificate authentication system and method based on block chain
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106789920A (en) * 2016-11-25 2017-05-31 深圳前海微众银行股份有限公司 The joint connecting method and device of block chain
CN106709734A (en) * 2016-12-21 2017-05-24 毛巨林 Multiple-two-dimensional code tracing method based on digital identity and system thereof
CN106651332A (en) * 2016-12-29 2017-05-10 先锋支付有限公司 Block chain and method for generating new block in block chain
CN106789041A (en) * 2017-02-15 2017-05-31 江苏信源久安信息科技有限公司 A kind of credible block chain method of decentralization certificate

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995270A (en) * 2017-11-24 2018-05-04 成都赤乌软件技术有限公司 A kind of method that distributed document storage is realized based on block chain
CN108665275A (en) * 2018-02-20 2018-10-16 泰山·约克·维纳斯基 The system and method for block chain project management
CN110799966A (en) * 2018-04-22 2020-02-14 因特比有限公司 Method and system for hosting a new blockchain using existing blockchain nodes
CN108810157A (en) * 2018-06-20 2018-11-13 泰链(厦门)科技有限公司 The connection method of block chain network, medium, apparatus and system
KR102041720B1 (en) * 2018-07-20 2019-11-06 숭실대학교산학협력단 Implementing system of flexible blockchain framework and p2p network constructing method thereof, recording medium for performing the method
CN109302307A (en) * 2018-08-16 2019-02-01 泰链(厦门)科技有限公司 Network host, the method based on network host rapid deployment block chain node
CN109302307B (en) * 2018-08-16 2021-06-04 泰链(厦门)科技有限公司 Network host and method for rapidly deploying block chain nodes based on network host
CN109194750A (en) * 2018-09-10 2019-01-11 杭州链汇通区块链科技有限公司 Anti-attack method, the device of block catenary system and block chain super node
CN109728954A (en) * 2019-01-04 2019-05-07 深圳壹账通智能科技有限公司 Alliance's chain node management system and method
CN109728954B (en) * 2019-01-04 2022-03-04 深圳壹账通智能科技有限公司 Federation node point management system and method
CN109995764A (en) * 2019-03-07 2019-07-09 北京华安普特网络科技有限公司 A kind of DDOS attack defence method based on block chain
CN110266763A (en) * 2019-05-20 2019-09-20 深圳壹账通智能科技有限公司 Block chain network implementation method, system and the storage medium of cross-network segment interconnection
CN110581892A (en) * 2019-09-17 2019-12-17 上海保险交易所股份有限公司 Block chain based network connection and recovery mechanism
CN110581892B (en) * 2019-09-17 2022-04-01 上海保险交易所股份有限公司 Block chain based network connection and recovery mechanism
CN110956542A (en) * 2019-11-07 2020-04-03 支付宝(杭州)信息技术有限公司 Block chain system and operation method, device and equipment thereof
WO2021088421A1 (en) * 2019-11-07 2021-05-14 支付宝(杭州)信息技术有限公司 Blockchain system and operation method therefor, apparatus, and device
CN110956542B (en) * 2019-11-07 2021-05-18 支付宝(杭州)信息技术有限公司 Block chain system and operation method, device and equipment thereof
CN112235340A (en) * 2020-09-01 2021-01-15 迅鳐成都科技有限公司 Distributed block chain networking method, device, system and storage medium
CN112055077A (en) * 2020-09-02 2020-12-08 杭州复杂美科技有限公司 Block link access method, device and storage medium
CN112055077B (en) * 2020-09-02 2023-04-18 杭州复杂美科技有限公司 Block link access method, device and storage medium
CN113206893B (en) * 2021-07-05 2021-09-14 支付宝(杭州)信息技术有限公司 Method for block synchronization and node joining block chain network
CN113206893A (en) * 2021-07-05 2021-08-03 支付宝(杭州)信息技术有限公司 Method for block synchronization and node joining block chain network
WO2023279971A1 (en) * 2021-07-05 2023-01-12 支付宝(杭州)信息技术有限公司 Block synchronization method, and method for making node join blockchain network

Also Published As

Publication number Publication date
CN107231239B (en) 2019-06-25

Similar Documents

Publication Publication Date Title
CN107231239A (en) Create generation block method for anti-counterfeit and device
CN107171810A (en) The verification method and device of block chain
CN109936457B (en) Block chain multi-party witness method, device, equipment and computer readable storage medium
CN107396360A (en) Block verification method and device
CN107276765A (en) The processing method and processing device known together in block chain
CN107147501A (en) Timestamp processing method and processing device
US20190251527A1 (en) System, Method, and Computer Program Product for a Distributed, Cryptographically Secured Proof-of-Intent Transaction Network
CN110399424B (en) Block generation method, block generation device, block chain node and storage medium
CN111865587B (en) Data processing method, block link point device, electronic device, and computer program
CN107493162A (en) The implementation method and device of block chain node
CN108646983A (en) The treating method and apparatus of storage service data on block chain
EP4002181A1 (en) A consensus method and framework for a blockchain system
CN107480990A (en) Block chain bookkeeping methods and device
CN107078903A (en) Digging ore deposit method, device and the node device of block chain
CN107005574A (en) Block generation method and device and block chain network
WO2022099966A1 (en) Blockchain-based ddos attack joint defense system and method
CN108352009A (en) Block chain generating means, block chain generation method, block chain verification device, block chain verification method and program
CN108292395A (en) Block chain generating means, block chain generation method, block chain verification device, block chain verification method and program
CN109102287A (en) Block chain bookkeeping methods, device, equipment and storage medium
CN106452785A (en) Block chain network, branch node and block chain network application method
CN108810119A (en) block chain processing method, device and block chain node
KR20200032449A (en) A method for establishing agreement between nodes in a Blockchain network and a Blockchain system
CN108038954A (en) Transaction operation method and digging ore deposit node based on block chain
CN107276762A (en) The method of work and device of a kind of multi-protocols block chain
CN109242299A (en) Distribution digs mine method, digs mine machine and block catenary system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant