CN109558112B - Random number generation method, anti-cheating block chain system, equipment and storage medium - Google Patents

Random number generation method, anti-cheating block chain system, equipment and storage medium Download PDF

Info

Publication number
CN109558112B
CN109558112B CN201811351787.0A CN201811351787A CN109558112B CN 109558112 B CN109558112 B CN 109558112B CN 201811351787 A CN201811351787 A CN 201811351787A CN 109558112 B CN109558112 B CN 109558112B
Authority
CN
China
Prior art keywords
random number
hash
vote
block chain
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811351787.0A
Other languages
Chinese (zh)
Other versions
CN109558112A (en
Inventor
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201811351787.0A priority Critical patent/CN109558112B/en
Publication of CN109558112A publication Critical patent/CN109558112A/en
Application granted granted Critical
Publication of CN109558112B publication Critical patent/CN109558112B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • G06F7/588Random number generators, i.e. based on natural stochastic processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Computational Mathematics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a random number generation method, an anti-cheating block chain system, equipment and a storage medium, wherein the method comprises the following steps: receiving or generating a first random number and a first hash value of the first random number; receiving purchase information of purchasing a vote sent by a first user, freezing a plurality of rights and interests of the first user, and sending a first hash value to a first block chain so that each node of the first block chain can write the first hash value into a first hash list through consensus; the vote is an ore digging voucher of the first block chain, and is used for digging after a preset first time period elapses; after the first time length elapses, whether the vote is successfully dug is judged according to a first numerical value calculated by a pre-configured first formula and a system difficulty value: if yes, the first random number and the corresponding block information are sent to each node of the first block chain for verification. The invention realizes the acquisition of completely random numbers which cannot be controlled by a user and optimizes the mode of generating the random numbers.

Description

Random number generation method, anti-cheating block chain system, equipment and storage medium
Technical Field
The application relates to the technical field of internet finance, in particular to a random number generation method, an anti-cheating block chain system, equipment and a storage medium.
Background
In current blockchain technology, there are many application scenarios (multi-blockchain mini-games) that require the use of random numbers. Generally, a transaction hash is used as a method of generating a random number, but the transaction hash may be completely controlled by a single user. In this case, the random number generated using the transaction hash is not reliable in nature and is easily manipulated, thereby causing problems such as unfairness of the game and impairment of the interests of some users.
Disclosure of Invention
In view of the above-mentioned drawbacks or deficiencies in the prior art, it would be desirable to provide a completely random number generation method, a cheat-resistant blockchain system, an apparatus, and a storage medium that are not controlled by a user.
In a first aspect, the present invention provides a random number generation method, including:
receiving or generating a first random number and a first hash value of the first random number;
receiving purchase information of purchasing a vote sent by a first user, freezing a plurality of rights and interests of the first user, and sending a first hash value to a first block chain so that each node of the first block chain can write the first hash value into a first hash list through consensus; the vote is an ore digging voucher of the first block chain, and is used for digging after a preset first time period elapses;
after the first time length elapses, whether the vote is successfully dug is judged according to a first numerical value calculated by a pre-configured first formula and a system difficulty value: if yes, sending the first random number and the corresponding block information to each node of the first block chain for verification;
the first formula comprises a first random number, the first block chain is configured with a first contract, and the first contract is used for generating a second random number according to each first random number corresponding to a plurality of blocks of the first block chain.
In a second aspect, the present invention provides an anti-cheating blockchain system, where a first blockchain system is an anti-cheating blockchain system, and each node of the first blockchain is configured with a second contract and a third contract;
the second contract is used for recording a vote submitted when a vote is purchased through a plurality of rights held by the first user and a first hash value which is commonly identified in the first hash list; the first hash value is the hash value of a first random number, the vote is an ore digging voucher of the first block chain, the first random number is used for digging the ore after a preset first time period elapses, and the first random number is used for judging and verifying whether the vote is dug successfully;
the third contract is for monitoring whether the first random number is disclosed on the first blockchain in advance before the mine excavation is successful according to the first hash list: if so, the corresponding first hash value is removed from the first hash list and the corresponding vote is invalidated.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a method of random number generation provided according to embodiments of the present invention.
In a fourth aspect, the present invention also provides a storage medium storing a computer program that causes a computer to execute the random number generation method provided according to the embodiments of the present invention.
The random number generation method, the anti-cheating blockchain system, the equipment and the storage medium provided by the embodiments of the invention receive or generate the first random number and the first hash value of the first random number; receiving purchase information of purchasing a vote sent by a first user, freezing a plurality of rights and interests of the first user, and sending a first hash value to a first block chain so that each node of the first block chain can write the first hash value into a first hash list through consensus; the vote is an ore digging voucher of the first block chain, and is used for digging after a preset first time period elapses; after the first time length elapses, whether the vote is successfully dug is judged according to a first numerical value calculated by a pre-configured first formula and a system difficulty value: if so, sending the first random number and the corresponding block information to each node of the first block chain for verification, so as to obtain a completely random number which cannot be controlled by a user and optimize a mode for generating the random number;
the random number generation method, the anti-cheating blockchain system, the equipment and the storage medium provided by some embodiments of the invention further increase punishment measures of cheating users by removing the first hash value of the first random number disclosed on the first blockchain before the ore excavation is successful from the hash list and making the corresponding vote useless, so that the cheating users do not cheat and the user experience of non-cheating users is optimized.
The random number generation method, the anti-cheating block chain system, the equipment and the storage medium further increase punishment measures of cheating users by a method of invalidating votes of the cheating users and then unfreezing the votes of the cheating users after a preset second time period elapses, so that the cheating users do not cheat, and user experience of non-cheating users is optimized.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a schematic diagram of a random number generation scenario according to an embodiment of the present invention.
Fig. 2 is a flowchart of a random number generation method according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a random number monitoring scenario according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a schematic diagram of a random number generation scenario according to an embodiment of the present invention. As shown in fig. 1, in this embodiment, after the user 20 sends the first random number and the first hash value of the first random number to the first blockchain 10, the node 101 provides a service for generating a second random number in cooperation with the first contract, the second contract and the third contract configured on the first blockchain 10, where the second random number is a completely random number that is not controlled by the user. The following describes the random number generation method according to the present invention with reference to fig. 2.
Fig. 2 is a flowchart of a random number generation method according to an embodiment of the present invention. As shown in fig. 2, in this embodiment, the present invention provides a random number generation method, including:
s12: receiving or generating a first random number and a first hash value of the first random number;
s14: receiving purchase information of purchasing a vote sent by a first user, freezing a plurality of rights and interests of the first user, and sending a first hash value to a first block chain so that each node of the first block chain can write the first hash value into a first hash list through consensus; the vote is an ore digging voucher of the first block chain, and is used for digging after a preset first time period elapses;
s16: after the first time length elapses, whether the vote is successfully dug is judged according to a first numerical value calculated by a pre-configured first formula and a system difficulty value: if yes, sending the first random number and the corresponding block information to each node of the first block chain for verification;
the first formula comprises a first random number, the first block chain is configured with a first contract, and the first contract is used for generating a second random number according to each first random number corresponding to a plurality of blocks of the first block chain.
Specifically, taking the application scenario shown in fig. 1 as an example, the user 20 sends a first random number R1 and a first hash value H of the first random number to the first blockchain (R1); the vote is a mine digging voucher of the first block chain, and the proportion of the vote to the frozen interest is configured as follows: 1 sheet (ballot): 10000 coins (certain encryption currency), when a user 20 purchases a vote, the node 101 freezes 10000 certain encryption currencies of the user 20 (the purchased vote is T (S)); after the first hash value H (R1) is identified and written into the first hash list, T (R1) enters a non-mature period, T (R1) enters a mature period after a predetermined first time period (configured as 12 hours) elapses, and T (R1) entering the mature period can perform ore digging; the second random number R2 is generated by taking the first random number R1 of the current block to generate the second random number R2.
In step S12, the node 101 receives the first random number R1 and the first hash value H (R1);
in step S14, the node 101 receives the purchase information sent by the user 20 to purchase a vote, the node 101 freezes a certain encryption currency of 10000 coins of the user 20, and sends the first hash value H (R1) to the first blockchain 10, so that each node of the first blockchain 10 writes the first hash value H (R1) into the first hash list by consensus; wherein the vote is an ore digging voucher of the first block chain and is used for digging after 12 hours elapse;
in step S16, after 12 hours elapse, the node 101 determines whether the vote was successfully dug according to the first numerical value calculated by the pre-configured first formula and the system difficulty value: if yes, sending a first random number R1 and corresponding tile information to each node of the first tile chain 10 for verification;
wherein the first formula comprises a first random number R1, the first blockchain is configured with a first contract for generating a second random number R2 according to the first random number R1.
The above embodiment sends the first random number R1 and the first hash value H of the first random number to the first blockchain by the user (R1), and the ratio of the votes to the freezing rights is configured as: 1 sheet (ballot): 10000 coins (certain cryptocurrency), after a predetermined first time (configured as 12 hours), the second random number generation method is to take the first random number R1 of the current block to generate the second random number R2 as an example, and the random number generation method provided by the invention is explained in detail; in further embodiments, the random number generation method provided by the present invention is not limited to the above examples, and the obtaining manner of the first random number and the first hash value of the first random number may be configured to generate the first random number and the first hash value of the first random number for the node itself according to actual requirements, the ratio of the vote to the freezing right is configured to be different amounts, the first duration is configured to be different values, and the generation method of the second random number is configured to generate the second random number according to the first random number corresponding to any block of the first block chain, so that the same technical effects can be achieved.
The embodiment realizes the acquisition of completely random numbers which cannot be controlled by a user, and optimizes the mode of generating the random numbers.
Fig. 3 is a schematic diagram of a random number monitoring scenario according to an embodiment of the present invention. As shown in fig. 3, in this embodiment, for example, after the node 101 receives the first random number S and the first hash value h (S) of the first random number, and purchases the votes successfully (the purchased votes are t (S)), the first random number S is disclosed on the first block chain 10 before the successful ore mining, the node 101 calculates the hash value h (S) of S, and the node 101 removes the first hash value h (S) from the first hash list, and makes the votes t (S) useless.
The cheating user needs to dig the mine again, needs to purchase the first random number and the first hash value of the first random number again and purchase the vote, and the purchased vote can start digging the mine only after entering the maturity period; the embodiment increases punishment measures of the cheating users, prevents the cheating users from cheating and optimizes user experience of the non-cheating users.
In a preferred embodiment, after the vote is voided, the plurality of benefits are thawed after a predetermined second period of time has elapsed. Taking the example that a user sends a first random number S and a first hash value H (S) of the first random number to a first block chain, after purchasing votes successfully (the purchased votes are T (S)), the first random number S is disclosed on the first block chain before mining successfully, a node calculates the first hash value H (S) of the first random number S, the node removes the first hash value H (S) from a first hash list and makes the votes T (S) useless, 10000 coins are frozen when purchasing the votes T (S), and the preset second time is 24 hours, after the votes T (S) are useless, the frozen 10000 coins are unfrozen after 24 hours.
In further embodiments, the predetermined second time period may be configured to different values according to actual requirements, and the same technical effect may be achieved.
The cheating user wants to dig the mine again, needs to wait for the preset second time to pass, newly purchases and submits the first random number and the first hash value of the first random number, purchases and purchases the vote, and the purchased vote can be dug only after entering the maturity period; the embodiment increases punishment measures of the cheating users, prevents the cheating users from cheating and optimizes user experience of the non-cheating users.
In a preferred embodiment, the first hash list is used to verify the first random number when the mine excavation is successful, remove the corresponding first hash value from the first hash list, and invalidate the corresponding vote. Taking an example that a user sends a first random number M and a first hash value H (M) of the first random number to a first block chain, and after purchasing votes successfully (the purchased votes are T (M)), and when mining succeeds, the first random number M is disclosed on the first block chain, a node verifies the first random number M, removes the first hash value H (M) from a first hash list, and makes the votes T (M) useless; wherein the process of verifying the first random number is as follows: the node calculates a first hash value h (M) of the first random number M and queries in a first hash list whether h (M) exists:
if yes, the node removes the first hash value with the value H (M) from the first hash list and makes the vote T (M) invalid;
if not, the verification is unsuccessful, the node removes the first hash value with the value H (M) from the first hash list, and the vote T (M) is invalidated;
wherein, when the validation is unsuccessful, the votes T (M) are invalidated, the frozen benefits are thawed after a predetermined second period of time has elapsed.
In a preferred embodiment, the first random number is configured to:
r1 ═ Hash (randstring + privkey + i); wherein, R1 is a first random number, randstring is an original random number, privkey is a held private key, and i is an identifier of the vote.
In further embodiments, the first random number may be configured according to actual requirements as: hash (ranging + privkey + i + Y), wherein Y is other parameters, can realize the same technical effect.
In a preferred embodiment, the first formula is configured to:
n ═ Hash (ranging + privkey + i)) + Hash (ranging + privkey + i) + time. Wherein, N is a first numerical value, Hash () is a Hash algorithm, Hash (Hash + privkey + i)) is a first Hash value, Hash (Hash + privkey + i) is a first random number, and time.
In further embodiments, the first formula may be configured according to actual requirements as: n ═ Hash (Hash + privkey + i) + X), where the first formula must include the first random number and X is other parameters, the same technical effect can be achieved.
In a preferred embodiment, the first hash list is used to verify the first random number when the mine excavation is successful, remove the corresponding first hash value from the first hash list, and invalidate the corresponding vote, and the method further includes: after a predetermined timeout period, several benefits are thawed. During the preset overtime period, the node does not accept the purchase information of the votes sent by the first user, and the first user does not need to own the mining voucher by default; after a predetermined timeout period, the node defrosts several benefits.
The invention provides an anti-cheating block chain system, wherein a first block chain system is the anti-cheating block chain system, and each node of the first block chain is provided with a second contract and a third contract;
the second contract is used for recording a vote submitted when a vote is purchased through a plurality of rights held by the first user and a first hash value which is commonly identified in the first hash list; the first hash value is the hash value of a first random number, the vote is an ore digging voucher of the first block chain, the first random number is used for digging the ore after a preset first time period elapses, and the first random number is used for judging and verifying whether the vote is dug successfully;
the third contract is for monitoring whether the first random number is disclosed on the first blockchain in advance before the mine excavation is successful according to the first hash list: if so, the corresponding first hash value is removed from the first hash list and the corresponding vote is invalidated.
The above embodiments can be referred to for the random number generation principle of the anti-cheating blockchain system, and details are not repeated here.
Fig. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 4, as another aspect, the present application also provides an apparatus 400 including one or more Central Processing Units (CPUs) 401 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage section 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the device 400 are also stored. The CPU401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
The following components are connected to the I/O interface 405: an input section 406 including a keyboard, a mouse, and the like; an output section 407 including a display device such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 408 including a hard disk and the like; and a communication section 409 including a network interface card such as a LAN card, a modem, or the like. The communication section 409 performs communication processing via a network such as the internet. A driver 410 is also connected to the I/O interface 405 as needed. A removable medium 411 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 410 as necessary, so that a computer program read out therefrom is mounted into the storage section 408 as necessary.
In particular, according to an embodiment of the present disclosure, the random number generation method and the anti-cheating blockchain system described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing a random number generation method and an anti-cheating blockchain system. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 409, and/or installed from the removable medium 411.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for execution by one or more processors to perform the random number generation method and the anti-cheating blockchain system described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A random number generation method, comprising:
receiving or generating a first random number and a first hash value of the first random number;
receiving purchase information of purchasing a vote, which is sent by a first user, freezing a plurality of rights and interests of the first user, and sending the first hash value to a first block chain, so that each node of the first block chain writes the first hash value into a first hash list through consensus; the vote is an ore digging voucher of the first block chain, and is used for digging after a preset first time period elapses;
after the first time period elapses, whether the vote is successfully dug is judged according to a first numerical value and a system difficulty value which are calculated by a pre-configured first formula: if yes, sending the first random number and corresponding block information to each node of the first block chain for verification;
the first formula includes the first random number, the first block chain is configured with a first contract, and the first contract is used for generating a second random number according to each first random number corresponding to a plurality of blocks of the first block chain.
2. The method of claim 1, wherein the first hash list is used to monitor whether the first random number is disclosed on the first blockchain before the mine excavation is successful: if so, removing the corresponding first hash value from the first hash list and invalidating the corresponding vote.
3. The method of claim 2, wherein the plurality of benefits are defrosted after a predetermined second period of time elapses after the vote is voided.
4. The method of claim 1, wherein the first hash list is used to verify the first random number when a mine excavation is successful, and to remove the corresponding first hash value from the first hash list and invalidate the corresponding vote.
5. The method of claim 1, wherein the first random number is configured to: r1 ═ Hash (randstring + privkey + i); wherein, R1 is the first random number, randstring is the original random number, privkey is the held private key, and i is the identifier of the vote.
6. The method of claim 5, wherein the first formula is configured to:
n ═ Hash (ranging + privkey + i)) + Hash (ranging + privkey + i) + time. Wherein, N is the first numerical value, Hash () is a Hash algorithm, Hash (hashing + privkey + i)) is the first Hash value, Hash (hashing + privkey + i) is the first random number, and time.
7. The method of claim 4, wherein invalidating the corresponding vote further comprises:
and unfreezing the rights after a preset overtime time.
8. An anti-cheating block chain system is characterized in that a first block chain system is the anti-cheating block chain system, and each node of the first block chain is configured with a second contract and a third contract;
the second contract is used for recording a vote submitted when a vote is purchased through a plurality of rights held by a first user and a first hash value which is commonly identified in a first hash list; the first hash value is a hash value of a first random number, the vote is an ore excavation voucher of the first block chain, the first random number is used for excavating the ore after a preset first time period elapses, and the first random number is used for judging and verifying whether the vote is excavated successfully;
the third contract is for monitoring whether the first random number is disclosed on the first blockchain in advance before the ore excavation is successful according to the first hash list: if so, removing the corresponding first hash value from the first hash list and invalidating the corresponding vote.
9. An apparatus for generating random numbers, the apparatus comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-7.
10. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-7.
CN201811351787.0A 2018-11-14 2018-11-14 Random number generation method, anti-cheating block chain system, equipment and storage medium Active CN109558112B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811351787.0A CN109558112B (en) 2018-11-14 2018-11-14 Random number generation method, anti-cheating block chain system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811351787.0A CN109558112B (en) 2018-11-14 2018-11-14 Random number generation method, anti-cheating block chain system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109558112A CN109558112A (en) 2019-04-02
CN109558112B true CN109558112B (en) 2020-08-14

Family

ID=65866206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811351787.0A Active CN109558112B (en) 2018-11-14 2018-11-14 Random number generation method, anti-cheating block chain system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109558112B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071811B (en) * 2019-04-26 2022-02-18 苏州同济区块链研究院有限公司 Random number generation algorithm method based on block chain
CN110430045B (en) * 2019-07-17 2021-10-01 上海朝夕网络技术有限公司 Random number generation method based on distributed consensus algorithm
CN110427763B (en) * 2019-07-24 2021-07-23 上海朝夕网络技术有限公司 Consensus method of distributed system based on predefined execution codes
CN110336668B (en) * 2019-08-08 2022-02-11 杭州复杂美科技有限公司 Random number generation method and device, application, equipment and storage medium
CN110780848B (en) * 2019-10-16 2023-05-12 上海链度科技有限公司 Dual-random generation method and supervision system based on block chain distributed random process
CN111008004A (en) * 2019-11-14 2020-04-14 杭州复杂美科技有限公司 Random number generation method, game method, device and storage medium
CN111185011B (en) * 2019-12-13 2023-04-18 杭州复杂美科技有限公司 Method, apparatus and storage medium for applying random number under block chain game
US20240146509A1 (en) * 2021-03-03 2024-05-02 Digital Currency Institute, The People's Bank Of China Method and Apparatus for Generating Random Number in Blockchain
CN112910643B (en) * 2021-03-03 2023-04-07 中国人民银行数字货币研究所 Method and device for generating random number in block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108366057A (en) * 2018-02-06 2018-08-03 武汉斗鱼网络科技有限公司 A kind of data processing method, client and electronic equipment
CN108388421A (en) * 2017-12-29 2018-08-10 北京欧链科技有限公司 The generation method and device of random number
CN108737109A (en) * 2018-05-11 2018-11-02 北京奇虎科技有限公司 Data proof of possession method, apparatus and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10785022B2 (en) * 2016-09-13 2020-09-22 Hiroshi Watanabe Network without abuse of a private key
US20180130034A1 (en) * 2016-11-07 2018-05-10 LedgerDomain, LLC Extended blockchains for event tracking and management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108388421A (en) * 2017-12-29 2018-08-10 北京欧链科技有限公司 The generation method and device of random number
CN108366057A (en) * 2018-02-06 2018-08-03 武汉斗鱼网络科技有限公司 A kind of data processing method, client and electronic equipment
CN108737109A (en) * 2018-05-11 2018-11-02 北京奇虎科技有限公司 Data proof of possession method, apparatus and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在金融行业的应用模式研究;江海峰;《中国优秀硕士学位论文全文数据库(电子期刊)》;20180815(第8期);第J155-23页 *

Also Published As

Publication number Publication date
CN109558112A (en) 2019-04-02

Similar Documents

Publication Publication Date Title
CN109558112B (en) Random number generation method, anti-cheating block chain system, equipment and storage medium
CN108848055B (en) Block chain consensus method, accounting node and node
Eyal et al. Majority is not enough: Bitcoin mining is vulnerable
CN107220130B (en) Method, device and system for realizing information consensus at nodes of block chain
JP6689946B2 (en) Method of managing resources in any one of a plurality of nodes communicating with each other via a network, and computer apparatus operating as any one of a plurality of nodes communicating with each other via a network
CN106897906B (en) Incentive content distribution method and system
CN111869159B (en) Tamper detection system and tamper detection method
CN109981281B (en) Method and device for determining candidate elements based on block chain proposal random consensus
US20200286049A1 (en) Systems and methods of self-administered protocols on a blockchain platform
KR20180117119A (en) Agent-based Turing complete transactions that incorporate feedback within a block-chain system
CN108111464B (en) Data verification method and device
Goffard Fraud risk assessment within blockchain transactions
CN108846750B (en) Stock right certification consensus method
CN115499379B (en) Information interaction method, device, equipment and medium based on block chain
EP3788757A1 (en) Controlling transactions on a network
US11449938B2 (en) Methods and systems for tracking unspent transaction output (UTXO) tokens in a distributed ledger technology-based network
CN115797070B (en) Block chain transaction method, device and system based on man-in-the-middle account incentive
US10909534B2 (en) Cryptocurrency with value based on electronic resources made available to peer nodes
KR20220067549A (en) Time-locked blockchain transactions and related blockchain technologies
CN112887365B (en) Ultra-lightweight node verification method and device based on MMR algorithm block chain
WO2022079430A1 (en) Blockchain scalability through multilevel-chains
CN115034788A (en) Transaction risk assessment method and device, electronic equipment and storage medium
Bartoletti et al. A theoretical basis for blockchain extractable value
Gong et al. Analyzing the peeling chain patterns on the Bitcoin blockchain
CN113364766B (en) APT attack detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant