CN110138566A - Verification method, device, electronic equipment and computer readable storage medium - Google Patents

Verification method, device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN110138566A
CN110138566A CN201910397684.6A CN201910397684A CN110138566A CN 110138566 A CN110138566 A CN 110138566A CN 201910397684 A CN201910397684 A CN 201910397684A CN 110138566 A CN110138566 A CN 110138566A
Authority
CN
China
Prior art keywords
time point
identifier
information
target block
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910397684.6A
Other languages
Chinese (zh)
Inventor
汪明
闫旋
尚勇
徐涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Wallet (beijing) Technology Co Ltd
Original Assignee
Digital Wallet (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Wallet (beijing) Technology Co Ltd filed Critical Digital Wallet (beijing) Technology Co Ltd
Priority to CN201910397684.6A priority Critical patent/CN110138566A/en
Publication of CN110138566A publication Critical patent/CN110138566A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Present applicant proposes a kind of verification methods, device, electronic equipment and computer readable storage medium, it is related to Internet technical field, by the block header information for receiving full node feeding back in target block chain network at the second time point, and then obtain the corresponding second identifier aggregate information of target block chain network, so that electronic equipment is according to second identifier's aggregate information and the target block chain network of storage in the corresponding first identifier combining information of first time point, target block chain network is verified, compared with the prior art, electronic equipment is set to be able to verify that whether target block chain network data update abnormal occurs, and then may determine that whether the information of full node feeding back in target block chain network is complete or accurate.

Description

Verification method, device, electronic equipment and computer readable storage medium
Technical field
This application involves Internet technical fields, in particular to a kind of verification method, device, electronic equipment and meter Calculation machine readable storage medium storing program for executing.
Background technique
The characteristics of due to block chain decentralization, there are thousands of full nodes (Full Node) to synchronize in store chain On all block informations.Over time, the trade fair on block chain is more and more, and causes the number on block chain According to increasing, it includes the computer resource that stores, including bandwidth to synchronize block chain that Quan Jiedian, which is necessarily required to expend largely, On full dose data.When user utilizes Distributed Application software (Decentralized at mobile terminal (such as mobile phone) Application, DApp) it wishes to integrate on block chain and is engaged in transactional operation, such as the Transaction Information on block chain is obtained, it presses According to existing block chain (such as bit coin) scheme, the full node of block chain for needing to build by oneself or mentioned by third party The agent node of confession executes.
For example, illustratively, digital cash account wallet and user B are carried out money transfer transactions, user by mobile phone by user A A is communicated firstly the need of operating handset with corresponding full node, and corresponding Transaction Information is then broadcast to area by full node On block chain, verification common recognition is carried out by identifier (Validator) node on block chain, Transaction Information is transmitted to new block In, and cochain is completed, including full node passes through the data information on synchronous block chain to obtain and contain Transaction Information herein All data informations;Thereafter, if user A is connected to accordingly, full node is to confirm this time to transfer accounts whether complete, Quan Jiedian User A can be fed back to according to global data information synchronous on block chain.
But in the above-mentioned technical solutions, the entrance due to full node as block chain, user can not verify entirely in mobile terminal The correctness and integrality of the global data information of node feeding back, if full node is caused either to be attacked since some factors limit It hits control and the data information on block chain could not be synchronized, users' mobile end can not know whether the information of full node feeding back is complete Or it is accurate.
Summary of the invention
The application's is designed to provide a kind of verification method, device, electronic equipment and computer readable storage medium, energy Electronic equipment is enough set to be able to verify that whether target block chain network data update abnormal occurs.
To achieve the goals above, the embodiment of the present application the technical solution adopted is as follows:
In a first aspect, the embodiment of the present application provides a kind of verification method, it is applied to electronic equipment, the electronic equipment is deposited The corresponding first identifier aggregate information of target block chain network is contained, the first identifier aggregate information is used to indicate described All identifiers that target block chain network includes in first time point, which comprises
The block header information of full node feeding back in the target block chain network is received at the second time point, wherein institute It stated for the second time point after the first time point, includes second identifier's aggregate information, institute in the block header information That states that second identifier's aggregate information is used to indicate that the target block chain network includes at second time point all tests Witness;
According to the first identifier aggregate information and the second identifier aggregate information, to the target block link network Network is verified.
Second aspect, the embodiment of the present application provide a kind of verifying device, are applied to electronic equipment, and the electronic equipment is deposited The corresponding first identifier aggregate information of target block chain network is contained, the first identifier aggregate information is used to indicate described All identifiers that target block chain network includes in first time point, described device include:
Receiving module, for receiving the block head of full node feeding back in the target block chain network at the second time point Information, wherein second time point includes the second identifier in the block header information after the first time point Aggregate information, the second identifier aggregate information are used to indicate target block chain network packet at second time point All identifiers contained;
Processing module is used for according to the first identifier aggregate information and the second identifier aggregate information, to institute Target block chain network is stated to be verified.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, and the electronic equipment includes memory, for depositing Store up one or more programs;Processor.When one or more of programs are executed by the processor, above-mentioned verifying is realized Method.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence, the computer program realize above-mentioned verification method when being executed by processor.
Compared with the existing technology, a kind of verification method, device provided by the embodiment of the present application, electronic equipment and computer Readable storage medium storing program for executing, by receiving the block header information of full node feeding back in target block chain network at the second time point, into And the corresponding second identifier aggregate information of target block chain network is obtained, believe so that electronic equipment is gathered according to the second identifier Breath and the target block chain network of storage are in the corresponding first identifier combining information of first time point, to target block link network Network is verified, and compared with the prior art, so that electronic equipment is able to verify that whether target block chain network data occurs strangeer Often, and then may determine that whether the information of full node feeding back in target block chain network is complete or accurate.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of schematic block diagram of electronic equipment provided by the embodiment of the present application;
Fig. 2 is a kind of schematic flow chart of verification method provided by the embodiment of the present application;
Fig. 3 is a kind of schematic flow chart of the sub-step of S203 in Fig. 2;
Fig. 4 is a kind of schematic flow chart of the sub-step of S203-4 in Fig. 3;
Fig. 5 is a kind of illustrative application exemplary diagram;
Fig. 6 is the enlarged diagram of region A in Fig. 5;
Fig. 7 is a kind of schematic diagram of verifying device provided by the embodiment of the present application.
In figure: 100- electronic equipment;101- memory;102- processor;103- communication interface;300- verifies device; 301- receiving module;302- processing module.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimed Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common Technical staff's every other embodiment obtained without creative efforts belongs to the model of the application protection It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
As described above, full entrance of the node as block chain, needs to expend and a large amount of exist including hardware store, communication bandwidth Interior computer resource synchronizes increasingly increased full dose data on block chain in time, if full node limited due to some factors or It is that could not synchronize the data information on block chain after controlling by hacker attack, and in current mechanism, due to users' mobile end The information of full node feeding back can not be verified, so as to cause users' mobile end can not know full node feeding back information whether It is complete or accurate.
With reference to the accompanying drawing, it elaborates to some embodiments of the application.In the absence of conflict, following Feature in embodiment and embodiment can be combined with each other.
Referring to Fig. 1, Fig. 1 is a kind of schematic block diagram of electronic equipment 100 provided by the embodiment of the present application.Electricity Sub- equipment 100 includes memory 101, processor 102 and communication interface 103, the memory 101, processor 102 and communication interface 103 are directly or indirectly electrically connected between each other, to realize the transmission or interaction of data.For example, these elements are mutual It can be realized and be electrically connected by one or more communication bus or signal wire.
Memory 101 can be used for storing software program and module, and the verifying device 300 as provided by the embodiment of the present application is right Program instruction/the module answered, the software program and module that processor 102 is stored in memory 101 by execution, thereby executing Various function application and data processing.The communication interface 103 can be used for carrying out the logical of signaling or data with other node devices Letter.
Wherein, memory 101 can be but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), Electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..
Processor 102 can be a kind of IC chip, have signal handling capacity.The processor 102 can be logical With processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processing, DSP), dedicated collection At circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.
It is appreciated that structure shown in FIG. 1 is only to illustrate, electronic equipment 100 may also include it is more than shown in Fig. 1 or Less component, or with the configuration different from shown in Fig. 1.Each component shown in Fig. 1 can using hardware, software or its Combination is realized.
For electronic equipment 100 as shown in connection with fig. 1, exemplary theory is carried out to verification method provided by the embodiments of the present application Bright, electronic equipment 100 is stored with the corresponding first identifier aggregate information of target block chain network, which gathers letter Breath is used to indicate all identifiers that target block chain network includes in first time point, such as, it is assumed that it is early in some day Identifier when upper 6 point-like electron equipment 100 establishes communication with the full node in target block chain network, in target block chain network Node includes A, B, C, D, then corresponding first verifying of target block chain network that electronic equipment 100 was stored in this day 6:00 AM People's aggregate information includes A, B, C, D.
Wherein, it is worth noting that, as a kind of possible implementation, based on the block header data packet in block chain Contain Merkle Tree (Merkel tree) the radical evidence that can summarize and quickly conclude All Activity data in verification block, electricity Sub- equipment 100 can be by the block header information of full node feeding back in parsing target block chain network, to obtain target area All identifiers that block chain network includes in first time point, and then obtain first identifier's aggregate information and store.
Electronic equipment 100 is when verifying target block chain network, referring to Fig. 2, Fig. 2 is the embodiment of the present application institute A kind of schematic flow chart of the verification method of offer, comprising the following steps:
S201 receives the block header information of full node feeding back in target block chain network at the second time point.
S203 carries out target block chain network according to first identifier's aggregate information and second identifier's aggregate information Verifying.
At the second time point after first time point, it is anti-that electronic equipment 100 receives full node in target block chain network The block header information of feedback parses the block header information, obtains the institute that target block chain network includes at the second time point There is identifier, and then obtains second identifier's aggregate information.
For example, electronic equipment 100 gets target block chain network in this day 12 noon on the basis of above-mentioned example The identifier's node for including includes A, B, C, E, then second identifier's aggregate information includes A, B, C, E at this time.
Electronic equipment 100 can be according to first identifier's aggregate information of storage, by comparing the first identifier collection as a result, Close information and second identifier's aggregate information, with verify target block chain network whether be likely due to some factors limitations or It is to be attacked control and the data information on block chain could not be synchronized, to judge full node feeding back in target block chain network Whether information is complete or accurate.
Based on above-mentioned design, verification method provided by the embodiments of the present application, by receiving target block at the second time point The block header information of full node feeding back in chain network, and then obtain corresponding second identifier of target block chain network and gather letter Breath, so that electronic equipment is corresponding in first time point according to second identifier's aggregate information and the target block chain network of storage First identifier's combining information, target block chain network is verified, compared with the prior art, electronic equipment is enable to test Whether card target block chain network, which such as factor limitation occurs, is either controlled by attack and could not synchronize the data on block chain The data update abnormal of information etc., and then may determine that whether the information of full node feeding back in target block chain network is complete or quasi- Really.
Optionally, to realize the S203 in above-mentioned Fig. 2, referring to Fig. 3, one kind that Fig. 3 is the sub-step of S203 in Fig. 2 is shown Meaning property flow chart, as a kind of possible implementation, on the basis of Fig. 2, S203 may include following sub-step:
S203-1 obtains the information gap value of first identifier's aggregate information and second identifier's aggregate information.
S203-2, judges whether information gap value reaches information gap threshold value;If it has not, then executing S203-3;If it is, After then executing S203-4, return continues to execute S201.
S203-3, verifying target block chain network success, and the first identifier collection is updated with second identifier's aggregate information Close information.
S203-4 determines third time point between first time point and the second time point, using third time point as The second new time point.
In the embodiment of the present application, electronic equipment 100 is when verifying target block chain network, according to the first verifying People's aggregate information and second identifier's aggregate information obtain both first identifier's combining information and second identifier's aggregate information Information gap value, the information gap value characterize target block chain network in first time point and two time points of the second time point The situation of change of lower identifier.
Also, an information gap threshold value is also stored in electronic equipment 100, which is the first identifier collection The information gap upper limit for closing information and second identifier's aggregate information, if the information gap value that electronic equipment 100 is calculated is not Reach information gap threshold value, then characterizes verifying target block chain network success, execute S203-3 at this time, with the second identifier set Information update the first identifier aggregate information, so that electronic equipment 100 is in subsequent authentication target block chain network, it can be with most The first identifier's aggregate information newly stored verifies target block chain network;Conversely, if information gap value reaches information Discrepancy threshold then characterizes verifying target block chain network failure, S203-4 is executed at this time, in first time point and the second time point Between, it determines third time point, using third time point as the second new time point, verifies target block chain network to reduce Time range, return continue to execute S201.
Illustratively, using above-mentioned example by 6:00 AM some day as first time point, first identifier's aggregate information packet A, B, C, D are included, this day 12 noon includes A, B, C, E as the second time point, second identifier's nodal information, and information gap Threshold value is illustrated for being set as 30%;First identifier's aggregate information that electronic equipment 100 stores is target block link network Identifier collection of the network at 6 is combined into A, B, C, D, and the identifier of the target block chain network obtained at 12 collection be combined into A, B, C, E, as a result, identifier's set A, B, C, the D and target block of electronic equipment 100 according to target block chain network at 6 points Identifier set A, B, C, the E of chain network at 12 points, the information gap value that target block chain network is calculated are 25% (by D Change for E, amount to 4 identifier's nodes, vary by 1), the information gap threshold value 30% not up to set, at this time then with 12 points identifier's set A, B, C, E updates 6 points identifier's set A, B, C, D;Alternatively, if 12 points identifier set and A, B, E, F, the information gap value for the target block chain network being calculated at this time are 50% (by C, D variation for E, F, total 4 Identifier's node varies by 2), reach the information gap threshold value 30% of setting, then determines the at 6 points at 12 points between and at this time Three time points, for example determine that be used as third time point at 9 points, and using 9 points as the second new time point, return and execute S201.
It is worth noting that above-mentioned S203 can also be realized by other means, such as compares the first identifier and gather letter Whether breath is identical as second identifier's aggregate information, if identical, is proved to be successful, if not exactly the same, authentication failed, As long as can be verified i.e. according to first identifier's aggregate information and second identifier's aggregate information to target block chain network It can.
Also, above-mentioned information gap threshold value can be the value for being preset in and setting in electronic equipment 100, be also possible to electronics Equipment 100 receives other equipment value obtained when verifying target block chain network, as long as in electronic equipment 100, storage There is information gap threshold value to verify target block chain network, for example, information gap threshold value can also be time-based Factor is calculated according to the gap length of first time point and the second time point by the basic value set.
Optionally, as a kind of possible implementation, electronic equipment 100 can be used when executing S203-3 with Mode of the two identifier's aggregate informations as first new identifier's aggregate information updates first identifier's aggregate information, such as In the examples described above, first identifier's aggregate information includes A, B, C, D, and second identifier's aggregate information includes A, B, C, E, if electric Sub- equipment 100 is proved to be successful, then using A, B, C, E as first new identifier's aggregate information, so that subsequent to target block When chain network is verified, then verified using A, B, C, E as first identifier's aggregate information.
Optionally, to realize the S203-4 in above-mentioned Fig. 3, referring to Fig. 4, Fig. 4 is one of the sub-step of S203-4 in Fig. 3 Kind schematic flow chart, as a kind of possible implementation, S203-4 includes following sub-step:
S203-4a, according to target block chain network in the corresponding block height of first time point and target block link network Network obtains target block height in the second time point corresponding block height.
S203-4b, using time point of the target block chain network in target block height as third time point.
It include block height in the identifier of description block chain, wherein block height, which refers in block chain, includes The quantity of block.For example, in the examples described above, if target block chain network has 1000 blocks in this day 6:00 AM, At 6, the block height of the target block chain network is 1000;If target block chain network has 9000 in this day 12 noon A block, then at 12, the block height of the target block chain network is 9000.
As a result, when calculating third time point, as a kind of possible implementation, target block chain network can use In the corresponding block height of first time point and target block block chain in the second time point corresponding block height, calculating is obtained Target block height, and then using the target block chain network time point in target block height as third time point.
Wherein, as a kind of possible implementation, the mode for calculating target block height can be to take first time point The arithmetic mean of instantaneous value of corresponding block height block height corresponding with the second time point, it may be assumed that by by block with dichotomy Calculation, target block height can be the corresponding block height of first time point block height corresponding with the second time point Centre block height.Such as in the examples described above, 6 points of first time point of block height is 1000, the second 12 points of time point Block height be 9000, then target block height be 5000, then third time point is that the block height of target block network is Time point when 5000.
It is worth noting that the above-mentioned centre block height that acquisition is calculated in such a way that block two divides, it may be not practical Existing block height, for example, the block height of first time point is 1000, the block height at the second time point is 9001, then With the calculation of dichotomy, the target block height that is calculated is 5000.5, but the block height be it is not existing, because This optionally as a kind of possible mode, can obtain target block height by way of being rounded to centre block height Degree, for example, above-mentioned example 5000.5, the target block height being rounded be 5000, as long as can be obtained with centre block height To target block height, for example, it is also possible that the later digit of centre block height decimal point is carried out the place that rounds up Reason, and then using obtained result as target block height, such as above-mentioned centre block height in 5000.5 example, four are given up Five enter after obtained target block height be 5001.
Also, it is worth noting that it can also be passed through in some other possible implementation of the embodiment of the present application Target area is calculated according to the corresponding block height of first time point and the second time point corresponding block height in his mode Block height, such as with the geometric average of both the corresponding block height of first time point and the second time point corresponding block height Target block height is calculated in value, or according to the first proportionality coefficient and the second proportionality coefficient of setting, respectively multiplied by One time point corresponding block height and the second time point corresponding block height are calculated after the summation of obtained result Target block height, as long as can be with target block chain network in the block height of first time point and at the second time point Block height, which calculates, obtains target block height.
Either, in some other possible implementation of the embodiment of the present application, can also exist in other way Third time point is determined between first time point and the second time point, for example calculates the arithmetic of first time point and the second time point Average value is as third time point, or calculates the geometrical mean at first time point and the second time point as the third time Point.
Example is specifically applied with one below, further example is carried out to verification method provided by the embodiments of the present application Illustrate, please refer to Fig. 5 and Fig. 6, Fig. 5 is a kind of illustrative application exemplary diagram, the amplification signal that Fig. 6 is region A in Fig. 5 Figure, it is assumed that user A sends a Transaction Information to target block chain network by mobile phone at 6 points in the morning, it is intended to turn to user B Account;
Full node in target block chain network is broadcasted, mesh by P2P network (Peer to Peer, peer-to-peer network) All identifiers in mark block chain network know together, when the Transaction Information is total between the identifier of target block chain network After knowledge passes through, user A, such as target area are synchronized to by block header information by new block cochain, and by block chain information Identifier's set A, B, C, the D of block chain network at 6;
The mobile phone of user A is gathered by receiving the synchronous identifier of target block chain, locally saves target area in mobile phone Identifier's set A, B, C, the D of block chain network at 6 is as first identifier's aggregate information, hereafter, the mobile phone of user A It disconnects and being connected to the network with target block chain network, to save bandwidth resources;
It is assumed that user A is intended to inquire whether aforementioned money transfer transactions are completed at 12 points, user A passes through mobile phone to target block Chain sends inquiry request, receives block header information of the target block chain network of full node feeding back at 12 points, it is assumed that setting Information gap threshold value is 1/3, and identifier of the target block chain network of mobile phone terminal parsing block header information acquisition at 12 points Set A, B, E, F start verification scheme as second identifier's aggregate information, the mobile phone terminal of user A, become since identifier gathers Change has been more than 1/3 (for 1/2), and mobile phone terminal, which can not verify, to be passed through, and needs to carry out next round verification;
6 points of time point and acquisition the second identifier collection when mobile phone terminal is according to first identifier's aggregate information of local preservation 12 points of time point when information are closed, determine third time point, for example determine at 9 points, by 9 points as the second time point newly, after The continuous block header information for obtaining target block chain network at 9, it is assumed that mobile phone terminal parses target block chain network at 9 Block header information, identifier's collection of acquisition is combined into A, B, C, E as second new identifier's aggregate information, and mobile phone terminal starts Verification scheme, identifier gather variation less than 1/3 (for 1/4), and mobile phone terminal verification passes through;
Identifier's set A, B, C, E using target block chain network at 9 collects as the first new identifier again at this time Information is closed, using identifier's set A, B, E, the F of target block chain network at 12 as second identifier's aggregate information, continuation Verification, identifier gather variation less than 1/3 (for 1/4), and mobile phone terminal verification passes through, it was demonstrated that mobile phone terminal is obtained from target block chain network The information taken is reliable, and identifier's set A, B, E, F when mobile phone terminal locally saves at 12 is as the first new verifying People's aggregate information, for the mobile phone terminal verifying to target block chain next time.
Referring to Fig. 7, Fig. 7 is a kind of schematic diagram of verifying device 300 provided by the embodiment of the present application, application In electronic equipment 100 as shown in Figure 1, which includes receiving module 301 and processing module 302.
Believe on the block head that receiving module 301 is used to receive full node feeding back in target block chain network at the second time point Breath, wherein the second time point after first time point, in block header information include second identifier's aggregate information, second Identifier's aggregate information is used to indicate all identifiers that target block chain network includes at the second time point.
Processing module 302 is used for according to first identifier's aggregate information and second identifier's aggregate information, to target block Chain network is verified.
Optionally, as a kind of possible implementation, processing module 302 is specifically used for:
Obtain the information gap value of first identifier's aggregate information Yu second identifier's aggregate information;
If information gap value is not up to information gap threshold value, the success of target block chain network is verified, and with the second verifying People's aggregate information updates first identifier's aggregate information, wherein information gap threshold value is first identifier's aggregate information and second The information gap upper limit of identifier's aggregate information;
If information gap value reaches information gap threshold value, between first time point and the second time point, third is determined Time point returns using third time point as the second new time point and continues to receive target block link network at the second time point The block header information of full node feeding back in network.
Optionally, as a kind of possible implementation, processing module 302 updates first with second identifier's aggregate information When identifier's aggregate information, specifically:
Using second identifier's aggregate information as first new identifier's aggregate information.
Optionally, as a kind of possible implementation, processing module 302 first time point and the second time point it Between, when determining third time point, specifically:
According to target block chain network in the corresponding block height of first time point and target block chain network second Time point corresponding block height obtains target block height;
Using time point of the target block chain network in target block height as third time point.
Optionally, as a kind of possible implementation, target block height is the corresponding block height of first time point The centre block height of block height corresponding with the second time point.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by other Mode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown According to the device of the embodiment of the present application, the architecture, function and operation in the cards of method and computer program product. In this regard, each box in flowchart or block diagram can represent a part of a module, section or code, the mould A part of block, program segment or code includes one or more executable instructions for implementing the specified logical function.Also it answers When note that function marked in the box can also be to be different from being marked in attached drawing in some implementations as replacement The sequence of note occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by opposite Sequence execute, this depends on the function involved.It is also noted that each box in block diagram and or flow chart and The combination of box in block diagram and or flow chart can use the dedicated hardware based system for executing defined function or movement System is to realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module in the embodiment of the present application can integrate one independent part of formation together, It can be modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute the embodiment of the present application the method all or part of the steps.And it is preceding The storage medium stated includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), magnetic or disk.
In conclusion a kind of verification method, device provided by the embodiment of the present application, electronic equipment and computer-readable depositing Storage media by receiving the block header information of full node feeding back in target block chain network at the second time point, and then obtains The corresponding second identifier aggregate information of target block chain network so that electronic equipment according to second identifier's aggregate information and The target block chain network of storage carries out target block chain network in the corresponding first identifier combining information of first time point Verifying, compared with the prior art, make electronic equipment be able to verify that target block chain network whether occur such as factor limitation or It is the data update abnormal attacked control and the data information on block chain could not be synchronized etc., and then may determine that target block Whether the information of full node feeding back is complete or accurate in chain network.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.

Claims (10)

1. a kind of verification method, which is characterized in that be applied to electronic equipment, the electronic equipment is stored with target block chain network Corresponding first identifier aggregate information, the first identifier aggregate information are used to indicate the target block chain network All identifiers for including when one time point, which comprises
The block header information of full node feeding back in the target block chain network is received at the second time point, wherein described Two time points included second identifier's aggregate information in the block header information after the first time point, and described the Two identifier's aggregate informations are used to indicate all identifiers that the target block chain network includes at second time point;
According to the first identifier aggregate information and the second identifier aggregate information, to the target block chain network into Row verifying.
2. the method as described in claim 1, which is characterized in that tested according to the first identifier aggregate information and described second Witness's aggregate information, the step of verifying to the target block chain network, comprising:
Obtain the information gap value of the first identifier aggregate information Yu the second identifier aggregate information;
If the information gap value is not up to information gap threshold value, the target block chain network success is verified, and with described Second identifier's aggregate information updates the first identifier aggregate information, wherein the information gap threshold value is described first The information gap upper limit of identifier's aggregate information and the second identifier aggregate information;
If the information gap value reaches the information gap threshold value, the first time point and second time point it Between, determine third time point, using the third time point as the second new time point, return continues to execute described second Time point receives the step of block header information of full node feeding back in the target block chain network.
3. method according to claim 2, which is characterized in that update described first with the second identifier aggregate information and test The step of witness's aggregate information, comprising:
Using the second identifier aggregate information as first new identifier's aggregate information.
4. method according to claim 2, which is characterized in that between the first time point and second time point, The step of determining third time point, comprising:
According to the target block chain network in the corresponding block height of the first time point and the target block link network Network obtains target block height in second time point corresponding block height;
Using time point of the target block chain network in the target block height as the third time point.
5. method as claimed in claim 4, which is characterized in that the target block height is that the first time point is corresponding The centre block height of block height block height corresponding with second time point.
6. a kind of verifying device, which is characterized in that be applied to electronic equipment, the electronic equipment is stored with target block chain network Corresponding first identifier aggregate information, the first identifier aggregate information are used to indicate the target block chain network All identifiers for including when one time point, described device include:
Receiving module, the block head for receiving full node feeding back in the target block chain network at the second time point are believed Breath, wherein second time point after the first time point, collects in the block header information comprising the second identifier Information is closed, the second identifier aggregate information is used to indicate the target block chain network and includes at second time point All identifiers;
Processing module is used for according to the first identifier aggregate information and the second identifier aggregate information, to the mesh Mark block chain network is verified.
7. device as claimed in claim 6, which is characterized in that the processing module is specifically used for:
Obtain the information gap value of the first identifier aggregate information Yu the second identifier aggregate information;
If the information gap value is not up to information gap threshold value, the target block chain network success is verified, and with described Second identifier's aggregate information updates the first identifier aggregate information, wherein the information gap threshold value is described first The information gap upper limit of identifier's aggregate information and the second identifier aggregate information;
If the information gap value reaches the information gap threshold value, the first time point and second time point it Between, it determines third time point, using the third time point as the second new time point, returns and continue to connect at the second time point Receive the block header information of full node feeding back in the target block chain network.
8. device as claimed in claim 7, which is characterized in that the processing module is in the first time point and described second Between time point, when determining third time point, specifically:
According to the target block chain network in the corresponding block height of the first time point and the target block link network Network obtains target block height in second time point corresponding block height;
Using time point of the target block chain network in the target block height as the third time point.
9. a kind of electronic equipment characterized by comprising
Memory, for storing one or more programs;
Processor;
When one or more of programs are executed by the processor, side according to any one of claims 1 to 5 is realized Method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt Processor realizes method according to any one of claims 1 to 5 when executing.
CN201910397684.6A 2019-05-14 2019-05-14 Verification method, device, electronic equipment and computer readable storage medium Pending CN110138566A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910397684.6A CN110138566A (en) 2019-05-14 2019-05-14 Verification method, device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910397684.6A CN110138566A (en) 2019-05-14 2019-05-14 Verification method, device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110138566A true CN110138566A (en) 2019-08-16

Family

ID=67573814

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910397684.6A Pending CN110138566A (en) 2019-05-14 2019-05-14 Verification method, device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110138566A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022134951A1 (en) * 2020-12-24 2022-06-30 腾讯科技(深圳)有限公司 Data synchronization method and apparatus, and device and computer-readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106528746A (en) * 2016-10-26 2017-03-22 江苏通付盾科技有限公司 Trade information inquiring method, device and system
CN108470039A (en) * 2018-02-09 2018-08-31 北京欧链科技有限公司 Data processing method and device in block chain
US20180322160A1 (en) * 2017-05-03 2018-11-08 International Business Machines Corporation Management of snapshot in blockchain
CN109194669A (en) * 2018-09-18 2019-01-11 百度在线网络技术(北京)有限公司 A kind of data transmission method, device, equipment and the medium of lightweight node
WO2019032891A1 (en) * 2017-08-09 2019-02-14 Visa International Service Association Verification of interactions system and method
CN109636388A (en) * 2018-12-07 2019-04-16 深圳市智税链科技有限公司 Data processing method, device, medium and electronic equipment in block chain network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106528746A (en) * 2016-10-26 2017-03-22 江苏通付盾科技有限公司 Trade information inquiring method, device and system
US20180322160A1 (en) * 2017-05-03 2018-11-08 International Business Machines Corporation Management of snapshot in blockchain
WO2019032891A1 (en) * 2017-08-09 2019-02-14 Visa International Service Association Verification of interactions system and method
CN108470039A (en) * 2018-02-09 2018-08-31 北京欧链科技有限公司 Data processing method and device in block chain
CN109194669A (en) * 2018-09-18 2019-01-11 百度在线网络技术(北京)有限公司 A kind of data transmission method, device, equipment and the medium of lightweight node
CN109636388A (en) * 2018-12-07 2019-04-16 深圳市智税链科技有限公司 Data processing method, device, medium and electronic equipment in block chain network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022134951A1 (en) * 2020-12-24 2022-06-30 腾讯科技(深圳)有限公司 Data synchronization method and apparatus, and device and computer-readable storage medium

Similar Documents

Publication Publication Date Title
KR102050129B1 (en) Block chain supporting multiple one-way functions used for verification of blocks
US11233656B2 (en) Method for mining a block in a decentralized blockchain consensus network
CN110276272A (en) Confirm method, apparatus, the storage medium of same administrative staff's relationship of label personnel
EP3693886A1 (en) Optimizations for verification of interactions system and method
CN106339875B (en) Operation note checking method and device based on publicly-owned block chain
CN109242500A (en) Block chain transaction validation verification method, apparatus and storage medium
CN109815657A (en) A kind of identity identifying method and terminal device based on alliance's chain
CN109166040B (en) Transaction auditing method, device, equipment and storage medium based on block chain
CN108710681A (en) File acquisition method, device, equipment and storage medium
CN113282462B (en) Information processing method applied to block chain and big data platform
CN109118615A (en) A kind of intelligent building management method, server, medium and system
CN109078333A (en) A kind of method and device matching game good friend
CN113326165B (en) Data processing method and device based on block chain and computer readable storage medium
CN109615384B (en) Method, device and server for generating timeliness check rule
CN110166249A (en) A kind of information transferring method, device, verifying end and computer readable storage medium
EP4399857A1 (en) Methods and systems for fast consensus within distributed ledgers
CN108833133A (en) Network configuration management method, apparatus and storage medium based on system for cloud computing
CN110138566A (en) Verification method, device, electronic equipment and computer readable storage medium
CN110602215B (en) Resource processing method based on alliance block chain and alliance block chain system
CN112035350A (en) Test method and device for block chain system and computer equipment
CN112202739B (en) Flow monitoring method and device
CN109165947A (en) Account information determines method, apparatus and server
CN111832661A (en) Classification model construction method and device, computer equipment and readable storage medium
CN116074331A (en) Block data synchronization method and related product
CN112307120A (en) Information management server, information management method, and information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned
AD01 Patent right deemed abandoned

Effective date of abandoning: 20221223