CN111415258A - Method for identifying abnormal mining account, punishment method, equipment and storage medium - Google Patents

Method for identifying abnormal mining account, punishment method, equipment and storage medium Download PDF

Info

Publication number
CN111415258A
CN111415258A CN202010224745.1A CN202010224745A CN111415258A CN 111415258 A CN111415258 A CN 111415258A CN 202010224745 A CN202010224745 A CN 202010224745A CN 111415258 A CN111415258 A CN 111415258A
Authority
CN
China
Prior art keywords
block
account
vote
abnormal
mining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010224745.1A
Other languages
Chinese (zh)
Inventor
何玉斌
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN202010224745.1A priority Critical patent/CN111415258A/en
Publication of CN111415258A publication Critical patent/CN111415258A/en
Priority to PCT/CN2020/138883 priority patent/WO2021190010A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides an identification method and a punishment method of an abnormal mining account, equipment and a storage medium, wherein the method comprises the following steps: receiving a first block, and judging whether a second block which has the same block height and different block hash exists locally: if the first vote is the same as the second vote used for generating the second block, the first account holding the first vote is identified as the abnormal mining account. The abnormal ore excavation account is identified through the identification method of the abnormal ore excavation account, punishment is carried out on the account marked as the abnormal ore excavation account by matching with a corresponding punishment method, and therefore the stability of the block chain network is enhanced while the ore excavation benefit of miners is guaranteed.

Description

Method for identifying abnormal mining account, punishment method, equipment and storage medium
Technical Field
The application relates to the technical field of block chains and the like, in particular to an identification method and a punishment method, equipment and a storage medium for an abnormal mining account.
Background
In the existing scheme, whether the mine can be dug depends on the vote; while the transactions in the transaction pools of different nodes are not necessarily identical (the transactions themselves may be different, even if the transactions are identical, the order in which the transactions are stored is not necessarily identical).
For example, ticket1 is imported into node1, node2 and node3 for mining, and the transactions in node1, node2 and node3 transaction pools are different; when a mine with a block height of 50 is dug by ticket1, a block (50) _1 generated by node1, a block (50) _2 generated by node2 and a block (50) _3 generated by node3 are different from each other, and a bifurcation is generated; since the blocks generated according to ticket1 are all correct blocks, it is possible that node4 and node1 will continue to excavate after block (50) _1, node5 and node2 will continue to excavate after block (50) _2, and node6 and node3 will continue to excavate after block (50) _ 3; only one chain is a main chain finally, and assuming that the chain of the final block (50) _1 is the main chain, the side chains of the node5 and the node6 are excavated, so that the benefit is lost; and the above mechanism will cause more branches in the blockchain network, reducing the stability of the blockchain network.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide an identification method and penalty method, device and storage medium for an abnormal mining account, which ensure the benefits of miners and improve the stability of a blockchain network.
In a first aspect, the present invention provides a method for identifying an abnormal mining account applicable to a block chain node, where a vote is used as a mining evidence for generating a block when mining succeeds, the method including:
receiving a first block, and judging whether a second block which has the same block height and different block hash exists locally:
if yes, judging whether a second vote for generating the second block and a first vote for generating the first block are the same vote or not:
and if so, identifying the first account holding the first vote as the abnormal ore digging account.
In a second aspect, the present invention provides a penalty method for an abnormal mining account of a blockchain node, including:
before broadcasting the third block, determining whether the third account generating the third block is an abnormal mining account identified by the identification method of the abnormal mining account of the first aspect:
if yes, judging whether to punish a third account according to a pre-configured punishment rule:
if yes, the broadcast of the third block is delayed according to a pre-configured delay broadcast rule.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform the method of identifying and penalizing abnormal mining accounts provided according to embodiments of the present invention.
In a fourth aspect, the present invention also provides a storage medium storing a computer program, the computer program enabling a computer to execute the method for identifying an abnormal mining account and the method for penalizing the abnormal mining account according to the embodiments of the present invention.
The identification method and penalty method, device and storage medium for the abnormal mining account provided by the embodiments of the present invention receive the first block, and determine whether a second block having the same block height and different block hash as the first block is locally stored: if the second vote used for generating the second block is the same vote as the first vote used for generating the first block, identifying the abnormal mining account by the method for identifying the first account with the first vote as the abnormal mining account, and punishing the account identified as the abnormal mining account by matching with a corresponding punishing method, so that the mining income of miners is ensured, and the stability of the block chain network is enhanced.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of an identification method for an abnormal mining account according to an embodiment of the present invention.
Fig. 2 is a flowchart of a penalty method for an abnormal mining account according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of an identification method for an abnormal mining account according to an embodiment of the present invention. As shown in fig. 1, in this embodiment, the present invention provides a method for identifying an abnormal mining account applicable to a block chain node, where a vote is used as a mining credential for generating a block when mining succeeds, where the method includes:
s121: receiving a first block, and judging whether a second block which has the same block height and different block hash exists locally:
if yes, go to step S122: judging whether a second vote for generating the second block and a first vote for generating the first block are the same vote or not:
if yes, go to step S1221: and identifying the first account holding the first vote as an abnormal mining account.
Specifically, assume that there are 7 nodes 1-7 in the blockchain network; the user A holds ticket1, and the user A guides ticket1 into node1 and node2 to dig the mine; when a mine with the block height of 50 is dug successfully by using ticket1, generating a block (50) _1 by a node1, wherein the block hash of the block (50) _1 is hash (block (50) _1), generating a block (50) _2 by a node2, and the block hash of the block (50) _2 is hash (block (50) _ 2);
in a first scenario, the transactions in node1 and node2 transaction pools are different, node7 receives block (50) _1 preferentially, and nodes 3-6 receive block (50) _2 preferentially;
since the transactions in the node1 and node2 transaction pools are different, hash (block (50) _1) is different from hash (block (50) _2), and block (50) _1 and block (50) _2 are different; but since block (50) _1 and block (50) _2 are both generated according to ticket1, block (50) _1 and block (50) _2 are both correct blocks;
in the prior art, the node1 and the node7 continue to dig the ore after block (50) _1, and the nodes 2 to 6 continue to dig the ore after block (50) _ 2; and finally only one chain will be the main chain, assuming that the chain in which the final block (50) _2 is located is the main chain, the gain of the block generated by the subsequent node7 after block (50) _1 will be lost completely;
assume that the current blockchain node is node 7;
the node7 executes step S121, receives block (50) _2, and determines whether a block with a block height of 50 and a block hash of not hash (block (50) _2) exists locally:
since the node7 preferentially receives block (50) _1, the node7 has block (50) _1 locally, and the hash (block (50) _1) is different from the hash (block (50) _2), step S122 is executed to determine whether the vote for generating block (50) _2 and the vote for generating block (50) _1 are the same vote:
since both block (50) _2 and block (50) _1 are generated by ticket1, step S1221 is performed: and identifying the account of the user A as an abnormal mining account.
If the transactions in the node1 and node2 transaction pools are the same, then hash (block (50) _1) is the same as hash (block (50) _ 2); then node7 receives block (50) _2 and determines that there are locally identical blocks (block height is the same and block hash is the same), node7 discards block (50) _ 2.
In a second scene, a user B holds ticket2, and the user B imports ticket2 into node3 to dig a mine; ticket2 also successfully digs a block with a block height of 50, and node3 generates block (50) _ 3; the node7 receives the block (50) _1 preferentially, and the nodes 4-6 receive the block (50) _2 preferentially;
assume that the current blockchain node is node 7;
node7 executes step S121, receives block (50) _3, and determines whether a block with a block height of 50 exists locally:
since node7 preferentially receives block (50) _1 and block (50) _1 already exists locally at node7, step S122 is executed to determine whether the vote for generating block (50) _3 and the vote for generating block (50) _1 are the same vote:
since block (50) _3 is generated by token 2 and block (50) _1 is generated by token 1, node7 discards block (50) _3 and continues to excavate after block (50) _ 1.
If the first block received by node7 is a block (51) and no block with a block height of 51 exists locally, then the received block (51) is processed according to the prior art (e.g., when the highest block height locally at node7 is 50, the block (51) is stored and mining continues after the block (51)).
In more embodiments, the chunk hash in step S121 may be configured as other parameters according to actual requirements, such as a state hash (step S121: receiving the first chunk, and determining whether a second chunk with the same chunk height as the first chunk and a different state hash exists locally), so that the same technical effect can be achieved.
The embodiment can identify the abnormal ore digging account, punishment is carried out on the account marked as the abnormal ore digging account by matching with a corresponding punishment method, and the stability of the block chain network is enhanced while the ore digging income of miners is ensured.
Preferably, the vote information of the votes is stored in the block mine excavation transaction, and step S122 in the method shown in fig. 1 includes:
analyzing a second mine excavation transaction of the second block to obtain a second vote;
analyzing the first mine digging transaction of the first block to obtain a first vote;
and judging whether the second ballot and the first ballot are the same ballot.
In further embodiments, the obtaining manner of the vote information of the vote may also be configured according to actual requirements, for example, when the vote information of the vote is stored in the block header of the block, step S122 in the method shown in fig. 1 includes:
analyzing a second block head of the second block to obtain a second vote;
analyzing a first block head of the first block to obtain a first vote;
and judging whether the second ballot and the first ballot are the same ballot.
Preferably, the method shown in fig. 1 further comprises:
when the second vote and the first vote are different votes, judging whether the first transaction total number in the first block is the same as the second transaction total number in the second block:
if not, selecting the block with larger transaction total number as the correct block;
if so, analyzing the first block hash of the first block and the second block hash of the second block, and determining the block with the smaller block hash as the correct block.
In further embodiments, when the second vote is different from the first vote, how to select the optimal block may be configured according to actual requirements, for example, the configuration is as follows:
when the second vote and the first vote are different votes, judging whether the first transaction total number in the first block is the same as the second transaction total number in the second block:
if not, selecting the block with larger transaction total number as the correct block;
if so, analyzing the first state hash of the first block and the second state hash of the second block, and determining the block with the smaller state hash as the correct block.
According to the embodiment, when the block chain nodes receive the blocks dug by different votes at the same height, the optimal blocks are corrected according to the most reasonable mode, and ore is dug based on the blocks, so that resource waste and loss caused by ore digging of the block chain nodes on the side chains are prevented in time.
Fig. 2 is a flowchart of a penalty method for an abnormal mining account according to an embodiment of the present invention. As shown in fig. 2, in this embodiment, the present invention provides a penalty method for an abnormal mining account of a blockchain node, where the method includes:
s221: before broadcasting the third block, determining whether the third account generating the third block is an abnormal mining account identified by the identification method of the abnormal mining account shown in fig. 1:
if yes, go to step S222: judging whether to punish a third account according to a pre-configured punishment rule:
if yes, go to step S2221: the broadcast of the third block is delayed according to a preconfigured delayed broadcast rule.
Specifically, the identifier of the abnormal ore mining account further includes the abnormal ore mining frequency in the first time period, S222 includes judging whether to punish the third account according to the preconfigured first threshold and the third abnormal ore mining frequency of the third account, and S2221 includes delaying broadcasting the third block according to the third abnormal ore mining frequency and the preconfigured first numerical value; the pre-configured punishment rule is that a first threshold value is configured to be 5, and if the abnormal ore digging times of the account reach the first threshold value, the user is punished; the preconfigured delay broadcast rule is, for example, if the number of abnormal mining times of an account is [0,5), the block is broadcast immediately when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [5,10), the block is broadcast with a delay of 5s when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞), the block is broadcast with a delay of 60s when the block generated by the vote held by the account is received;
assuming that the account of the user C is an abnormal mining account and the abnormal mining times of the account of the user C is 10 within a first time period (assumed to be 24h), the ticket5 held by the user C generates a block (100);
assume that the current blockchain node is node 7;
the node7 executes step S221, before broadcasting the block (100), to determine whether the third account generating the third block is an abnormal mining account identified by the method for identifying an abnormal mining account shown in fig. 1:
if the account of the user C is an abnormal ore mining account, step S222 is executed, and whether to punish the third account is determined according to the preconfigured first threshold and the third abnormal ore mining frequency of the third account:
if the first threshold is 5 and the number of abnormal mining times of the account of the user C is 10, step S2221 is executed, and if the number of abnormal mining times of the account of the user C is 10, the block is broadcasted for 60S (100).
In the above embodiment, the identifier of the abnormal ore mining account further includes the abnormal ore mining frequency in the first time period, S222 includes determining whether to punish the third account according to the preconfigured first threshold and the third abnormal ore mining frequency of the third account, and S2221 includes delaying broadcasting the third block according to the third abnormal ore mining frequency and the preconfigured first numerical value; the pre-configured punishment rule is that a first threshold value is configured to be 5, and if the abnormal ore digging times of the account reach the first threshold value, the user is punished; the predefined delay broadcast rule is that if the number of abnormal mining times of an account is [0,5 ], the block is broadcast immediately when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [5,10 ], the block is broadcast with a delay of 5s when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞ ], the block is broadcast with a delay of 60s when the block generated by the vote held by the account is received.
In further embodiments, the first period time may be configured to other values according to actual requirements, for example, 48h, and the same technical effect can be achieved.
In further embodiments, the preconfigured penalty rules may also be configured according to actual requirements, for example, in the case that the abnormal mining account needs to be particularly severely punished, the first threshold in the penalty rules is configured to be 1, and the same technical effect may be achieved.
In further embodiments, the preconfigured delayed broadcasting rule may be configured according to actual requirements, for example, if the number of abnormal mining times of the account is [0,1), the block is broadcasted immediately when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [1,10), the block is broadcasted by delaying for 5s when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞), the block is broadcasted by delaying for 60s when the block generated by the vote held by the account is received, so that the same technical effect can be achieved.
In more embodiments, a punishment method of the abnormal mining account can be configured according to actual requirements, and the abnormal mining account can be punished, so that the benefit of a user of the normal mining account is ensured, the stability of the block chain network is improved, and the same technical effect can be realized. For example, it may be configured to deduct the deposit paid by the third account in case that the third account needs to be punished. The method of deducting the deposit may be associated with the number of abnormal mining times of the account, and for example, if the number of abnormal mining times of the account is [0,5 ], the deposit is not deducted when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [5,10 ], 10% of the deposit paid by the account is deducted when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞ ], 50% of the deposit paid by the account is deducted when the block generated by the vote held by the account is received, so that the same technical effect can be achieved.
Preferably, the identification of the abnormal mining account further includes the abnormal mining times in the first time period, and step S222 of the method shown in fig. 2 includes:
judging whether to punish a third account according to a pre-configured first threshold and a third abnormal ore digging frequency of the third account;
step S2221 of the method shown in fig. 2 includes:
and broadcasting the third block in a delayed manner according to the third abnormal ore digging frequency and a pre-configured first numerical value.
The penalty principle of the abnormal mining account in the above embodiment may refer to the method shown in fig. 2, and is not described herein again.
Preferably, in a preferred embodiment of the method shown in fig. 2, the method further comprises:
and when the third abnormal mining frequency is zero and the third account mark is an abnormal mining account, marking the third account as a normal mining account.
Preferably, information of each abnormal mining account will be published to the official website.
Preferably, when the first account is identified as an abnormal mining account, the block link node will generate the early warning information and send the early warning information to the user holding the first account through a pre-configured contact way.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 3, as another aspect, the present application also provides an apparatus 300 including one or more Central Processing Units (CPUs) 301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data necessary for the operation of the apparatus 300 are also stored. The CPU301, ROM302, and RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
To the I/O interface 305, AN input section 306 including a keyboard, a mouse, and the like, AN output section 307 including a network interface card such as a Cathode Ray Tube (CRT), a liquid crystal display (L CD), and the like, a speaker, and the like, a storage section 308 including a hard disk, and the like, and a communication section 309 including a network interface card such as a L AN card, a modem, and the like, the communication section 309 performs communication processing via a network such as the internet, a drive 310 is also connected to the I/O interface 305 as necessary, a removable medium 311 such as a magnetic disk, AN optical disk, a magneto-optical disk, a semiconductor memory, and the like is mounted on the drive 310 as necessary, so that a computer program read out therefrom is mounted into the storage section 308 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 309, and/or installed from the removable medium 311.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (8)

1. A method for identifying abnormal mining accounts is characterized in that votes are used as mining vouchers for generating blocks when mining succeeds, the method is suitable for block chain nodes, and the method comprises the following steps:
receiving a first block, and judging whether a second block which has the same block height as the first block and has different block hash exists locally:
if yes, judging whether a second vote for generating the second block and a first vote for generating the first block are the same vote or not:
and if so, identifying the first account holding the first vote as an abnormal mining account.
2. The method of claim 1, wherein vote information for votes stored in a block mine cut transaction, and wherein determining whether a second vote used to generate the second block is the same vote as a first vote used to generate the first block comprises:
analyzing a second mine excavation transaction of the second block to obtain the second vote;
analyzing the first mining transaction of the first block to obtain the first vote;
and judging whether the second ballot and the first ballot are the same ballot.
3. The method of claim 1, further comprising:
when the second vote and the first vote are different votes, judging whether a first transaction total number in the first block is the same as a second transaction total number in the second block:
if not, selecting the block with larger transaction total number as the correct block;
if so, analyzing the first block hash of the first block and the second block hash of the second block, and determining the block with the smaller block hash as the correct block.
4. A punishment method for an abnormal mining account is characterized by comprising the following steps:
before broadcasting the third block, determining whether the third account generating the third block is an abnormal mining account identified by the method for identifying abnormal mining accounts according to any one of claims 1 to 3:
if yes, judging whether to punish the third account according to a pre-configured punishment rule:
if so, the broadcast of the third block is delayed according to a pre-configured delayed broadcast rule.
5. The method of claim 4, wherein the identification of the abnormal mining account further comprises an abnormal mining number within a first time period, and wherein the determining whether to punish the third account according to a preconfigured punishment rule comprises:
judging whether to punish a third account according to a pre-configured first threshold and a third abnormal ore digging frequency of the third account;
the delaying broadcasting the third block according to a preconfigured delay broadcasting rule comprises:
and broadcasting the third block in a delayed manner according to the third abnormal ore digging frequency and a pre-configured first numerical value.
6. The method of claim 5, further comprising:
and when the third abnormal mining frequency is zero and the third account mark is an abnormal mining account, marking the third account as a normal mining account.
7. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-6.
8. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-6.
CN202010224745.1A 2020-03-26 2020-03-26 Method for identifying abnormal mining account, punishment method, equipment and storage medium Pending CN111415258A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010224745.1A CN111415258A (en) 2020-03-26 2020-03-26 Method for identifying abnormal mining account, punishment method, equipment and storage medium
PCT/CN2020/138883 WO2021190010A1 (en) 2020-03-26 2020-12-24 Identification method and punishment method for abnormal mining account, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010224745.1A CN111415258A (en) 2020-03-26 2020-03-26 Method for identifying abnormal mining account, punishment method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111415258A true CN111415258A (en) 2020-07-14

Family

ID=71491451

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010224745.1A Pending CN111415258A (en) 2020-03-26 2020-03-26 Method for identifying abnormal mining account, punishment method, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN111415258A (en)
WO (1) WO2021190010A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021190010A1 (en) * 2020-03-26 2021-09-30 江苏复杂美科技有限公司 Identification method and punishment method for abnormal mining account, device and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107424066B (en) * 2017-07-19 2020-11-10 武汉凤链科技有限公司 Method and system for establishing consensus mechanism based on value quantity
CN107507006A (en) * 2017-08-11 2017-12-22 杭州秘猿科技有限公司 A kind of common recognition bifurcated processing method based on license chain
TWI684100B (en) * 2018-06-12 2020-02-01 中華電信股份有限公司 Consensus system and method for public distributed ledgers
CN108846750B (en) * 2018-08-01 2020-09-15 杭州复杂美科技有限公司 Stock right certification consensus method
CN111415258A (en) * 2020-03-26 2020-07-14 杭州复杂美科技有限公司 Method for identifying abnormal mining account, punishment method, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021190010A1 (en) * 2020-03-26 2021-09-30 江苏复杂美科技有限公司 Identification method and punishment method for abnormal mining account, device and storage medium

Also Published As

Publication number Publication date
WO2021190010A1 (en) 2021-09-30

Similar Documents

Publication Publication Date Title
CN108133420B (en) Committee consensus method of block chain
CN111127024A (en) Suspicious fund link detection method and device
CN109859043B (en) Transaction clearing method and transaction clearing system
CN113194146B (en) Leader node determination method, computer device, and storage medium
CN111383005B (en) Digital currency flow direction tracking method and device
CN111130790B (en) Block co-recognition method based on block chain node network
CN109951306A (en) Processing method, device, equipment and the medium of alarm
CN111275438A (en) Consensus method, device, equipment and storage medium for block chain network
CN111415258A (en) Method for identifying abnormal mining account, punishment method, equipment and storage medium
CN112866282A (en) Method and device for verifying time information in block chain
CN114282011B (en) Knowledge graph construction method and device, and graph calculation method and device
US20240086707A1 (en) Device, method, program, and system for detecting unidentified water
CN107767192B (en) Electronic bill verification method, device and system
CN110232525B (en) Enterprise risk acquisition method, device, server and storage medium
CN109816350B (en) Processing method, device, equipment and storage medium of live broadcast report information
CN112187407A (en) Real-time signaling message processing method, device, equipment and computer storage medium
CN116719695A (en) Workflow model mining method, related device and computer storage medium
EP3907968A1 (en) Method and system for blockchain intrusion prevention
CN112887923B (en) Unsupervised abnormal short text monitoring method and system based on dynamic communication network
CN113886175A (en) Hystrix-based distributed system cluster fusing method and distributed system
CN109558744B (en) Data processing method and system
CN114401099A (en) Block chain PoW selfish mining attack defense method based on network topology
CN109743203B (en) Distributed service security combination system and method based on quantitative information flow
CN111429144A (en) Abnormal remittance transaction identification method and device
CN111866171A (en) Message processing method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200714

WD01 Invention patent application deemed withdrawn after publication