CN111415258A - Method for identifying abnormal mining account, punishment method, equipment and storage medium - Google Patents
Method for identifying abnormal mining account, punishment method, equipment and storage medium Download PDFInfo
- Publication number
- CN111415258A CN111415258A CN202010224745.1A CN202010224745A CN111415258A CN 111415258 A CN111415258 A CN 111415258A CN 202010224745 A CN202010224745 A CN 202010224745A CN 111415258 A CN111415258 A CN 111415258A
- Authority
- CN
- China
- Prior art keywords
- block
- account
- vote
- abnormal
- mining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000005065 mining Methods 0.000 title claims abstract description 88
- 230000002159 abnormal effect Effects 0.000 title claims abstract description 87
- 238000000034 method Methods 0.000 title claims abstract description 61
- 238000009412 basement excavation Methods 0.000 claims abstract description 7
- 238000004590 computer program Methods 0.000 claims description 9
- 230000003111 delayed effect Effects 0.000 claims description 8
- 230000008901 benefit Effects 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000007812 deficiency Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides an identification method and a punishment method of an abnormal mining account, equipment and a storage medium, wherein the method comprises the following steps: receiving a first block, and judging whether a second block which has the same block height and different block hash exists locally: if the first vote is the same as the second vote used for generating the second block, the first account holding the first vote is identified as the abnormal mining account. The abnormal ore excavation account is identified through the identification method of the abnormal ore excavation account, punishment is carried out on the account marked as the abnormal ore excavation account by matching with a corresponding punishment method, and therefore the stability of the block chain network is enhanced while the ore excavation benefit of miners is guaranteed.
Description
Technical Field
The application relates to the technical field of block chains and the like, in particular to an identification method and a punishment method, equipment and a storage medium for an abnormal mining account.
Background
In the existing scheme, whether the mine can be dug depends on the vote; while the transactions in the transaction pools of different nodes are not necessarily identical (the transactions themselves may be different, even if the transactions are identical, the order in which the transactions are stored is not necessarily identical).
For example, ticket1 is imported into node1, node2 and node3 for mining, and the transactions in node1, node2 and node3 transaction pools are different; when a mine with a block height of 50 is dug by ticket1, a block (50) _1 generated by node1, a block (50) _2 generated by node2 and a block (50) _3 generated by node3 are different from each other, and a bifurcation is generated; since the blocks generated according to ticket1 are all correct blocks, it is possible that node4 and node1 will continue to excavate after block (50) _1, node5 and node2 will continue to excavate after block (50) _2, and node6 and node3 will continue to excavate after block (50) _ 3; only one chain is a main chain finally, and assuming that the chain of the final block (50) _1 is the main chain, the side chains of the node5 and the node6 are excavated, so that the benefit is lost; and the above mechanism will cause more branches in the blockchain network, reducing the stability of the blockchain network.
Disclosure of Invention
In view of the above-mentioned drawbacks and deficiencies of the prior art, it is desirable to provide an identification method and penalty method, device and storage medium for an abnormal mining account, which ensure the benefits of miners and improve the stability of a blockchain network.
In a first aspect, the present invention provides a method for identifying an abnormal mining account applicable to a block chain node, where a vote is used as a mining evidence for generating a block when mining succeeds, the method including:
receiving a first block, and judging whether a second block which has the same block height and different block hash exists locally:
if yes, judging whether a second vote for generating the second block and a first vote for generating the first block are the same vote or not:
and if so, identifying the first account holding the first vote as the abnormal ore digging account.
In a second aspect, the present invention provides a penalty method for an abnormal mining account of a blockchain node, including:
before broadcasting the third block, determining whether the third account generating the third block is an abnormal mining account identified by the identification method of the abnormal mining account of the first aspect:
if yes, judging whether to punish a third account according to a pre-configured punishment rule:
if yes, the broadcast of the third block is delayed according to a pre-configured delay broadcast rule.
In a third aspect, the present invention also provides an apparatus comprising one or more processors and memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform the method of identifying and penalizing abnormal mining accounts provided according to embodiments of the present invention.
In a fourth aspect, the present invention also provides a storage medium storing a computer program, the computer program enabling a computer to execute the method for identifying an abnormal mining account and the method for penalizing the abnormal mining account according to the embodiments of the present invention.
The identification method and penalty method, device and storage medium for the abnormal mining account provided by the embodiments of the present invention receive the first block, and determine whether a second block having the same block height and different block hash as the first block is locally stored: if the second vote used for generating the second block is the same vote as the first vote used for generating the first block, identifying the abnormal mining account by the method for identifying the first account with the first vote as the abnormal mining account, and punishing the account identified as the abnormal mining account by matching with a corresponding punishing method, so that the mining income of miners is ensured, and the stability of the block chain network is enhanced.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of an identification method for an abnormal mining account according to an embodiment of the present invention.
Fig. 2 is a flowchart of a penalty method for an abnormal mining account according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of an identification method for an abnormal mining account according to an embodiment of the present invention. As shown in fig. 1, in this embodiment, the present invention provides a method for identifying an abnormal mining account applicable to a block chain node, where a vote is used as a mining credential for generating a block when mining succeeds, where the method includes:
s121: receiving a first block, and judging whether a second block which has the same block height and different block hash exists locally:
if yes, go to step S122: judging whether a second vote for generating the second block and a first vote for generating the first block are the same vote or not:
if yes, go to step S1221: and identifying the first account holding the first vote as an abnormal mining account.
Specifically, assume that there are 7 nodes 1-7 in the blockchain network; the user A holds ticket1, and the user A guides ticket1 into node1 and node2 to dig the mine; when a mine with the block height of 50 is dug successfully by using ticket1, generating a block (50) _1 by a node1, wherein the block hash of the block (50) _1 is hash (block (50) _1), generating a block (50) _2 by a node2, and the block hash of the block (50) _2 is hash (block (50) _ 2);
in a first scenario, the transactions in node1 and node2 transaction pools are different, node7 receives block (50) _1 preferentially, and nodes 3-6 receive block (50) _2 preferentially;
since the transactions in the node1 and node2 transaction pools are different, hash (block (50) _1) is different from hash (block (50) _2), and block (50) _1 and block (50) _2 are different; but since block (50) _1 and block (50) _2 are both generated according to ticket1, block (50) _1 and block (50) _2 are both correct blocks;
in the prior art, the node1 and the node7 continue to dig the ore after block (50) _1, and the nodes 2 to 6 continue to dig the ore after block (50) _ 2; and finally only one chain will be the main chain, assuming that the chain in which the final block (50) _2 is located is the main chain, the gain of the block generated by the subsequent node7 after block (50) _1 will be lost completely;
assume that the current blockchain node is node 7;
the node7 executes step S121, receives block (50) _2, and determines whether a block with a block height of 50 and a block hash of not hash (block (50) _2) exists locally:
since the node7 preferentially receives block (50) _1, the node7 has block (50) _1 locally, and the hash (block (50) _1) is different from the hash (block (50) _2), step S122 is executed to determine whether the vote for generating block (50) _2 and the vote for generating block (50) _1 are the same vote:
since both block (50) _2 and block (50) _1 are generated by ticket1, step S1221 is performed: and identifying the account of the user A as an abnormal mining account.
If the transactions in the node1 and node2 transaction pools are the same, then hash (block (50) _1) is the same as hash (block (50) _ 2); then node7 receives block (50) _2 and determines that there are locally identical blocks (block height is the same and block hash is the same), node7 discards block (50) _ 2.
In a second scene, a user B holds ticket2, and the user B imports ticket2 into node3 to dig a mine; ticket2 also successfully digs a block with a block height of 50, and node3 generates block (50) _ 3; the node7 receives the block (50) _1 preferentially, and the nodes 4-6 receive the block (50) _2 preferentially;
assume that the current blockchain node is node 7;
node7 executes step S121, receives block (50) _3, and determines whether a block with a block height of 50 exists locally:
since node7 preferentially receives block (50) _1 and block (50) _1 already exists locally at node7, step S122 is executed to determine whether the vote for generating block (50) _3 and the vote for generating block (50) _1 are the same vote:
since block (50) _3 is generated by token 2 and block (50) _1 is generated by token 1, node7 discards block (50) _3 and continues to excavate after block (50) _ 1.
If the first block received by node7 is a block (51) and no block with a block height of 51 exists locally, then the received block (51) is processed according to the prior art (e.g., when the highest block height locally at node7 is 50, the block (51) is stored and mining continues after the block (51)).
In more embodiments, the chunk hash in step S121 may be configured as other parameters according to actual requirements, such as a state hash (step S121: receiving the first chunk, and determining whether a second chunk with the same chunk height as the first chunk and a different state hash exists locally), so that the same technical effect can be achieved.
The embodiment can identify the abnormal ore digging account, punishment is carried out on the account marked as the abnormal ore digging account by matching with a corresponding punishment method, and the stability of the block chain network is enhanced while the ore digging income of miners is ensured.
Preferably, the vote information of the votes is stored in the block mine excavation transaction, and step S122 in the method shown in fig. 1 includes:
analyzing a second mine excavation transaction of the second block to obtain a second vote;
analyzing the first mine digging transaction of the first block to obtain a first vote;
and judging whether the second ballot and the first ballot are the same ballot.
In further embodiments, the obtaining manner of the vote information of the vote may also be configured according to actual requirements, for example, when the vote information of the vote is stored in the block header of the block, step S122 in the method shown in fig. 1 includes:
analyzing a second block head of the second block to obtain a second vote;
analyzing a first block head of the first block to obtain a first vote;
and judging whether the second ballot and the first ballot are the same ballot.
Preferably, the method shown in fig. 1 further comprises:
when the second vote and the first vote are different votes, judging whether the first transaction total number in the first block is the same as the second transaction total number in the second block:
if not, selecting the block with larger transaction total number as the correct block;
if so, analyzing the first block hash of the first block and the second block hash of the second block, and determining the block with the smaller block hash as the correct block.
In further embodiments, when the second vote is different from the first vote, how to select the optimal block may be configured according to actual requirements, for example, the configuration is as follows:
when the second vote and the first vote are different votes, judging whether the first transaction total number in the first block is the same as the second transaction total number in the second block:
if not, selecting the block with larger transaction total number as the correct block;
if so, analyzing the first state hash of the first block and the second state hash of the second block, and determining the block with the smaller state hash as the correct block.
According to the embodiment, when the block chain nodes receive the blocks dug by different votes at the same height, the optimal blocks are corrected according to the most reasonable mode, and ore is dug based on the blocks, so that resource waste and loss caused by ore digging of the block chain nodes on the side chains are prevented in time.
Fig. 2 is a flowchart of a penalty method for an abnormal mining account according to an embodiment of the present invention. As shown in fig. 2, in this embodiment, the present invention provides a penalty method for an abnormal mining account of a blockchain node, where the method includes:
s221: before broadcasting the third block, determining whether the third account generating the third block is an abnormal mining account identified by the identification method of the abnormal mining account shown in fig. 1:
if yes, go to step S222: judging whether to punish a third account according to a pre-configured punishment rule:
if yes, go to step S2221: the broadcast of the third block is delayed according to a preconfigured delayed broadcast rule.
Specifically, the identifier of the abnormal ore mining account further includes the abnormal ore mining frequency in the first time period, S222 includes judging whether to punish the third account according to the preconfigured first threshold and the third abnormal ore mining frequency of the third account, and S2221 includes delaying broadcasting the third block according to the third abnormal ore mining frequency and the preconfigured first numerical value; the pre-configured punishment rule is that a first threshold value is configured to be 5, and if the abnormal ore digging times of the account reach the first threshold value, the user is punished; the preconfigured delay broadcast rule is, for example, if the number of abnormal mining times of an account is [0,5), the block is broadcast immediately when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [5,10), the block is broadcast with a delay of 5s when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞), the block is broadcast with a delay of 60s when the block generated by the vote held by the account is received;
assuming that the account of the user C is an abnormal mining account and the abnormal mining times of the account of the user C is 10 within a first time period (assumed to be 24h), the ticket5 held by the user C generates a block (100);
assume that the current blockchain node is node 7;
the node7 executes step S221, before broadcasting the block (100), to determine whether the third account generating the third block is an abnormal mining account identified by the method for identifying an abnormal mining account shown in fig. 1:
if the account of the user C is an abnormal ore mining account, step S222 is executed, and whether to punish the third account is determined according to the preconfigured first threshold and the third abnormal ore mining frequency of the third account:
if the first threshold is 5 and the number of abnormal mining times of the account of the user C is 10, step S2221 is executed, and if the number of abnormal mining times of the account of the user C is 10, the block is broadcasted for 60S (100).
In the above embodiment, the identifier of the abnormal ore mining account further includes the abnormal ore mining frequency in the first time period, S222 includes determining whether to punish the third account according to the preconfigured first threshold and the third abnormal ore mining frequency of the third account, and S2221 includes delaying broadcasting the third block according to the third abnormal ore mining frequency and the preconfigured first numerical value; the pre-configured punishment rule is that a first threshold value is configured to be 5, and if the abnormal ore digging times of the account reach the first threshold value, the user is punished; the predefined delay broadcast rule is that if the number of abnormal mining times of an account is [0,5 ], the block is broadcast immediately when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [5,10 ], the block is broadcast with a delay of 5s when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞ ], the block is broadcast with a delay of 60s when the block generated by the vote held by the account is received.
In further embodiments, the first period time may be configured to other values according to actual requirements, for example, 48h, and the same technical effect can be achieved.
In further embodiments, the preconfigured penalty rules may also be configured according to actual requirements, for example, in the case that the abnormal mining account needs to be particularly severely punished, the first threshold in the penalty rules is configured to be 1, and the same technical effect may be achieved.
In further embodiments, the preconfigured delayed broadcasting rule may be configured according to actual requirements, for example, if the number of abnormal mining times of the account is [0,1), the block is broadcasted immediately when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [1,10), the block is broadcasted by delaying for 5s when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞), the block is broadcasted by delaying for 60s when the block generated by the vote held by the account is received, so that the same technical effect can be achieved.
In more embodiments, a punishment method of the abnormal mining account can be configured according to actual requirements, and the abnormal mining account can be punished, so that the benefit of a user of the normal mining account is ensured, the stability of the block chain network is improved, and the same technical effect can be realized. For example, it may be configured to deduct the deposit paid by the third account in case that the third account needs to be punished. The method of deducting the deposit may be associated with the number of abnormal mining times of the account, and for example, if the number of abnormal mining times of the account is [0,5 ], the deposit is not deducted when the block generated by the vote held by the account is received, if the number of abnormal mining times of the account is [5,10 ], 10% of the deposit paid by the account is deducted when the block generated by the vote held by the account is received, and if the number of abnormal mining times of the account is [10, + ∞ ], 50% of the deposit paid by the account is deducted when the block generated by the vote held by the account is received, so that the same technical effect can be achieved.
Preferably, the identification of the abnormal mining account further includes the abnormal mining times in the first time period, and step S222 of the method shown in fig. 2 includes:
judging whether to punish a third account according to a pre-configured first threshold and a third abnormal ore digging frequency of the third account;
step S2221 of the method shown in fig. 2 includes:
and broadcasting the third block in a delayed manner according to the third abnormal ore digging frequency and a pre-configured first numerical value.
The penalty principle of the abnormal mining account in the above embodiment may refer to the method shown in fig. 2, and is not described herein again.
Preferably, in a preferred embodiment of the method shown in fig. 2, the method further comprises:
and when the third abnormal mining frequency is zero and the third account mark is an abnormal mining account, marking the third account as a normal mining account.
Preferably, information of each abnormal mining account will be published to the official website.
Preferably, when the first account is identified as an abnormal mining account, the block link node will generate the early warning information and send the early warning information to the user holding the first account through a pre-configured contact way.
Fig. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 3, as another aspect, the present application also provides an apparatus 300 including one or more Central Processing Units (CPUs) 301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data necessary for the operation of the apparatus 300 are also stored. The CPU301, ROM302, and RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
To the I/O interface 305, AN input section 306 including a keyboard, a mouse, and the like, AN output section 307 including a network interface card such as a Cathode Ray Tube (CRT), a liquid crystal display (L CD), and the like, a speaker, and the like, a storage section 308 including a hard disk, and the like, and a communication section 309 including a network interface card such as a L AN card, a modem, and the like, the communication section 309 performs communication processing via a network such as the internet, a drive 310 is also connected to the I/O interface 305 as necessary, a removable medium 311 such as a magnetic disk, AN optical disk, a magneto-optical disk, a semiconductor memory, and the like is mounted on the drive 310 as necessary, so that a computer program read out therefrom is mounted into the storage section 308 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 309, and/or installed from the removable medium 311.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (8)
1. A method for identifying abnormal mining accounts is characterized in that votes are used as mining vouchers for generating blocks when mining succeeds, the method is suitable for block chain nodes, and the method comprises the following steps:
receiving a first block, and judging whether a second block which has the same block height as the first block and has different block hash exists locally:
if yes, judging whether a second vote for generating the second block and a first vote for generating the first block are the same vote or not:
and if so, identifying the first account holding the first vote as an abnormal mining account.
2. The method of claim 1, wherein vote information for votes stored in a block mine cut transaction, and wherein determining whether a second vote used to generate the second block is the same vote as a first vote used to generate the first block comprises:
analyzing a second mine excavation transaction of the second block to obtain the second vote;
analyzing the first mining transaction of the first block to obtain the first vote;
and judging whether the second ballot and the first ballot are the same ballot.
3. The method of claim 1, further comprising:
when the second vote and the first vote are different votes, judging whether a first transaction total number in the first block is the same as a second transaction total number in the second block:
if not, selecting the block with larger transaction total number as the correct block;
if so, analyzing the first block hash of the first block and the second block hash of the second block, and determining the block with the smaller block hash as the correct block.
4. A punishment method for an abnormal mining account is characterized by comprising the following steps:
before broadcasting the third block, determining whether the third account generating the third block is an abnormal mining account identified by the method for identifying abnormal mining accounts according to any one of claims 1 to 3:
if yes, judging whether to punish the third account according to a pre-configured punishment rule:
if so, the broadcast of the third block is delayed according to a pre-configured delayed broadcast rule.
5. The method of claim 4, wherein the identification of the abnormal mining account further comprises an abnormal mining number within a first time period, and wherein the determining whether to punish the third account according to a preconfigured punishment rule comprises:
judging whether to punish a third account according to a pre-configured first threshold and a third abnormal ore digging frequency of the third account;
the delaying broadcasting the third block according to a preconfigured delay broadcasting rule comprises:
and broadcasting the third block in a delayed manner according to the third abnormal ore digging frequency and a pre-configured first numerical value.
6. The method of claim 5, further comprising:
and when the third abnormal mining frequency is zero and the third account mark is an abnormal mining account, marking the third account as a normal mining account.
7. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-6.
8. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010224745.1A CN111415258A (en) | 2020-03-26 | 2020-03-26 | Method for identifying abnormal mining account, punishment method, equipment and storage medium |
PCT/CN2020/138883 WO2021190010A1 (en) | 2020-03-26 | 2020-12-24 | Identification method and punishment method for abnormal mining account, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010224745.1A CN111415258A (en) | 2020-03-26 | 2020-03-26 | Method for identifying abnormal mining account, punishment method, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111415258A true CN111415258A (en) | 2020-07-14 |
Family
ID=71491451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010224745.1A Pending CN111415258A (en) | 2020-03-26 | 2020-03-26 | Method for identifying abnormal mining account, punishment method, equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111415258A (en) |
WO (1) | WO2021190010A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021190010A1 (en) * | 2020-03-26 | 2021-09-30 | 江苏复杂美科技有限公司 | Identification method and punishment method for abnormal mining account, device and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107424066B (en) * | 2017-07-19 | 2020-11-10 | 武汉凤链科技有限公司 | Method and system for establishing consensus mechanism based on value quantity |
CN107507006A (en) * | 2017-08-11 | 2017-12-22 | 杭州秘猿科技有限公司 | A kind of common recognition bifurcated processing method based on license chain |
TWI684100B (en) * | 2018-06-12 | 2020-02-01 | 中華電信股份有限公司 | Consensus system and method for public distributed ledgers |
CN108846750B (en) * | 2018-08-01 | 2020-09-15 | 杭州复杂美科技有限公司 | Stock right certification consensus method |
CN111415258A (en) * | 2020-03-26 | 2020-07-14 | 杭州复杂美科技有限公司 | Method for identifying abnormal mining account, punishment method, equipment and storage medium |
-
2020
- 2020-03-26 CN CN202010224745.1A patent/CN111415258A/en active Pending
- 2020-12-24 WO PCT/CN2020/138883 patent/WO2021190010A1/en active Application Filing
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021190010A1 (en) * | 2020-03-26 | 2021-09-30 | 江苏复杂美科技有限公司 | Identification method and punishment method for abnormal mining account, device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2021190010A1 (en) | 2021-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108133420B (en) | Committee consensus method of block chain | |
CN111127024A (en) | Suspicious fund link detection method and device | |
CN109859043B (en) | Transaction clearing method and transaction clearing system | |
CN113194146B (en) | Leader node determination method, computer device, and storage medium | |
CN111383005B (en) | Digital currency flow direction tracking method and device | |
CN111130790B (en) | Block co-recognition method based on block chain node network | |
CN109951306A (en) | Processing method, device, equipment and the medium of alarm | |
CN111275438A (en) | Consensus method, device, equipment and storage medium for block chain network | |
CN111415258A (en) | Method for identifying abnormal mining account, punishment method, equipment and storage medium | |
CN112866282A (en) | Method and device for verifying time information in block chain | |
CN114282011B (en) | Knowledge graph construction method and device, and graph calculation method and device | |
US20240086707A1 (en) | Device, method, program, and system for detecting unidentified water | |
CN107767192B (en) | Electronic bill verification method, device and system | |
CN110232525B (en) | Enterprise risk acquisition method, device, server and storage medium | |
CN109816350B (en) | Processing method, device, equipment and storage medium of live broadcast report information | |
CN112187407A (en) | Real-time signaling message processing method, device, equipment and computer storage medium | |
CN116719695A (en) | Workflow model mining method, related device and computer storage medium | |
EP3907968A1 (en) | Method and system for blockchain intrusion prevention | |
CN112887923B (en) | Unsupervised abnormal short text monitoring method and system based on dynamic communication network | |
CN113886175A (en) | Hystrix-based distributed system cluster fusing method and distributed system | |
CN109558744B (en) | Data processing method and system | |
CN114401099A (en) | Block chain PoW selfish mining attack defense method based on network topology | |
CN109743203B (en) | Distributed service security combination system and method based on quantitative information flow | |
CN111429144A (en) | Abnormal remittance transaction identification method and device | |
CN111866171A (en) | Message processing method and device, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200714 |
|
WD01 | Invention patent application deemed withdrawn after publication |