CN111709049A - Method for preventing time stamp attack in blockchain system, computer readable storage medium and blockchain system - Google Patents

Method for preventing time stamp attack in blockchain system, computer readable storage medium and blockchain system Download PDF

Info

Publication number
CN111709049A
CN111709049A CN202010417922.8A CN202010417922A CN111709049A CN 111709049 A CN111709049 A CN 111709049A CN 202010417922 A CN202010417922 A CN 202010417922A CN 111709049 A CN111709049 A CN 111709049A
Authority
CN
China
Prior art keywords
block
set number
timestamp
blocks
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010417922.8A
Other languages
Chinese (zh)
Other versions
CN111709049B (en
Inventor
杜晓楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010417922.8A priority Critical patent/CN111709049B/en
Publication of CN111709049A publication Critical patent/CN111709049A/en
Application granted granted Critical
Publication of CN111709049B publication Critical patent/CN111709049B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method for preventing time stamp attack in a block chain system. The maximum timestamp is obtained by sampling the block timestamps of a first set number of blocks in the past. Calculating a block out time of the current block based on a block time stamp of the current block, the maximum time stamp, an expected block out time, and the first set number. And repeatedly executing the two steps to calculate the block output time of the past second set number of blocks and acquiring the average value of the block output time of the second set number of blocks. And calculating the block difficulty of the next block based on the block-out time average value and the difficulty average value. The invention also relates to a computer readable storage medium and a blockchain system. The method and the device can weaken the weight and the use frequency of the timestamp in the block chain consensus to resist the timestamp attack and reduce the non-verifiability of the timestamp, thereby avoiding the irreversible damage of the block chain consensus caused by the malicious timestamp.

Description

Method for preventing time stamp attack in blockchain system, computer readable storage medium and blockchain system
Technical Field
The present invention relates to the field of blockchain, and more particularly, to a method, computer-readable storage medium, and blockchain system for preventing a timestamp attack in a blockchain system.
Background
A blockchain is a transactional database that blocks are grouped together in a chain for sharing by nodes within the system. Specifically, the information (including data or code) generated in a period of time is packed into two blocks, the two blocks are stamped with time stamps and are connected with the previous block, the header of each next block contains the index data of the previous block, and then new information is written into the page, so that new blocks are formed, the blocks are connected end to end, and finally a block chain is formed. In the current blockchain system, when a node sends a message to the blockchain system, a timestamp can be carried in the message sent by the node to indicate the moment when the node sends the message, so that messages sent by a plurality of nodes to the blockchain system respectively carry different timestamps.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, a computer-readable storage medium, and a blockchain system for preventing timestamp attacks in a blockchain system, which can avoid attacks of malicious timestamps on the blockchain system, thereby improving the security of the blockchain system, and the blockchain system.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for preventing time stamp attack in a block chain system is constructed, and the method comprises the following steps:
s1, sampling the block timestamps of the first set number of blocks in the past to obtain the maximum timestamp,
s2, calculating the block-out time of the current block based on the block time stamp of the current block, the maximum time stamp, the expected block-out time and the first set number;
s3, repeating the steps S1-S2 to calculate the block-out time of the past second set number of blocks and obtain the average value of the block-out time of the second set number of blocks;
s4, acquiring the block difficulty of the blocks with the second set number, and calculating the difficulty average value of the block difficulty of the blocks with the second set number;
and S5, calculating the block difficulty of the next block based on the block-out time average value and the difficulty average value.
In the method for preventing the timestamp attack in the blockchain system according to the present invention,in the step S1, the current tile height is h, and the first set number is the tile timestamp [ T ] of the tile between L samples h-L-1 to h-1h-l-1,Th-l,...,Th-1]And taking the maximum time stamp Tmax
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S2 further includes:
s21, block time stamp T based on current blockhWith said maximum timestamp TmaxCalculating the block-out time ST of the current blockh
S22, judging the block-out time ST of the current blockhIf it is greater than the product of the expected block out time and the first set number, and if so, ST is sethT × L, where T is the expected block time, otherwise step S23 is performed;
s23, judging the block-out time ST of the current blockhWhether or not it is smaller than the quotient of the expected block time and the first set number, and if so, setting
Figure BDA0002495727440000021
Otherwise set STh=Th-Tmax
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S3 further includes:
s31, repeatedly executing steps S1-S2 to calculate the block-out time of the past second set number of blocks to obtain [ STH-N,STH-N+1,...,STH]Wherein H is the height of the system block, and N is a second set number;
s32, calculating the block-out time [ ST ] of the second set number of blocksH-N,STH-N+1,...,STH]Is taken out of the block time average STavg
In the method for preventing timestamp attacks in a blockchain system, the first set number is less than the second set number, and both the first set number and the second set number are less than the system block height.
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S4 further includes:
s41, obtaining the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH];
S42, calculating the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH]Difficulty average value D ofavg
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S5 further includes: calculating the block difficulty D of the next block based on the following formulanext
Figure BDA0002495727440000031
Another technical solution adopted by the present invention to solve the technical problem is to construct a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for preventing the timestamp attack in the blockchain system.
In order to solve the technical problems, the invention adopts another technical scheme that a block chain system is constructed, the block chain system comprises a plurality of block chain nodes, computer programs are stored on the block chain nodes, and when the computer programs are executed by a processor, the method for preventing the time stamp attack in the block chain system is realized.
According to the method for preventing the timestamp attack in the blockchain system, the computer-readable storage medium and the blockchain system, the blockchain timestamps of a first set number of blocks in the past are sampled to obtain the maximum timestamp, and then the maximum timestamp is subtracted from the current blockchain timestamp, so that the weight and the use frequency of the timestamp in the blockchain consensus are weakened to resist the timestamp attack, the non-verifiability of the timestamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious timestamp is avoided.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
fig. 1 is a flowchart of a first preferred embodiment of a method for preventing a timestamp attack in a blockchain system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention aims to enable the block chain network to effectively process the time setting difference among all nodes under the condition that a centralized NTP time server is not provided, and effectively avoid the attack of a malicious timestamp on the block chain network. According to the invention, the time stamp is calculated by not directly subtracting the block-out time of the last block from the current block time, but the block time stamps of the past blocks with the first set number are sampled to obtain the maximum time stamp, and the maximum time stamp is subtracted from the current block time, so that the weight and the use frequency of the time stamp in the block chain consensus are weakened to resist the time stamp attack, the non-verifiability of the time stamp is reduced, and the irreversible damage of the malicious time stamp to the block chain consensus is avoided.
The invention relates to a method for preventing time stamp attack in a block chain system. The block timestamps of a first set number of blocks in the past are sampled to obtain a maximum timestamp. Calculating a block out time of the current block based on a block time stamp of the current block, the maximum time stamp, an expected block out time, and the first set number. And repeatedly executing the two steps to calculate the block output time of the past second set number of blocks and acquiring the average value of the block output time of the second set number of blocks. And acquiring the block difficulty of the blocks with the second set number, and calculating the difficulty average value of the block difficulty of the blocks with the second set number. And calculating the block difficulty of the next block based on the block time average value and the difficulty average value. The block time stamps of a first set number of blocks in the past are sampled to obtain the maximum time stamp, and then the maximum time stamp is subtracted from the current block time, so that the weight and the use frequency of the time stamp in the block chain consensus are weakened to resist the time stamp attack, the non-verifiability of the time stamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious time stamp is avoided.
Fig. 1 is a flowchart of a first preferred embodiment of a method for preventing a timestamp attack in a blockchain system of the present invention. As shown in fig. 1, in step S1, the tile timestamps of the first set number of tiles in the past are sampled to obtain the maximum timestamp. In a preferred embodiment of the present invention, the current block height is set to h, the first set number is L, and the block time stamp [ T ] of the block between h-L-1 and h-1 is sampledh-l-1,Th-l,...,Th-1]And taking the maximum time stamp Tmax
In step S2, the out-blocking time of the current tile is calculated based on the tile timestamp of the current tile, the maximum timestamp, the expected out-blocking time, and the first set number. In a preferred embodiment of the invention, the block timestamp T is based on the current blockhWith said maximum timestamp TmaxCalculating the block-out time ST of the current blockh. Then, the block-out time ST of the current block is determinedhIf it is greater than the product of the expected block out time and the first set number, and if so, ST is sethT is the expected block time, otherwise, the block time ST of the current block is determinedhWhether or not it is smaller than the quotient of the expected block time and the first set number, and if so, setting
Figure BDA0002495727440000051
Otherwise set STh=Th-Tmax
In step S3, the steps S1-S2 are repeatedly executed to calculate the block-out time of the past second set number of blocks to obtain [ STH-N,STH-N+1,...,STH]Wherein H is the system block height and N is the second predetermined number. Then, the block-out time [ ST ] of the second set number of blocks is obtainedH-N,STH-N+1,...,STH]Is taken out of the block time average STavg
In step S4, the tile difficulty [ D ] of the second set number of tiles is obtainedH-N,DH-N+1,...,DH]. Then calculating the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH]Difficulty average value D ofavg
In step S5, a block difficulty D of the next block is calculated based on the block-out time average and the difficulty averagenext. The calculation may be based on a moving average type algorithm, for example. For example:
Figure BDA0002495727440000061
the method for preventing the timestamp attack in the block chain system is implemented, the block timestamps of a first set number of blocks in the past are sampled to obtain the maximum timestamp, and then the maximum timestamp is subtracted from the current block time, so that the weight and the use frequency of the timestamp in the block chain consensus are weakened to resist the timestamp attack, the non-verifiability of the timestamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious timestamp is avoided.
The invention will be further illustrated below with reference to further preferred embodiments.
H System Block height (e.g. value 100)
N calculating the number of blocks sampled by the next block, i.e. the second set number (assuming the value is 12)
L measures the number of blocks sampled by a single block, i.e. a first set number, L < N, it is proposed
Figure BDA0002495727440000062
Figure BDA0002495727440000063
T expects a block time (e.g., can take on the value of 120 seconds)
ST block out time
D block difficulty
h current block height
Firstly, calculating the block-out time of the first N blocks, and calculating the target time of the next block:
1. for each block of the first N blocks, assuming that the height of the current block is h, the block between h-L-1 and h-1 is taken to determine the block-out time of the current block. As known to those skilled in the art, the ordering of the blocks is based on the Hash value of the block and the prevHash value of the Hash pointing to the previous block.
2. Time stamp [ T ] for blocks between heights h-L-1 to h-1h-l-1,Th-l,...,Th-1]Taking the maximum value T of its time stampmaxObtaining STh=Th-Tmax
3. And then judging: if SThIf > T x L, then STh=T*L;
If it is not
Figure BDA0002495727440000071
Then
Figure BDA0002495727440000072
Otherwise STh=Th-Tmax
Repeating the above steps 1-3 to calculate the block output time of the first N blocks to obtain a block output time set [ STH-N,STH-N+1,...,STH]. The individual block out times are then summed and divided by the number to calculate [ ST [ ]H-N,STH-N+1,...,STH]Average value ST ofavg
Difficulty of the first N blocks [ D ]H-N,DH-N+1,...,DH]Adding and dividing by the number to calculate a difficulty average Davg
Calculating the difficulty of the next block
Figure BDA0002495727440000073
For example, H represents the system block height of the whole blockchain system, and assuming that all blocks of the current blockchain system are accumulated to be 100, the height of 101 blocks needs to be calculated, and then the difficulty and the block-out time of the first N (N ═ 20) blocks need to be referred to, that is, the difficulty and the block-out time of the block with the height of 89 and the block height of 100 are referred to.
We first calculate the block time, which is calculated by subtracting the maximum timestamp of the previous L (L-4) blocks from the current block. Assuming that we want to calculate the actual block-out time of a block with height h equal to 100, we calculate the maximum timestamp of the times of several blocks with heights 99, 98, 97, 96, and then subtract this maximum timestamp by 100. By analogy, calculating the actual out-of-block time for height 99 takes the maximum time stamp of the out-of-block times for the several blocks with heights 98, 97, 96, 95, and then subtracts the maximum time stamp from the block time with height 99. Until a block of height 89 is calculated.
Then, the block difficulty of the past N blocks is measured. And then, calculating the target difficulty of the next block by adopting a moving average algorithm based on the block output time and the block output difficulty.
According to the invention, the maximum time stamp is obtained by sampling the block time stamps of a first set number of blocks in the past, and then the maximum time stamp is subtracted from the current block time, so that the weight and the use frequency of the time stamp in the block chain consensus are weakened to resist the time stamp attack, the non-verifiability of the time stamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious time stamp is avoided.
Another technical solution adopted by the present invention to solve the technical problem is to construct a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for preventing the timestamp attack in the blockchain system.
In order to solve the technical problems, the invention adopts another technical scheme that a block chain system is constructed, the block chain system comprises a plurality of block chain nodes, computer programs are stored on the block chain nodes, and when the computer programs are executed by a processor, the method for preventing the time stamp attack in the block chain system is realized.
Accordingly, the present invention can be realized in hardware, software, or a combination of hardware and software. The present invention can be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods of the present invention is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
The present invention may also be implemented by a computer program product, comprising all the features enabling the implementation of the methods of the invention, when loaded in a computer system. The computer program in this document refers to: any expression, in any programming language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to other languages, codes or symbols; b) reproduced in a different format.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (9)

1. A method for preventing timestamp attacks in a blockchain system, comprising the steps of:
s1, sampling the block time stamps of the past first set number of blocks to obtain the maximum time stamp;
s2, calculating the block-out time of the current block based on the block time stamp of the current block, the maximum time stamp, the expected block-out time and the first set number;
s3, repeating the steps S1-S2 to calculate the block-out time of the past second set number of blocks and obtain the average value of the block-out time of the second set number of blocks;
s4, acquiring the block difficulty of the blocks with the second set number, and calculating the difficulty average value of the block difficulty of the blocks with the second set number;
and S5, calculating the block difficulty of the next block based on the block-out time average value and the difficulty average value.
2. The method of claim 1, wherein in step S1, the current tile height is h, and the first set number is the tile timestamp [ T ] of the tile between L samples h-L-1 to h-1h-l-1,Th-l,…,Th-1]And taking the maximum time stamp Tmax
3. The method for preventing timestamp attacks in a blockchain system according to claim 2, wherein said step S2 further comprises:
s21, block time stamp T based on current blockhWith said maximum timestamp TmaxCalculating the block-out time ST of the current blockh
S22, judging the block-out time ST of the current blockhIf it is greater than the product of the expected block out time and the first set number, and if so, ST is sethT × L, where T is the expected block time, otherwise step S23 is performed;
s23, judging the block-out time ST of the current blockhWhether or not it is smaller than the quotient of the expected block time and the first set number, and if so, setting
Figure FDA0002495727430000021
Otherwise set STh=Th-Tmax
4. The method for preventing timestamp attacks in the blockchain system according to claim 3, wherein said step S3 further comprises:
s31, repeatedly executing steps S1-S2 to calculate the block-out time of the past second set number of blocks to obtain [ STH-N,STH-N+1,...,STH]Wherein H is the height of the system block, and N is a second set number;
s32, calculating the block-out time [ ST ] of the second set number of blocksH-N,STH-N+1,...,STH]Is taken out of the block time average STavg
5. The method of claim 4, wherein the first set number < the second set number, and both the first set number and the second set number are less than the system block height.
6. The method for preventing timestamp attacks in the blockchain system according to claim 4, wherein said step S4 further comprises:
s41, obtaining the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH];
S42, calculating the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH]Difficulty average value D ofavg
7. The method for preventing timestamp attacks in a blockchain system according to claim 6, wherein said step S5 is further comprisingThe method comprises the following steps: calculating the block difficulty D of the next block based on the following formulanext
Figure FDA0002495727430000022
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of preventing a timestamp attack in a blockchain system according to any one of claims 1 to 7.
9. A blockchain system comprising a plurality of blockchain nodes having stored thereon a computer program, characterized in that the program, when being executed by a processor, implements a method of preventing timestamp attacks in a blockchain system according to any of the claims 1-7.
CN202010417922.8A 2020-05-18 2020-05-18 Method for preventing timestamp attack in blockchain system, computer readable storage medium and blockchain system Active CN111709049B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010417922.8A CN111709049B (en) 2020-05-18 2020-05-18 Method for preventing timestamp attack in blockchain system, computer readable storage medium and blockchain system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010417922.8A CN111709049B (en) 2020-05-18 2020-05-18 Method for preventing timestamp attack in blockchain system, computer readable storage medium and blockchain system

Publications (2)

Publication Number Publication Date
CN111709049A true CN111709049A (en) 2020-09-25
CN111709049B CN111709049B (en) 2023-06-06

Family

ID=72537163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010417922.8A Active CN111709049B (en) 2020-05-18 2020-05-18 Method for preventing timestamp attack in blockchain system, computer readable storage medium and blockchain system

Country Status (1)

Country Link
CN (1) CN111709049B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225335A (en) * 2021-04-28 2021-08-06 平安科技(深圳)有限公司 Block chaining-out safety verification method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733651A (en) * 2017-09-11 2018-02-23 联动优势科技有限公司 A kind of block chain generation method, node and system
CN108596617A (en) * 2018-04-23 2018-09-28 北京奇虎科技有限公司 Block chain attack cognitive method based on algorithm types and device
US20180336552A1 (en) * 2017-05-17 2018-11-22 Nec Europe Ltd. Method and system for providing a robust blockchain with an integrated proof of storage
CN110096359A (en) * 2019-04-15 2019-08-06 华南理工大学 A kind of block chain proof of work common recognition adjusting of difficulty method of fast convergence
CN110309657A (en) * 2019-06-20 2019-10-08 四川大学 The safety risk estimating method of block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180336552A1 (en) * 2017-05-17 2018-11-22 Nec Europe Ltd. Method and system for providing a robust blockchain with an integrated proof of storage
CN107733651A (en) * 2017-09-11 2018-02-23 联动优势科技有限公司 A kind of block chain generation method, node and system
CN108596617A (en) * 2018-04-23 2018-09-28 北京奇虎科技有限公司 Block chain attack cognitive method based on algorithm types and device
CN110096359A (en) * 2019-04-15 2019-08-06 华南理工大学 A kind of block chain proof of work common recognition adjusting of difficulty method of fast convergence
CN110309657A (en) * 2019-06-20 2019-10-08 四川大学 The safety risk estimating method of block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘宗妹: "区块链的应用:安全威胁与解决策略", 《通信技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225335A (en) * 2021-04-28 2021-08-06 平安科技(深圳)有限公司 Block chaining-out safety verification method, device, equipment and storage medium
CN113225335B (en) * 2021-04-28 2022-11-15 平安科技(深圳)有限公司 Block chaining-out block safety verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN111709049B (en) 2023-06-06

Similar Documents

Publication Publication Date Title
US9621652B2 (en) Ranging scalable time stamp data synchronization
US20200177388A1 (en) Cross-blockchain resource transmission
US20150207877A1 (en) Time synchronization client, a system and a non-transitory computer readable medium
CN113098646B (en) Time synchronization method and device, electronic equipment and storage medium
CN109558065B (en) Data deleting method and distributed storage system
CN103533002A (en) Data processing method and system
CN104794190B (en) The method and apparatus that a kind of big data effectively stores
CN109756566B (en) Block chain based data storage method, related equipment and storage medium
CN110647531A (en) Data synchronization method, device, equipment and computer readable storage medium
CN111709049A (en) Method for preventing time stamp attack in blockchain system, computer readable storage medium and blockchain system
CN113032157B (en) Automatic intelligent server capacity expansion and reduction method and system
CN111142942A (en) Window data processing method and device, server and storage medium
CN111639902A (en) Data auditing method based on kafka, control device, computer equipment and storage medium
CN112486915A (en) Data storage method and device
CN111259074A (en) Block synchronization method, device and storage medium
CN113268540A (en) Data synchronization method and device
CN111708832B (en) Method for adjusting block difficulty in block chain network, computer medium and block chain network
CN114116744A (en) Method, device and equipment for updating pull chain table and storage medium
CN108833518B (en) A method of session id is generated based on nginx server
CN114866790B (en) Live stream scheduling method and device
CN110471922B (en) Content extension method and device for accounting node and computer readable storage medium
US20230068467A1 (en) Monitoring system, monitoring method, agent program and manager program
Zhou et al. Discrete-time queue with Bernoulli bursty source arrival and generally distributed service times
CN110489231B (en) Transaction information recording method, apparatus and computer readable storage medium
CN111539817B (en) Linear difficulty calculation method for preventing timestamp hijacking among blockchains, computer-readable storage medium and blockchain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant