CN111709049A - Method for preventing time stamp attack in blockchain system, computer readable storage medium and blockchain system - Google Patents
Method for preventing time stamp attack in blockchain system, computer readable storage medium and blockchain system Download PDFInfo
- Publication number
- CN111709049A CN111709049A CN202010417922.8A CN202010417922A CN111709049A CN 111709049 A CN111709049 A CN 111709049A CN 202010417922 A CN202010417922 A CN 202010417922A CN 111709049 A CN111709049 A CN 111709049A
- Authority
- CN
- China
- Prior art keywords
- block
- set number
- timestamp
- blocks
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a method for preventing time stamp attack in a block chain system. The maximum timestamp is obtained by sampling the block timestamps of a first set number of blocks in the past. Calculating a block out time of the current block based on a block time stamp of the current block, the maximum time stamp, an expected block out time, and the first set number. And repeatedly executing the two steps to calculate the block output time of the past second set number of blocks and acquiring the average value of the block output time of the second set number of blocks. And calculating the block difficulty of the next block based on the block-out time average value and the difficulty average value. The invention also relates to a computer readable storage medium and a blockchain system. The method and the device can weaken the weight and the use frequency of the timestamp in the block chain consensus to resist the timestamp attack and reduce the non-verifiability of the timestamp, thereby avoiding the irreversible damage of the block chain consensus caused by the malicious timestamp.
Description
Technical Field
The present invention relates to the field of blockchain, and more particularly, to a method, computer-readable storage medium, and blockchain system for preventing a timestamp attack in a blockchain system.
Background
A blockchain is a transactional database that blocks are grouped together in a chain for sharing by nodes within the system. Specifically, the information (including data or code) generated in a period of time is packed into two blocks, the two blocks are stamped with time stamps and are connected with the previous block, the header of each next block contains the index data of the previous block, and then new information is written into the page, so that new blocks are formed, the blocks are connected end to end, and finally a block chain is formed. In the current blockchain system, when a node sends a message to the blockchain system, a timestamp can be carried in the message sent by the node to indicate the moment when the node sends the message, so that messages sent by a plurality of nodes to the blockchain system respectively carry different timestamps.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method, a computer-readable storage medium, and a blockchain system for preventing timestamp attacks in a blockchain system, which can avoid attacks of malicious timestamps on the blockchain system, thereby improving the security of the blockchain system, and the blockchain system.
The technical scheme adopted by the invention for solving the technical problems is as follows: a method for preventing time stamp attack in a block chain system is constructed, and the method comprises the following steps:
s1, sampling the block timestamps of the first set number of blocks in the past to obtain the maximum timestamp,
s2, calculating the block-out time of the current block based on the block time stamp of the current block, the maximum time stamp, the expected block-out time and the first set number;
s3, repeating the steps S1-S2 to calculate the block-out time of the past second set number of blocks and obtain the average value of the block-out time of the second set number of blocks;
s4, acquiring the block difficulty of the blocks with the second set number, and calculating the difficulty average value of the block difficulty of the blocks with the second set number;
and S5, calculating the block difficulty of the next block based on the block-out time average value and the difficulty average value.
In the method for preventing the timestamp attack in the blockchain system according to the present invention,in the step S1, the current tile height is h, and the first set number is the tile timestamp [ T ] of the tile between L samples h-L-1 to h-1h-l-1,Th-l,...,Th-1]And taking the maximum time stamp Tmax。
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S2 further includes:
s21, block time stamp T based on current blockhWith said maximum timestamp TmaxCalculating the block-out time ST of the current blockh;
S22, judging the block-out time ST of the current blockhIf it is greater than the product of the expected block out time and the first set number, and if so, ST is sethT × L, where T is the expected block time, otherwise step S23 is performed;
s23, judging the block-out time ST of the current blockhWhether or not it is smaller than the quotient of the expected block time and the first set number, and if so, settingOtherwise set STh=Th-Tmax。
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S3 further includes:
s31, repeatedly executing steps S1-S2 to calculate the block-out time of the past second set number of blocks to obtain [ STH-N,STH-N+1,...,STH]Wherein H is the height of the system block, and N is a second set number;
s32, calculating the block-out time [ ST ] of the second set number of blocksH-N,STH-N+1,...,STH]Is taken out of the block time average STavg。
In the method for preventing timestamp attacks in a blockchain system, the first set number is less than the second set number, and both the first set number and the second set number are less than the system block height.
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S4 further includes:
s41, obtaining the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH];
S42, calculating the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH]Difficulty average value D ofavg。
In the method for preventing a timestamp attack in a blockchain system according to the present invention, the step S5 further includes: calculating the block difficulty D of the next block based on the following formulanext
Another technical solution adopted by the present invention to solve the technical problem is to construct a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for preventing the timestamp attack in the blockchain system.
In order to solve the technical problems, the invention adopts another technical scheme that a block chain system is constructed, the block chain system comprises a plurality of block chain nodes, computer programs are stored on the block chain nodes, and when the computer programs are executed by a processor, the method for preventing the time stamp attack in the block chain system is realized.
According to the method for preventing the timestamp attack in the blockchain system, the computer-readable storage medium and the blockchain system, the blockchain timestamps of a first set number of blocks in the past are sampled to obtain the maximum timestamp, and then the maximum timestamp is subtracted from the current blockchain timestamp, so that the weight and the use frequency of the timestamp in the blockchain consensus are weakened to resist the timestamp attack, the non-verifiability of the timestamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious timestamp is avoided.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
fig. 1 is a flowchart of a first preferred embodiment of a method for preventing a timestamp attack in a blockchain system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention aims to enable the block chain network to effectively process the time setting difference among all nodes under the condition that a centralized NTP time server is not provided, and effectively avoid the attack of a malicious timestamp on the block chain network. According to the invention, the time stamp is calculated by not directly subtracting the block-out time of the last block from the current block time, but the block time stamps of the past blocks with the first set number are sampled to obtain the maximum time stamp, and the maximum time stamp is subtracted from the current block time, so that the weight and the use frequency of the time stamp in the block chain consensus are weakened to resist the time stamp attack, the non-verifiability of the time stamp is reduced, and the irreversible damage of the malicious time stamp to the block chain consensus is avoided.
The invention relates to a method for preventing time stamp attack in a block chain system. The block timestamps of a first set number of blocks in the past are sampled to obtain a maximum timestamp. Calculating a block out time of the current block based on a block time stamp of the current block, the maximum time stamp, an expected block out time, and the first set number. And repeatedly executing the two steps to calculate the block output time of the past second set number of blocks and acquiring the average value of the block output time of the second set number of blocks. And acquiring the block difficulty of the blocks with the second set number, and calculating the difficulty average value of the block difficulty of the blocks with the second set number. And calculating the block difficulty of the next block based on the block time average value and the difficulty average value. The block time stamps of a first set number of blocks in the past are sampled to obtain the maximum time stamp, and then the maximum time stamp is subtracted from the current block time, so that the weight and the use frequency of the time stamp in the block chain consensus are weakened to resist the time stamp attack, the non-verifiability of the time stamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious time stamp is avoided.
Fig. 1 is a flowchart of a first preferred embodiment of a method for preventing a timestamp attack in a blockchain system of the present invention. As shown in fig. 1, in step S1, the tile timestamps of the first set number of tiles in the past are sampled to obtain the maximum timestamp. In a preferred embodiment of the present invention, the current block height is set to h, the first set number is L, and the block time stamp [ T ] of the block between h-L-1 and h-1 is sampledh-l-1,Th-l,...,Th-1]And taking the maximum time stamp Tmax。
In step S2, the out-blocking time of the current tile is calculated based on the tile timestamp of the current tile, the maximum timestamp, the expected out-blocking time, and the first set number. In a preferred embodiment of the invention, the block timestamp T is based on the current blockhWith said maximum timestamp TmaxCalculating the block-out time ST of the current blockh. Then, the block-out time ST of the current block is determinedhIf it is greater than the product of the expected block out time and the first set number, and if so, ST is sethT is the expected block time, otherwise, the block time ST of the current block is determinedhWhether or not it is smaller than the quotient of the expected block time and the first set number, and if so, settingOtherwise set STh=Th-Tmax。
In step S3, the steps S1-S2 are repeatedly executed to calculate the block-out time of the past second set number of blocks to obtain [ STH-N,STH-N+1,...,STH]Wherein H is the system block height and N is the second predetermined number. Then, the block-out time [ ST ] of the second set number of blocks is obtainedH-N,STH-N+1,...,STH]Is taken out of the block time average STavg。
In step S4, the tile difficulty [ D ] of the second set number of tiles is obtainedH-N,DH-N+1,...,DH]. Then calculating the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH]Difficulty average value D ofavg。
In step S5, a block difficulty D of the next block is calculated based on the block-out time average and the difficulty averagenext. The calculation may be based on a moving average type algorithm, for example. For example:
the method for preventing the timestamp attack in the block chain system is implemented, the block timestamps of a first set number of blocks in the past are sampled to obtain the maximum timestamp, and then the maximum timestamp is subtracted from the current block time, so that the weight and the use frequency of the timestamp in the block chain consensus are weakened to resist the timestamp attack, the non-verifiability of the timestamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious timestamp is avoided.
The invention will be further illustrated below with reference to further preferred embodiments.
H System Block height (e.g. value 100)
N calculating the number of blocks sampled by the next block, i.e. the second set number (assuming the value is 12)
L measures the number of blocks sampled by a single block, i.e. a first set number, L < N, it is proposed
T expects a block time (e.g., can take on the value of 120 seconds)
ST block out time
D block difficulty
h current block height
Firstly, calculating the block-out time of the first N blocks, and calculating the target time of the next block:
1. for each block of the first N blocks, assuming that the height of the current block is h, the block between h-L-1 and h-1 is taken to determine the block-out time of the current block. As known to those skilled in the art, the ordering of the blocks is based on the Hash value of the block and the prevHash value of the Hash pointing to the previous block.
2. Time stamp [ T ] for blocks between heights h-L-1 to h-1h-l-1,Th-l,...,Th-1]Taking the maximum value T of its time stampmaxObtaining STh=Th-Tmax;
3. And then judging: if SThIf > T x L, then STh=T*L;
Otherwise STh=Th-Tmax。
Repeating the above steps 1-3 to calculate the block output time of the first N blocks to obtain a block output time set [ STH-N,STH-N+1,...,STH]. The individual block out times are then summed and divided by the number to calculate [ ST [ ]H-N,STH-N+1,...,STH]Average value ST ofavg。
Difficulty of the first N blocks [ D ]H-N,DH-N+1,...,DH]Adding and dividing by the number to calculate a difficulty average Davg
For example, H represents the system block height of the whole blockchain system, and assuming that all blocks of the current blockchain system are accumulated to be 100, the height of 101 blocks needs to be calculated, and then the difficulty and the block-out time of the first N (N ═ 20) blocks need to be referred to, that is, the difficulty and the block-out time of the block with the height of 89 and the block height of 100 are referred to.
We first calculate the block time, which is calculated by subtracting the maximum timestamp of the previous L (L-4) blocks from the current block. Assuming that we want to calculate the actual block-out time of a block with height h equal to 100, we calculate the maximum timestamp of the times of several blocks with heights 99, 98, 97, 96, and then subtract this maximum timestamp by 100. By analogy, calculating the actual out-of-block time for height 99 takes the maximum time stamp of the out-of-block times for the several blocks with heights 98, 97, 96, 95, and then subtracts the maximum time stamp from the block time with height 99. Until a block of height 89 is calculated.
Then, the block difficulty of the past N blocks is measured. And then, calculating the target difficulty of the next block by adopting a moving average algorithm based on the block output time and the block output difficulty.
According to the invention, the maximum time stamp is obtained by sampling the block time stamps of a first set number of blocks in the past, and then the maximum time stamp is subtracted from the current block time, so that the weight and the use frequency of the time stamp in the block chain consensus are weakened to resist the time stamp attack, the non-verifiability of the time stamp is reduced, and the irreversible damage of the block chain consensus caused by the malicious time stamp is avoided.
Another technical solution adopted by the present invention to solve the technical problem is to construct a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for preventing the timestamp attack in the blockchain system.
In order to solve the technical problems, the invention adopts another technical scheme that a block chain system is constructed, the block chain system comprises a plurality of block chain nodes, computer programs are stored on the block chain nodes, and when the computer programs are executed by a processor, the method for preventing the time stamp attack in the block chain system is realized.
Accordingly, the present invention can be realized in hardware, software, or a combination of hardware and software. The present invention can be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods of the present invention is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
The present invention may also be implemented by a computer program product, comprising all the features enabling the implementation of the methods of the invention, when loaded in a computer system. The computer program in this document refers to: any expression, in any programming language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to other languages, codes or symbols; b) reproduced in a different format.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (9)
1. A method for preventing timestamp attacks in a blockchain system, comprising the steps of:
s1, sampling the block time stamps of the past first set number of blocks to obtain the maximum time stamp;
s2, calculating the block-out time of the current block based on the block time stamp of the current block, the maximum time stamp, the expected block-out time and the first set number;
s3, repeating the steps S1-S2 to calculate the block-out time of the past second set number of blocks and obtain the average value of the block-out time of the second set number of blocks;
s4, acquiring the block difficulty of the blocks with the second set number, and calculating the difficulty average value of the block difficulty of the blocks with the second set number;
and S5, calculating the block difficulty of the next block based on the block-out time average value and the difficulty average value.
2. The method of claim 1, wherein in step S1, the current tile height is h, and the first set number is the tile timestamp [ T ] of the tile between L samples h-L-1 to h-1h-l-1,Th-l,…,Th-1]And taking the maximum time stamp Tmax。
3. The method for preventing timestamp attacks in a blockchain system according to claim 2, wherein said step S2 further comprises:
s21, block time stamp T based on current blockhWith said maximum timestamp TmaxCalculating the block-out time ST of the current blockh;
S22, judging the block-out time ST of the current blockhIf it is greater than the product of the expected block out time and the first set number, and if so, ST is sethT × L, where T is the expected block time, otherwise step S23 is performed;
4. The method for preventing timestamp attacks in the blockchain system according to claim 3, wherein said step S3 further comprises:
s31, repeatedly executing steps S1-S2 to calculate the block-out time of the past second set number of blocks to obtain [ STH-N,STH-N+1,...,STH]Wherein H is the height of the system block, and N is a second set number;
s32, calculating the block-out time [ ST ] of the second set number of blocksH-N,STH-N+1,...,STH]Is taken out of the block time average STavg。
5. The method of claim 4, wherein the first set number < the second set number, and both the first set number and the second set number are less than the system block height.
6. The method for preventing timestamp attacks in the blockchain system according to claim 4, wherein said step S4 further comprises:
s41, obtaining the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH];
S42, calculating the block difficulty [ D ] of the second set number of blocksH-N,DH-N+1,...,DH]Difficulty average value D ofavg。
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of preventing a timestamp attack in a blockchain system according to any one of claims 1 to 7.
9. A blockchain system comprising a plurality of blockchain nodes having stored thereon a computer program, characterized in that the program, when being executed by a processor, implements a method of preventing timestamp attacks in a blockchain system according to any of the claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010417922.8A CN111709049B (en) | 2020-05-18 | 2020-05-18 | Method for preventing timestamp attack in blockchain system, computer readable storage medium and blockchain system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010417922.8A CN111709049B (en) | 2020-05-18 | 2020-05-18 | Method for preventing timestamp attack in blockchain system, computer readable storage medium and blockchain system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111709049A true CN111709049A (en) | 2020-09-25 |
CN111709049B CN111709049B (en) | 2023-06-06 |
Family
ID=72537163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010417922.8A Active CN111709049B (en) | 2020-05-18 | 2020-05-18 | Method for preventing timestamp attack in blockchain system, computer readable storage medium and blockchain system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111709049B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113225335A (en) * | 2021-04-28 | 2021-08-06 | 平安科技(深圳)有限公司 | Block chaining-out safety verification method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733651A (en) * | 2017-09-11 | 2018-02-23 | 联动优势科技有限公司 | A kind of block chain generation method, node and system |
CN108596617A (en) * | 2018-04-23 | 2018-09-28 | 北京奇虎科技有限公司 | Block chain attack cognitive method based on algorithm types and device |
US20180336552A1 (en) * | 2017-05-17 | 2018-11-22 | Nec Europe Ltd. | Method and system for providing a robust blockchain with an integrated proof of storage |
CN110096359A (en) * | 2019-04-15 | 2019-08-06 | 华南理工大学 | A kind of block chain proof of work common recognition adjusting of difficulty method of fast convergence |
CN110309657A (en) * | 2019-06-20 | 2019-10-08 | 四川大学 | The safety risk estimating method of block chain |
-
2020
- 2020-05-18 CN CN202010417922.8A patent/CN111709049B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180336552A1 (en) * | 2017-05-17 | 2018-11-22 | Nec Europe Ltd. | Method and system for providing a robust blockchain with an integrated proof of storage |
CN107733651A (en) * | 2017-09-11 | 2018-02-23 | 联动优势科技有限公司 | A kind of block chain generation method, node and system |
CN108596617A (en) * | 2018-04-23 | 2018-09-28 | 北京奇虎科技有限公司 | Block chain attack cognitive method based on algorithm types and device |
CN110096359A (en) * | 2019-04-15 | 2019-08-06 | 华南理工大学 | A kind of block chain proof of work common recognition adjusting of difficulty method of fast convergence |
CN110309657A (en) * | 2019-06-20 | 2019-10-08 | 四川大学 | The safety risk estimating method of block chain |
Non-Patent Citations (1)
Title |
---|
刘宗妹: "区块链的应用:安全威胁与解决策略", 《通信技术》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113225335A (en) * | 2021-04-28 | 2021-08-06 | 平安科技(深圳)有限公司 | Block chaining-out safety verification method, device, equipment and storage medium |
CN113225335B (en) * | 2021-04-28 | 2022-11-15 | 平安科技(深圳)有限公司 | Block chaining-out block safety verification method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111709049B (en) | 2023-06-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9621652B2 (en) | Ranging scalable time stamp data synchronization | |
US20200177388A1 (en) | Cross-blockchain resource transmission | |
US20150207877A1 (en) | Time synchronization client, a system and a non-transitory computer readable medium | |
CN113098646B (en) | Time synchronization method and device, electronic equipment and storage medium | |
CN109558065B (en) | Data deleting method and distributed storage system | |
CN103533002A (en) | Data processing method and system | |
CN104794190B (en) | The method and apparatus that a kind of big data effectively stores | |
CN109756566B (en) | Block chain based data storage method, related equipment and storage medium | |
CN110647531A (en) | Data synchronization method, device, equipment and computer readable storage medium | |
CN111709049A (en) | Method for preventing time stamp attack in blockchain system, computer readable storage medium and blockchain system | |
CN113032157B (en) | Automatic intelligent server capacity expansion and reduction method and system | |
CN111142942A (en) | Window data processing method and device, server and storage medium | |
CN111639902A (en) | Data auditing method based on kafka, control device, computer equipment and storage medium | |
CN112486915A (en) | Data storage method and device | |
CN111259074A (en) | Block synchronization method, device and storage medium | |
CN113268540A (en) | Data synchronization method and device | |
CN111708832B (en) | Method for adjusting block difficulty in block chain network, computer medium and block chain network | |
CN114116744A (en) | Method, device and equipment for updating pull chain table and storage medium | |
CN108833518B (en) | A method of session id is generated based on nginx server | |
CN114866790B (en) | Live stream scheduling method and device | |
CN110471922B (en) | Content extension method and device for accounting node and computer readable storage medium | |
US20230068467A1 (en) | Monitoring system, monitoring method, agent program and manager program | |
Zhou et al. | Discrete-time queue with Bernoulli bursty source arrival and generally distributed service times | |
CN110489231B (en) | Transaction information recording method, apparatus and computer readable storage medium | |
CN111539817B (en) | Linear difficulty calculation method for preventing timestamp hijacking among blockchains, computer-readable storage medium and blockchain network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |