A method for preventing short-term bifurcation and double-spend attack on a block chain network

A block chain and block technology, applied in the Internet/IT/financial field, to achieve the effect of easy implementation, reduced possibility, and small changes

Active Publication Date: 2018-12-18
WEALEDGER NETWORK TECH CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] At present, there is no effective method in the blockchain network (POW consensus network / POS consensus network) to prevent malicious individuals or organizations (generally mining pools) with a large amount of resources from conducting short-lived bifurcation double-spending attacks. The present invention is Provide a method that can largely prevent short-lived fork double-spending attacks on blockchain networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present invention will be clearly and completely described below. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] In an embodiment of the present invention, a method for preventing a short-lived bifurcation double-spending attack on a blockchain network includes the following steps:

[0029] Add a CA certificate issuance and update center to the blockchain network; all nodes that want to participate in mining must submit a certificate issuance application to the CA certificate issuance and update center, and the CA certificate issuance and update center conducts individual / organization real-name audits; The certificate issuance and updat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing short-term bifurcation and double-spend attack on a block chain network. The method comprises the following steps: adding a CA certificate issuing and updating center to the block chain network; transforming the block data structure, adding signature and public key fields based on CA certificate; adding certificate validity verification of signatureand public key to the consensus algorithm of block chain network nodes; improving consensus algorithm; in the improved consensus algorithm, adding short bifurcation malicious double-spend attack riskidentification. The method has small modification to the original chain, is easy to realize, only increases the CA center and modifies and adds the necessary consensus algorithm, can effectively reduce the possibility of short-term bifurcation double-spend attack, and provides effective real-name system evidence for the judicial investigation after the event through the real-name system CA certificate.

Description

technical field [0001] The present invention relates to the Internet / IT / financial field, in particular to a method for preventing short-term bifurcation double-spending attacks on blockchain networks. Background technique [0002] Blockchain technology, also known as distributed ledger technology, is an Internet database technology characterized by decentralization, openness and transparency. It was the underlying technology of Bitcoin at the earliest and is currently widely used in financial and other fields. At present, the BTG network has been attacked by a short-lived fork and double spend, which has caused a large amount of digital token losses to the exchange, and has once again questioned the security of the blockchain. [0003] Short-lived fork double-spending attack refers to: [0004] 1) The attacker takes advantage of the computing power (for the POW blockchain network) / equity (for the POS blockchain network) of the control node to fork the target chain (chain, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06Q20/38
CPCG06F21/562G06Q20/3829H04L9/3247H04L9/3268H04L9/3239H04L63/0823H04L63/126H04L63/1466H04L63/1441H04L9/50H04L9/0643H04L9/30
Inventor 程文彬郭光武肖坤
Owner WEALEDGER NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products