Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
Completely it is communicated to those skilled in the art.
Fig. 1 shows the flow diagram of block packaging method in block chain network according to an embodiment of the invention,
As shown in Figure 1, this method specifically comprises the following steps:
Multiple transaction List Tables to be packaged are distributed to multiple sub- miner's nodes by step S101, miner's head node.
Multiple ore deposit ponds are built in block chain network, wherein, 1 ore deposit pond includes 1 miner's head node and multiple sub- ore deposits
Work node.It is first established by miner's head node and multiple sub- miner's nodes and digs ore deposit agreement, so as to form 1 ore deposit pond, miner's head node
It completes to dig ore deposit with multiple sub- miner's node cooperations.Wherein, miner's head node and sub- miner's node choose credible node, in this way
It is convenient subsequently to obtain the first block and/or the second block trusty, also reduce what the first block and/or the second block were verified
Difficulty.
Miner's head node first counts Transaction Information to be packaged, and generates multiple friendships according to the Transaction Information to be packaged of statistics
Easy information list.Wherein, a plurality of Transaction Information, the Transaction Information included in each transaction List Table are included in each transaction List Table
Item number can be identical, can not also be identical, set according to performance, do not limited herein.
Multiple transaction List Tables to be packaged are distributed to multiple sub- miner's nodes by miner's head node.Wherein, every sub- miner
Node obtains a transaction List Table, and digging ore deposit processing is carried out according to obtained transaction List Table by sub- miner's node.
Step S102, multiple sub- miner's nodes carry out legal school to the Transaction Information included in respective transaction List Table respectively
It tests, to legal Transaction Information generation for the signature of authentication, and be packaged building and obtain multiple first blocks.
Every sub- miner's node is first closed being distributed to the Transaction Information included in the transaction List Table of oneself to miner's head
Method verifies, if sub- miner's node checkout transaction information is licit traffic information, to Transaction Information generation for authentication
Signature, and be packaged structure and obtain the first block.If sub- miner's node checkout transaction information is illegal Transaction Information, in sub- miner
The cryptographic Hash of illegal Transaction Information is sent to miner's head node by node.Miner's head node distribute again new Transaction Information to
Sub- miner's node, to replace illegal Transaction Information.
Wherein, the first block includes the height value of first block, (the ore deposit pond is supplied to every sub- miner's section to ore deposit pond signature
The exclusive signature of point may indicate that first block digs mineral products life by the ore deposit pond), transaction tree root cryptographic Hash is (in first block
The cryptographic Hash of the merkle tree roots of Transaction Information), a plurality of legal Transaction Information etc..
Every sub- miner's node carries out legal verification to the Transaction Information included in respective transaction List Table, each so as to build
From the first block.Multiple sub- miner's nodes build multiple first blocks respectively.
Step S103, multiple sub- miner's nodes broadcast multiple first blocks to the whole network, to the signature of multiple first blocks
It is verified, obtains the check results of multiple first blocks.
Every sub- miner's node broadcasts the first block of structure to the whole network after the first block is built.I.e. multiple sub- ore deposits
Work node broadcasts the first block respectively built to the whole network.The whole network regular node, can be according to after the first block is received
The prior art verifies a plurality of Transaction Information included in the first block one by one, but preferably due to sub- miner's node is credible
Property node, the whole network regular node can only verify the signature for authentication of multiple first blocks, without
Transaction Information is being verified one by one, so as to reduce validation difficulty.The whole network regular node carries out school to the signature of multiple first blocks
It tests, if verification failure, illustrates to build sub- miner's node of first block there are cheating, discarding verifies the firstth area of failure
Block, and the sub- miner's node for building first block is added in into blacklist, which does not allow to participate in digging ore deposit again.
After the whole network regular node verifies the signature of multiple first blocks, the first block of verification failure is abandoned, is obtained
To the check results of multiple first blocks, the first block included in the check results is successful first block of verification.
Step S104, according to the check results of multiple first blocks, miner's head node structure comprising proof of work the
Two blocks.
According to the check results of multiple first blocks, miner's head node is collected into successful first block of verification.Miner's head
Node builds the second block according to successful first block of verification of collection.Wherein, the second block includes the second block size, the
Two block headers, the first block Hash value list.Second block header specifically include version number, father's block cryptographic Hash,
Merkle tree roots cryptographic Hash, timestamp, difficulty target, proof of work etc..Miner's head node distributes the second block header
To multiple sub- miner's nodes, starting simultaneously at amount of calculation by multiple sub- miner's nodes proves.Amount of calculation proof can adopt
The mode proved with amount of calculation in the prior art, details are not described herein.Proof of work is calculated in group miner's node
Afterwards, proof of work is fed back into miner's head node.Proof of work is confirmed by miner's head node, proof of work is assigned to
Proof of work in second block header.
Step S105, miner's head node broadcast the second block to the whole network, and the second block is verified.
Miner's head node broadcasts the second block to the whole network, and the second block is verified by the whole network regular node.Specifically
, the whole network regular node verifies the proof of work of the second block header in the second block.Specific verification mode can
Using in the prior art to the verification mode of block, such as the data structure of the second block grammatically whether effectively, the second block head
Whether the cryptographic Hash of information is less than target difficulty (confirming comprising enough proof of work), the timestamp of the second block header
Whether earlier than following two hours at verification moment (allowing timing error) etc..
Step S106, after the second block verifies successfully, miner's head node and multiple sub- miner's nodes are according to the second block
Comprising proof of work obtain it is corresponding digging ore deposit income.
After the whole network regular node receives the second block, this digging ore deposit terminates.In the whole network regular node to the secondth area
After block check success, miner's head node and multiple sub- miner's nodes can obtain pair according to the proof of work that the second block includes
The digging ore deposit income answered.
According to block packaging method in block chain network provided by the invention, combined by ore deposit pond and dig ore deposit, reduce single section
Point digs the difficulty of ore deposit;It can effectively be solved caused by block chain dilatation using the method that the first block and the second block are combined
The problem of digging mine disaster degree increase.Meanwhile miner's head node in ore deposit pond and multiple sub- miner's nodes be using trusted node, this
Sample, the first block that each sub- miner's node is packaged all are trusty, and the whole network can be tested only when being verified to the first block
Signed certificate name does not need to be in the block to the firstth area and is all verified per transaction, reduces the difficulty of verification.
Fig. 2 shows the flow signals of block packaging method in block chain network in accordance with another embodiment of the present invention
Figure, as shown in Fig. 2, this method specifically comprises the following steps:
Multiple transaction List Tables to be packaged are distributed to multiple sub- miner's nodes by step S201, miner's head node.
Step S202, multiple sub- miner's nodes carry out legal school to the Transaction Information included in respective transaction List Table respectively
It tests, to legal Transaction Information generation for the signature of authentication, and is packaged, builds multiple first blocks.
Above step is with reference to the step S101-S102 in 1 embodiment of figure, and details are not described herein.
Step S203, multiple first blocks that multiple sub- miner's nodes are built are sent to miner's head node.
Step S204, miner's head node are distributed to multiple first blocks except the sub- miner's node for creating first block
Other sub- miner's nodes, broadcast is to the whole network after being verified by other sub- miner's nodes to the first block distributed.
For sub- miner's node is avoided cheating occur during being packaged and building the first block to its affiliated ore deposit
Miner's head node and other sub- miner's nodes in pond cause unnecessary loss, therefore, each in multiple sub- miner's node structures
From the first block after, the first block is not broadcasted to the whole network first, but multiple first blocks of structure is sent to miner's head
Node.Multiple first blocks are distributed to other sub- miners except the sub- miner's node for creating first block by miner's head node
Node after being verified by other sub- miner's nodes to distributing the first block, realizes the cross check between sub- miner's node.Its
He verifies the first block distributed sub- miner's node, if verifying successfully, other sub- miner's nodes are to being distributed
The generation of first block is used for the signature of proof of identity, and the first block distributed is broadcasted to the whole network.If verification failure, loses
The first distributed block is abandoned, and the sub- miner's node for building the first distributed block is added in into blacklist, does not allow the son
Miner's node participates in digging ore deposit again.Sub- miner's node of cheating can be quickly verified out in this way, ensured the safety that transaction is packaged
Property.
Further, miner's head node can also judge whether sub- miner's node broadcasts or send its structure in preset time
The first block built;If sub- miner's node is not fed back always, i.e., never broadcast the first block constructed by it or always
Do not send the first block constructed by it, sub- miner's node there may be network problem, delay machine situations such as, it is contemplated that sub- miner
Node possibly can not complete this and dig ore deposit in time, and miner's head node rejects sub- miner's node from ore deposit pond.It should be noted that
Miner's head node only rejects sub- miner's node from ore deposit pond, without being added into blacklist.Sub- miner's node is only not
It participates in this and digs ore deposit, there is no cheating, the digging ore deposit after can also participating in again.
Step S205 verifies the signature of multiple first blocks, obtains the check results of multiple first blocks.
The whole network regular node verifies the signature of multiple first blocks after multiple first blocks are received.If the
When one block there are multiple signatures, multiple signatures are verified successively, avoid the occurrence of multiple sub- miner's node joints in ore deposit pond
The situation of cheating, so as to obtain the check results of multiple first blocks.
Step S206, according to the check results of multiple first blocks, miner's head node structure comprising proof of work the
Two blocks.
Step S207, miner's head node broadcast the second block to the whole network, and the second block is verified.
Step S208, after the second block verifies successfully, miner's head node and multiple sub- miner's nodes are according to the second block
Comprising proof of work obtain it is corresponding digging ore deposit income.
Above step is with reference to the step S104-S106 in 1 embodiment of figure, and details are not described herein.
According to block packaging method in block chain network provided by the invention, combined by ore deposit pond and dig ore deposit, reduce single section
Point digs the difficulty of ore deposit;It can effectively be solved caused by block chain dilatation using the method that the first block and the second block are combined
The problem of digging mine disaster degree increase.Meanwhile miner's head node in ore deposit pond and multiple sub- miner's nodes be using trusted node, this
Sample, the first block that each sub- miner's node is packaged all are trusty, and the whole network can be tested only when being verified to the first block
Signed certificate name does not need to be in the block to the firstth area and is all verified per transaction, reduces the difficulty of verification.Further, also
It, by carrying out cross validation between each sub- miner's node inside ore deposit pond, can be protected after sub- miner's node builds to obtain the first block
Hindered the safety that transaction is packaged, also avoid the occurrence of the cheating of sub- miner's node and to entire ore deposit pond chats foreman node and other sons
Miner's node causes harmful effect and unnecessary loss.
Fig. 3 shows the functional block diagram of block packaging system in block chain network according to an embodiment of the invention, such as
Shown in Fig. 3, included in this system with lower node:Miner's head node 310, multiple sub- miner's nodes 320 and the whole network regular node
330.Block chain network includes multiple ore deposit ponds, and 1 ore deposit pond includes 1 miner's head node 310 and multiple sub- miner's nodes 320.
Miner's head node 310 and multiple sub- miner's nodes 320 are established and dig ore deposit agreement, form 1 ore deposit pond, complete to dig ore deposit with cooperation.
Miner's head node 310 is used to multiple transaction List Tables to be packaged being distributed to multiple sub- miner's nodes.
Miner's head node 310 is further used for counting Transaction Information to be packaged, and generates multiple transaction information lists;It will
Multiple transaction List Tables to be packaged are distributed to multiple sub- miner's nodes 320;Wherein, every sub- miner's node 320 obtains a friendship
Easy list.
Multiple sub- miner's nodes 320 are used to carry out legal verification to the Transaction Information included in respective transaction List Table respectively,
To legal Transaction Information generation for the signature of authentication, and be packaged building and obtain multiple first blocks;It will be multiple
First block is broadcasted to the whole network.
Sub- miner's node 320 is further used for carrying out legal verification to the Transaction Information included in transaction List Table.If verification
Transaction Information is licit traffic information, then to Transaction Information generation for the signature of authentication, and builds the first block;Its
In, the first block includes at least one of:Block height value, ore deposit pond signature, transaction tree root cryptographic Hash and/or Transaction Information.
If checkout transaction information is illegal Transaction Information, the cryptographic Hash of Transaction Information is sent to miner's head node 310.Miner's head
Node 310 is further used for distributing again new Transaction Information to sub- miner's node 320, to replace illegal Transaction Information.
Multiple sub- miner's nodes 320 are further used for broadcasting multiple first blocks to the whole network.
Optionally, multiple first blocks that multiple sub- miner's nodes 320 are further used for being built are sent to miner's head
Node 310.Miner's head node 310 is further used for distributing to multiple first blocks into the sub- miner's node for creating first block
Except other sub- miner's nodes 320.Other sub- miner's nodes 320 are used to verify the first block distributed;If school
Test success, then to distributed the first block generation for proof of identity signature, and by the first block distributed broadcast to
The whole network;If verification failure abandons the first distributed block, and the sub- miner's node that will build the first distributed block
320 add in blacklist.
Further, miner's head node 310 be further used for judging sub- miner's node 320 whether in preset time broadcast or
Send the first block constructed by it;If it is not, miner's head node 310 rejects sub- miner's node 320 from ore deposit pond.
The whole network regular node 330 obtains the school of multiple first blocks for being verified to the signature of multiple first blocks
Test result.
The whole network regular node 330 is further used for verifying the signature for authentication of multiple first blocks;
If verification failure, abandons the first block of verification failure, and the sub- miner's node 320 for building first block is added in black name
It is single.
Miner's head node 310 is additionally operable to the check results according to multiple first blocks, structure comprising proof of work the
Two blocks;Second block is broadcasted to the whole network.
Miner's head node 310 is further used for the check results according to multiple first blocks, collects verification successful first
Block;Second block is built according to successful first block of the verification of collection;Wherein, the second block include the second block size,
Second block header, the first block Hash value list;Second block header is distributed to multiple sub- miner's nodes 320.It is more
A sub- miner's node 320 is further used for that proof of work is calculated and feeds back to miner's head node 310.Miner's head node
310 are further used for confirming proof of work, and proof of work is assigned to the second block header.
The whole network regular node 330 is additionally operable to verify the second block.If the second block verifies successfully, miner's head node
310 and multiple sub- miner's nodes 320 according to the proof of work that the second block includes obtain it is corresponding digging ore deposit income.
According to block packaging system in block chain network provided by the invention, combined by ore deposit pond and dig ore deposit, reduce single section
Point digs the difficulty of ore deposit;It can effectively be solved caused by block chain dilatation using the method that the first block and the second block are combined
The problem of digging mine disaster degree increase.Meanwhile miner's head node in ore deposit pond and multiple sub- miner's nodes be using trusted node, this
Sample, the first block that each sub- miner's node is packaged all are trusty, and the whole network can be tested only when being verified to the first block
Signed certificate name does not need to be in the block to the firstth area and is all verified per transaction, reduces the difficulty of verification.Further, also
It, by carrying out cross validation between each sub- miner's node inside ore deposit pond, can be protected after sub- miner's node builds to obtain the first block
Hindered the safety that transaction is packaged, also avoid the occurrence of the cheating of sub- miner's node and to entire ore deposit pond chats foreman node and other sons
Miner's node causes harmful effect and unnecessary loss.
Present invention also provides a kind of nonvolatile computer storage media, the computer storage media is stored at least
One executable instruction, the computer executable instructions can perform block in the block chain network in above-mentioned any means embodiment and beat
Packet method.
Fig. 4 shows the structure diagram of a kind of electronic equipment according to an embodiment of the invention, and the present invention is specific real
Example is applied not limit the specific implementation of electronic equipment.
As shown in figure 4, the electronic equipment can include:Processor (processor) 402, communication interface
(Communications Interface) 404, memory (memory) 406 and communication bus 408.
Wherein:
Processor 402, communication interface 404 and memory 406 complete mutual communication by communication bus 408.
Communication interface 404, for communicating with the network element of miscellaneous equipment such as client or other servers etc..
For performing program 410, it is real can specifically to perform block packaging method in above-mentioned block chain network for processor 402
Apply the correlation step in example.
Specifically, program 410 can include program code, which includes computer-managed instruction.
Processor 402 may be central processor CPU or specific integrated circuit ASIC (Application
Specific Integrated Circuit) or be arranged to implement the embodiment of the present invention one or more integrate electricity
Road.The one or more processors that electronic equipment includes can be same type of processor, such as one or more CPU;Also may be used
To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 406, for storing program 410.Memory 406 may include high-speed RAM memory, it is also possible to further include
Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 410 specifically can be used for so that processor 402 performs the block chain network in above-mentioned any means embodiment
Middle block packaging method.The specific implementation of each step may refer to block in above-mentioned block chain network and be packaged implementation in program 410
Corresponding description in corresponding steps and unit in example, this will not be repeated here.Those skilled in the art can be understood that
It arrives, for convenience and simplicity of description, the equipment of foregoing description and the specific work process of module, preceding method can be referred to and implemented
Corresponding process description in example, details are not described herein.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system
Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various
Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the specification provided in this place, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention
Example can be put into practice without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of each inventive aspect,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
Shield the present invention claims the more features of feature than being expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim is in itself
Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptively the module in the equipment in embodiment
Change and they are arranged in one or more equipment different from the embodiment.It can be the module or list in embodiment
Member or component be combined into a module or unit or component and can be divided into addition multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it may be used any
Combination is disclosed to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so to appoint
Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Profit requirement, abstract and attached drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments means in of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be with hardware realization or to be run on one or more processor
Software module realize or realized with combination thereof.It will be understood by those of skill in the art that it can use in practice
Microprocessor or digital signal processor (DSP) are come one of some or all components in realizing according to embodiments of the present invention
A little or repertoire.The present invention is also implemented as setting for performing some or all of method as described herein
Standby or program of device (for example, computer program and computer program product).Such program for realizing the present invention can deposit
Store up on a computer-readable medium or can have the form of one or more signal.Such signal can be from because of spy
It is downloaded on net website and obtains either providing on carrier signal or providing in the form of any other.
It should be noted that the present invention will be described rather than limits the invention, and ability for above-described embodiment
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference mark between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any sequence.These words can be explained and run after fame
Claim.
The invention discloses:A1. a kind of block packaging method in block chain network, which is characterized in that the block link network
1 ore deposit pond of network includes 1 miner's head node and multiple sub- miner's nodes, including:
Multiple transaction List Tables to be packaged are distributed to multiple sub- miner's nodes by miner's head node;
The multiple sub- miner's node carries out legal verification, pairing to the Transaction Information included in respective transaction List Table respectively
The Transaction Information generation of method is used for the signature of authentication, and be packaged building and obtain multiple first blocks;
The multiple sub- miner's node broadcasts the multiple first block to the whole network, to the label of the multiple first block
Name is verified, and obtains the check results of the multiple first block;
According to the check results of the multiple first block, miner's head node structure includes the second of proof of work
Block;
Miner's head node broadcasts second block to the whole network, and second block is verified;
If second block verifies successfully, miner's head node and the multiple sub- miner's node are according to described second
The proof of work that block includes obtains corresponding digging ore deposit income.
A2. the method according to A1, which is characterized in that miner's head node divides multiple transaction List Tables to be packaged
Multiple sub- miner's nodes are issued to further comprise:
Miner's head node counts Transaction Information to be packaged, and generates multiple transaction information lists;
Multiple transaction List Tables to be packaged are distributed to multiple sub- miner's nodes by miner's head node;Wherein, per height
Miner's node obtains a transaction List Table.
A3. the method according to A1, which is characterized in that the multiple sub- miner's node is respectively in respective transaction List Table
Comprising Transaction Information carry out legal verification, to legal Transaction Information generation for the signature of authentication, and be packaged,
Multiple first blocks are built to further comprise:
Sub- miner's node carries out legal verification to the Transaction Information included in the transaction List Table;
If verifying the Transaction Information as licit traffic information, to Transaction Information generation for the label of authentication
Name, and build the first block;Wherein, first block includes at least one of:Block height value, ore deposit pond signature, transaction
Tree root cryptographic Hash and/or the Transaction Information;
If verifying the Transaction Information as illegal Transaction Information, the cryptographic Hash of the Transaction Information is sent to described
Miner's head node;Miner's head node distributes new Transaction Information to sub- miner's node again, not conform to described in replacement
Method Transaction Information.
A4. the method according to A1, which is characterized in that the multiple sub- miner's node is wide by the multiple first block
The whole network is cast to, the signature of the multiple first block is verified, obtains the check results of the multiple first block into one
Step includes:
The multiple sub- miner's node broadcasts the multiple first block to the whole network;
The whole network regular node verifies the signature for authentication of the multiple first block;
If verification failure, the first block of verification failure, and the sub- miner's node that first block will be built are abandoned
Add in blacklist.
A5. the method according to A1 or A4, which is characterized in that the multiple sub- miner's node is by the multiple firstth area
Block, which is broadcasted to the whole network, to be further comprised:
Multiple first blocks that the multiple sub- miner's node is built are sent to miner's head node;
Miner's head node is distributed to the multiple first block except the sub- miner's node for creating first block
Other sub- miner's nodes, the first block distributed is verified by other sub- miner's nodes;
If verifying successfully, other sub- miner's nodes are used for the first block generation distributed the signature of proof of identity,
And the first block distributed is broadcasted to the whole network;
If verification failure, the first distributed block is abandoned, and the sub- miner for building the first distributed block is saved
Point adds in blacklist.
A6. the method according to A1, which is characterized in that the check results according to the multiple first block, institute
Second block of miner's head node structure comprising proof of work is stated to further comprise:
According to the check results of the multiple first block, miner's head node, which is collected, verifies successful first block;
Miner's head node builds the second block according to successful first block of verification of collection;Wherein, described second
Block includes the second block size, the second block header, the first block Hash value list;
The second block header is distributed to the multiple sub- miner's node by miner's head node, by the multiple
Sub- miner's node is calculated proof of work and feeds back to miner's head node;
Miner's head node confirms the proof of work, and the proof of work is assigned to the second block head
Information.
A7. the method according to A1, which is characterized in that the method further includes:
Miner's head node and the multiple sub- miner's node are established and dig ore deposit agreement, form 1 ore deposit pond, are completed with cooperating
Dig ore deposit.
A8. the method according to A1, which is characterized in that the method further includes:
Miner's head node judges whether sub- miner's node is broadcasted or sent constructed by it in preset time
First block;
If it is not, miner's head node rejects sub- miner's node from ore deposit pond.
The invention also discloses:B9. block packaging system in a kind of block chain network, which is characterized in that including:Positioned at area
Miner's head node, sub- miner's node and the whole network regular node in block chain network;Wherein, 1 ore deposit pond of the block chain network
Include 1 miner's head node and multiple sub- miner's nodes;
Miner's head node is used to multiple transaction List Tables to be packaged being distributed to multiple sub- miner's nodes;
The multiple sub- miner's node is used to carry out legal verification to the Transaction Information included in respective transaction List Table respectively,
To legal Transaction Information generation for the signature of authentication, and be packaged building and obtain multiple first blocks;By described in
Multiple first blocks are broadcasted to the whole network;
The whole network regular node obtains the multiple first for being verified to the signature of the multiple first block
The check results of block;
Miner's head node is additionally operable to the check results according to multiple first blocks, structure comprising proof of work the
Two blocks;Second block is broadcasted to the whole network;
The whole network regular node is additionally operable to verify second block;
If second block verifies successfully, miner's head node and the multiple sub- miner's node are according to described second
The proof of work that block includes obtains corresponding digging ore deposit income.
B10. the system according to B9, which is characterized in that miner's head node is further used for:
Transaction Information to be packaged is counted, and generates multiple transaction information lists;
Multiple transaction List Tables to be packaged are distributed to multiple sub- miner's nodes;Wherein, every sub- miner's node obtains one
A transaction List Table.
B11. the system according to B9, which is characterized in that sub- miner's node is further used for:
Legal verification is carried out to the Transaction Information included in the transaction List Table;
If verifying the Transaction Information as licit traffic information, to Transaction Information generation for the label of authentication
Name, and build the first block;Wherein, first block includes at least one of:Block height value, ore deposit pond signature, transaction
Tree root cryptographic Hash and/or the Transaction Information;
If verifying the Transaction Information as illegal Transaction Information, the cryptographic Hash of the Transaction Information is sent to described
Miner's head node;
Miner's head node is further used for:Again distribute new Transaction Information to sub- miner's node, to replace
The illegal Transaction Information.
B12. the system according to B9, which is characterized in that the multiple sub- miner's node is further used for:
The multiple first block is broadcasted to the whole network;
The whole network regular node is further used for:The signature for authentication of the multiple first block is carried out
Verification;If verification failure, the first block of verification failure is abandoned, and the sub- miner's node for building first block is added in
Blacklist.
B13. the system according to B9 or B12, which is characterized in that the multiple sub- miner's node is further used for:
Multiple first blocks built are sent to miner's head node;
Miner's head node is further used for:The multiple first block is distributed to the sub- ore deposit for creating first block
Other sub- miner's nodes except work node;
Other described sub- miner's nodes are used for:The first block distributed is verified;If it verifies successfully, to dividing
The the first block generation matched is used for the signature of proof of identity, and the first block distributed is broadcasted to the whole network;If verification failure,
The first distributed block is then abandoned, and the sub- miner's node for building the first distributed block is added in into blacklist.
B14. the system according to B9, which is characterized in that miner's head node is further used for:
According to the check results of the multiple first block, collect and verify successful first block;
Second block is built according to successful first block of the verification of collection;Wherein, second block includes the secondth area
Block size, the second block header, the first block Hash value list;
The second block header is distributed to the multiple sub- miner's node,
The multiple sub- miner's node is further used for:Proof of work is calculated and feeds back to miner's cephalomere
Point;
Miner's head node is further used for:Confirm the proof of work, the proof of work is assigned to institute
State the second block header.
B15. the system according to B9, which is characterized in that miner's head node and the multiple sub- miner's node are built
It is vertical to dig ore deposit agreement, 1 ore deposit pond is formed, completes to dig ore deposit with cooperation.
B16. the system according to B9, which is characterized in that miner's head node is further used for:
Judge whether sub- miner's node broadcasts or send the first block constructed by it in preset time;If it is not,
Miner's head node rejects sub- miner's node from ore deposit pond.
The invention also discloses:C17. a kind of electronic equipment, including:Processor, memory, communication interface and communication are total
Line, the processor, the memory and the communication interface complete mutual communication by the communication bus;
For the memory for storing an at least executable instruction, the executable instruction makes the processor perform such as
The corresponding operation of block packaging method in block chain network described in any one of A1-A8.
The invention also discloses:D18. a kind of computer storage media, being stored at least one in the storage medium can hold
Row instruction, the executable instruction make block packing side in block chain network of the processor execution as described in any one of A1-A8
The corresponding operation of method.