CN108881428A - A kind of block catenary system with oversight mechanism - Google Patents
A kind of block catenary system with oversight mechanism Download PDFInfo
- Publication number
- CN108881428A CN108881428A CN201810606744.6A CN201810606744A CN108881428A CN 108881428 A CN108881428 A CN 108881428A CN 201810606744 A CN201810606744 A CN 201810606744A CN 108881428 A CN108881428 A CN 108881428A
- Authority
- CN
- China
- Prior art keywords
- layer
- code
- block chain
- contract
- picket
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of block catenary system with oversight mechanism, is divided into 4 layers, from the bottom up respectively protocol layer, extension layer, application layer and supervision layer;The protocol layer includes accumulation layer, network layer, common recognition layer;The extension layer includes excitation layer and contract layer;The application layer is packaged with the various application programs of block catenary system;The supervision layer includes real name code, picket code and root code.Using the present invention overcomes most of block chain technologies due to anonymity, there is the problems such as can not supervising, can not managing, realizing block chain technology can be supervised while decentralization.Supervision layer can quickly modify and more new block chain technology, so that block chain technology develops towards more favorable direction.
Description
Technical field
The present invention relates to the technical fields of block chain technology, refer in particular to a kind of block catenary system with oversight mechanism.
Background technique
Known in the industry, block chain is the computers such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm
The new application mode of technology is substantially the database of a decentralization, is widely used and securities trading, electronics quotient
The various fields such as business, intelligent contract, Internet of Things, social communication and file storage.
Existing block chain technology has the following disadvantages, most of block chains due to anonymity, exist can not supervise, can not
The problems such as control, urgent need to resolve.
Summary of the invention
It is an object of the invention to overcome the deficiencies in the prior art, propose a kind of block linkwork with oversight mechanism
System, can effectively solve the problems, such as that existing block chain can not supervise, can not manage, can not recall.
To achieve the above object, technical solution provided by the present invention is:A kind of block catenary system with oversight mechanism,
The block catenary system is divided into 4 layers, from the bottom up respectively protocol layer, extension layer, application layer and supervision layer;
The protocol layer includes accumulation layer, network layer, common recognition layer;The accumulation layer is data store organisation, is packaged with bottom
The chain structure of layer data block and relevant data encryption algorithm, ciphering signature algorithm and timestamp technology;The network
Layer includes distributed group network method, P2P network-building method, data dissemination mode, data authentication mechanism and data jamming settlement mechanism;
The common recognition layer is packaged with all kinds of common recognition algorithms of network node, including proof of work PoW, equity prove that PoS and share are awarded
The bright DPoS of warrant;
The extension layer includes excitation layer and contract layer;The excitation layer includes that excitation participates in each of block chain running node
Kind optimization algorithm;The contract layer is packaged with classification script, intelligent contract algorithm and optimization algorithm, and the intelligence contract refers to
Programmability contract, writes contract as requested, and when reaching some condition, contract can be automatically complete according to the execution of design
At;The optimization algorithm includes machine learning, VR, Internet of Things and big data;
The application layer is packaged with the various application programs of block catenary system, including various industries application block chain technology
Product, including transaction system, programmable currency, finance, logistics and supply chain based on block chain technology;
The supervision layer includes real name code, picket code and root code;The real name code refers to the node of each block chain
System of real name is needed, the special memory space of each node is stored in by cipher mode, is externally anonymity, only there is supervision
The code of code weight limit can check that it corresponds to identity;The picket code refers to one section of code with supreme supervisory power limit, code
There can be one or more, but no more than 3, this section of code identity in entire block chain discloses, and corresponds to actual political affairs
The superintendent office of mansion or company carries out authentication with Encryption Algorithm, is responsible for supervising the operation of whole system and each node pair
The true identity answered, picket code can temporarily authorize other appointment codes by ballot or other mechanism, and authorization includes permission
Scope and time cut off, authorized code must disclose its real true identity;The root code refers to highest permission
Programmable code, can be used in modifying the technical parameter and intelligent contract of entire block chain, and real-time update is to each node,
Root code can only by the code programming with picket code, and in programming code mark picket code node authentication information,
In the presence of having multiple picket codes, original picket code has veto by one vote system.
Compared with prior art, the present invention having the following advantages that and beneficial effect:
1, most of block chain technologies are overcome due to anonymity, there is the problems such as can not supervising, can not managing, realize
Block chain technology can be supervised while decentralization.
2, supervision layer can be modified quickly and more new block chain technology, so that block chain technology is sent out towards more favorable direction
Exhibition.
Detailed description of the invention
Fig. 1 is the block catenary system design diagram with supervision mechanism of control.
Fig. 2 is that picket code and root code illustrate schematic diagram.
Fig. 3 is supervision layer design diagram.
Specific embodiment
The present invention is further explained in the light of specific embodiments.
Referring to shown in Fig. 1 to Fig. 3, with the block catenary system of oversight mechanism provided by the present embodiment, it is divided into 4 layers, from
Under up be respectively protocol layer, extension layer, application layer and supervision layer.
The protocol layer of design includes accumulation layer, network layer, common recognition layer etc.;The accumulation layer of design refers to data store organisation skill
Art encapsulates the chain structure of bottom data block, relevant data encryption algorithm, ciphering signature algorithm, timestamp technology etc.;
Network layer includes distributed networking method, P2P network-building method, data dissemination mode, data authentication mechanism, data jamming solution machine
System etc.;Common recognition layer encapsulates all kinds of common recognition algorithms of network node, such as PoW (proof of work), PoS (equity proves), DPoS
(share authorisation verification) etc..
The extension layer of design includes excitation layer and contract layer;Excitation layer includes that excitation participates in the various of block chain running node
Optimization algorithm;Contract layer encapsulation classification script, intelligent contract algorithm and optimization algorithm, wherein intelligent contract refers to programmability
Contract writes contract according to certain requirement, and when reaching some condition, contract can execute completion according to design automatically;
Optimization algorithm includes machine learning, VR, Internet of Things, big data etc..
The application layer of design encapsulates the various application programs of block catenary system, including various industries application block chain technology
Product, such as the transaction system based on block chain technology, programmable currency, finance, logistics and supply chain.
The supervision layer of design includes real name code, picket code and root code;Real name code refers to that the node of each block chain needs
System of real name is wanted, the special memory space of each node is stored in by cipher mode, is externally anonymity, only there is picket code
The code of permission can check that it corresponds to identity;Picket code refers to that one section of code with supreme supervisory power limit, code can have
One or more (no more than 3), this section of code identity in entire block chain disclose, and correspond to actual government or company
Superintendent office, carry out authentication with unique Encryption Algorithm, operation and each node for being responsible for supervision whole system are corresponding
True identity, picket code can by ballot or other mechanism other appointment codes are temporarily authorized, authorization include permission model
Its real true identity must be disclosed with time cut off, authorized code by enclosing;Root code refers to compiling with highest permission
Range code, can be used for modifying the technical parameter and intelligent contract etc. of entire block chain, and real-time update is to each node, root
Code can only be by the code programming with picket code, and marks in programming code the authentication information of picket code node, when having
In the presence of multiple picket codes, original picket code has veto by one vote system.
It illustrates:
Design one has the block chain financial transaction platform of supervision mechanism of control, designs in the intelligent contract layer of extension layer
Good various supervision mechanisms, such as big quantity financial transaction alarm mechanism, are responsible for supervision by supervision layer picket code.It is counted greatly when occurring one
When measuring financial transaction, intelligent contract alarm mechanism is triggered, picket code is found the problem, and suspends this transaction, and can according to block chain
Tracking mechanism, which traces entire chain transaction, allows continuous business if there is no problem;If it find that problem, picket code has one
Ticket rejection system, vetos this transaction, and by retrospect, checks the true identity of this transaction, investigated.
When discovery has new mechanism of exchange loophole, root code is initiated by any picket code and carries out code amendment, and is passed through
All picket codes reach common recognition, are quickly updated to whole block chain technology, can be with quick blocking loophole, and safeguards system is normal
Operation.
Embodiment described above is only the preferred embodiments of the invention, and but not intended to limit the scope of the present invention, therefore
All shapes according to the present invention change made by principle, should all be included within the scope of protection of the present invention.
Claims (1)
1. a kind of block catenary system with oversight mechanism, it is characterised in that:The block catenary system is divided into 4 layers, from the bottom up
Respectively protocol layer, extension layer, application layer and supervision layer;
The protocol layer includes accumulation layer, network layer, common recognition layer;The accumulation layer is data store organisation, is packaged with bottom number
According to the chain structure and relevant data encryption algorithm of block, ciphering signature algorithm and timestamp technology;The network layer packet
Include distributed group network method, P2P network-building method, data dissemination mode, data authentication mechanism and data jamming settlement mechanism;It is described
Common recognition layer is packaged with all kinds of common recognition algorithms of network node, including proof of work PoW, equity prove PoS and share warrant
Bright DPoS;
The extension layer includes excitation layer and contract layer;The excitation layer includes that excitation participates in the various excellent of block chain running node
Change algorithm;The contract layer is packaged with classification script, intelligent contract algorithm and optimization algorithm, and the intelligence contract refers to compile
Journey contract, writes contract as requested, and when reaching some condition, contract can execute completion according to design automatically;Institute
Stating optimization algorithm includes machine learning, VR, Internet of Things and big data;
The application layer is packaged with the various application programs of block catenary system, the production including various industries application block chain technology
Product, including transaction system, programmable currency, finance, logistics and supply chain based on block chain technology;
The supervision layer includes real name code, picket code and root code;The real name code refers to the node needs of each block chain
System of real name is stored in the special memory space of each node by cipher mode, is externally anonymity, only has supervision code weight
The code of limit can check that it corresponds to identity;The picket code refers to that code can with one section of code of supreme supervisory power limit
Have one or more, but no more than 3, this section of code identity in entire block chain discloses, correspond to actual government or
The superintendent office of company carries out authentication with Encryption Algorithm, and operation and each node for being responsible for supervision whole system are corresponding
True identity, picket code can temporarily authorize other appointment codes by ballot or other mechanism, and authorization includes extent of competence
With time cut off, authorized code must disclose its real true identity;The root code refer to highest permission can
Programming code, can be used in modifying the technical parameter and intelligent contract of entire block chain, and real-time update is to each node, root
Code can only be by the code programming with picket code, and marks in programming code the authentication information of picket code node, when having
In the presence of multiple picket codes, original picket code has veto by one vote system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810606744.6A CN108881428B (en) | 2018-06-13 | 2018-06-13 | Block chain system with supervision mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810606744.6A CN108881428B (en) | 2018-06-13 | 2018-06-13 | Block chain system with supervision mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108881428A true CN108881428A (en) | 2018-11-23 |
CN108881428B CN108881428B (en) | 2020-11-24 |
Family
ID=64338221
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810606744.6A Active CN108881428B (en) | 2018-06-13 | 2018-06-13 | Block chain system with supervision mechanism |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881428B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109493059A (en) * | 2018-12-24 | 2019-03-19 | 深圳市元智汇科技有限公司 | A kind of marketing strategy based on block chain determines method and system |
CN109559123A (en) * | 2018-12-10 | 2019-04-02 | 大科数据(深圳)有限公司 | A kind of point-to-point network processing method of mixed type |
CN109961287A (en) * | 2019-02-12 | 2019-07-02 | 众安信息技术服务有限公司 | A kind of monitoring and managing method and supervisory systems of block chain |
CN110034917A (en) * | 2019-04-11 | 2019-07-19 | 鸿秦(北京)科技有限公司 | A kind of alliance's chain data processing method and device based on homomorphic encryption algorithm |
CN110084596A (en) * | 2019-04-01 | 2019-08-02 | 杜晓楠 | A kind of method and apparatus of processing block chain mixing common recognition |
CN110427772A (en) * | 2019-06-27 | 2019-11-08 | 布比(北京)网络技术有限公司 | A kind of secret protection electronic voting method and system based on block chain |
CN110493080A (en) * | 2019-08-19 | 2019-11-22 | 腾讯科技(深圳)有限公司 | A kind of block chain node monitoring method, device and electronic equipment and storage medium |
CN110807844A (en) * | 2019-10-09 | 2020-02-18 | 国网上海市电力公司 | Power grid base tower inspection method based on block chain technology |
CN111405005A (en) * | 2020-03-06 | 2020-07-10 | 清华大学 | Operation control method and system of block chain and controllable network terminal equipment |
CN112016114A (en) * | 2020-10-31 | 2020-12-01 | 腾讯科技(深圳)有限公司 | Intelligent contract generating method based on cryptocurrency, related equipment and storage medium |
CN113259131A (en) * | 2021-06-23 | 2021-08-13 | 北京笔新互联网科技有限公司 | Block chain node, system and block chain construction method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446067A (en) * | 2016-09-06 | 2017-02-22 | 联动优势科技有限公司 | Transaction data acquisition method and apparatus |
CN106790513A (en) * | 2016-12-19 | 2017-05-31 | 杜伯仁 | The method that network share service is realized based on block chain |
CN107257341A (en) * | 2017-06-21 | 2017-10-17 | 济南浪潮高新科技投资发展有限公司 | A kind of student status based on block chain reviews authentication method |
CN107423333A (en) * | 2017-04-21 | 2017-12-01 | 博大莱哲科技(北京)有限公司 | A kind of real name identification method and device |
CN107623572A (en) * | 2017-09-27 | 2018-01-23 | 济南浪潮高新科技投资发展有限公司 | A kind of method of digital certificate granting on block chain |
WO2018050024A1 (en) * | 2016-09-19 | 2018-03-22 | 中国银联股份有限公司 | Resource file processing system and method based on blockchain structure |
-
2018
- 2018-06-13 CN CN201810606744.6A patent/CN108881428B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106446067A (en) * | 2016-09-06 | 2017-02-22 | 联动优势科技有限公司 | Transaction data acquisition method and apparatus |
WO2018050024A1 (en) * | 2016-09-19 | 2018-03-22 | 中国银联股份有限公司 | Resource file processing system and method based on blockchain structure |
CN106790513A (en) * | 2016-12-19 | 2017-05-31 | 杜伯仁 | The method that network share service is realized based on block chain |
CN107423333A (en) * | 2017-04-21 | 2017-12-01 | 博大莱哲科技(北京)有限公司 | A kind of real name identification method and device |
CN107257341A (en) * | 2017-06-21 | 2017-10-17 | 济南浪潮高新科技投资发展有限公司 | A kind of student status based on block chain reviews authentication method |
CN107623572A (en) * | 2017-09-27 | 2018-01-23 | 济南浪潮高新科技投资发展有限公司 | A kind of method of digital certificate granting on block chain |
Non-Patent Citations (1)
Title |
---|
肖旻: "区块链技术在金融业KYC监管中的应用", 《上海立信会计金融学院学报》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109559123A (en) * | 2018-12-10 | 2019-04-02 | 大科数据(深圳)有限公司 | A kind of point-to-point network processing method of mixed type |
CN109493059A (en) * | 2018-12-24 | 2019-03-19 | 深圳市元智汇科技有限公司 | A kind of marketing strategy based on block chain determines method and system |
CN109961287A (en) * | 2019-02-12 | 2019-07-02 | 众安信息技术服务有限公司 | A kind of monitoring and managing method and supervisory systems of block chain |
CN110084596A (en) * | 2019-04-01 | 2019-08-02 | 杜晓楠 | A kind of method and apparatus of processing block chain mixing common recognition |
CN110084596B (en) * | 2019-04-01 | 2023-02-10 | 杜晓楠 | Method and device for processing block chain mixed consensus |
CN110034917A (en) * | 2019-04-11 | 2019-07-19 | 鸿秦(北京)科技有限公司 | A kind of alliance's chain data processing method and device based on homomorphic encryption algorithm |
CN110427772B (en) * | 2019-06-27 | 2021-04-13 | 布比(北京)网络技术有限公司 | Privacy protection electronic voting method and system based on block chain |
CN110427772A (en) * | 2019-06-27 | 2019-11-08 | 布比(北京)网络技术有限公司 | A kind of secret protection electronic voting method and system based on block chain |
CN110493080A (en) * | 2019-08-19 | 2019-11-22 | 腾讯科技(深圳)有限公司 | A kind of block chain node monitoring method, device and electronic equipment and storage medium |
CN110493080B (en) * | 2019-08-19 | 2021-12-14 | 腾讯科技(深圳)有限公司 | Block link point monitoring method and device, electronic equipment and storage medium |
CN110807844B (en) * | 2019-10-09 | 2020-09-22 | 国网上海市电力公司 | Power grid base tower inspection method based on block chain technology |
CN110807844A (en) * | 2019-10-09 | 2020-02-18 | 国网上海市电力公司 | Power grid base tower inspection method based on block chain technology |
CN111405005A (en) * | 2020-03-06 | 2020-07-10 | 清华大学 | Operation control method and system of block chain and controllable network terminal equipment |
CN112016114A (en) * | 2020-10-31 | 2020-12-01 | 腾讯科技(深圳)有限公司 | Intelligent contract generating method based on cryptocurrency, related equipment and storage medium |
CN113259131A (en) * | 2021-06-23 | 2021-08-13 | 北京笔新互联网科技有限公司 | Block chain node, system and block chain construction method |
Also Published As
Publication number | Publication date |
---|---|
CN108881428B (en) | 2020-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881428A (en) | A kind of block catenary system with oversight mechanism | |
Lamb | Blockchain and Smart Contracts: What the AEC sector needs to know | |
Kremenova et al. | Decentralized networks: The future internet | |
Silva et al. | Blockchain and industry 4.0: overview, convergence, and analysis | |
Ayvaz et al. | Witness of Things: Blockchain-based distributed decision record-keeping system for autonomous vehicles | |
Yang et al. | Blockchain for supply chain performance and logistics management | |
CN111681150A (en) | Hazardous chemical substance management method and device based on block chain and electronic equipment | |
Chen et al. | Research on the risk of block chain technology in Internet finance supported by wireless network | |
Rizwan et al. | An internet of things (IoT) based block chain technology to enhance the quality of supply chain management (SCM) | |
Oriekhoe et al. | BLOCKCHAIN TECHNOLOGY IN SUPPLY CHAIN MANAGEMENT: A COMPREHENSIVE REVIEW | |
Oriekhoe et al. | Ensuring global food safety: integrating blockchain technology into food supply chains | |
Zubko et al. | Determining the impact of digitalization on the economic security of trade | |
Tyagi et al. | The future of artificial intelligence in blockchain applications | |
Chatterjee et al. | Securing Financial Transactions: Exploring the Role of Federated Learning and Blockchain in Credit Card Fraud Detection | |
Singh et al. | Supply Chain Management Growth With the Adoption of Blockchain Technology (BoT) and Internet of Things (IoT) | |
Ravishankar et al. | Blockchain Applications that are Transforming the Society | |
Gaponenko et al. | Transformation of Risk Management in the Context of Digitalization of the Economy and Business | |
Surjandy et al. | A proposed supply chain model of blockchain technology-based in automotive component industry | |
Giusto et al. | Quantum pliers cutting the blockchain | |
Nirantar et al. | Blockchain based supply chain management | |
CN112561444A (en) | Military supply chain information consensus method based on block chain | |
Abdulrahman et al. | Blockchain and Distributed Ledger Technologies for IoT Security: A Survey paper | |
Li et al. | Research on risk management of digital currency based on blockchain technology in mobile commerce | |
Patel et al. | An exploration to blockchain-based deep learningframework | |
Kurniawan | Industrial Relations in the Digital Sharing Economy: A Critical Review of Labor Informalization and Social Partnership Relations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |