CN110119947A - Shared proof of work calculates the method and apparatus that power generates symbiosis block chain - Google Patents

Shared proof of work calculates the method and apparatus that power generates symbiosis block chain Download PDF

Info

Publication number
CN110119947A
CN110119947A CN201810124429.XA CN201810124429A CN110119947A CN 110119947 A CN110119947 A CN 110119947A CN 201810124429 A CN201810124429 A CN 201810124429A CN 110119947 A CN110119947 A CN 110119947A
Authority
CN
China
Prior art keywords
symbiosis
block
chain
data
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810124429.XA
Other languages
Chinese (zh)
Other versions
CN110119947B (en
Inventor
徐刚
孙嘉璐
胡淳一
田雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Win Win Network Technology Co Ltd
Original Assignee
Shanghai Win Win Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Win Win Network Technology Co Ltd filed Critical Shanghai Win Win Network Technology Co Ltd
Priority to CN201810124429.XA priority Critical patent/CN110119947B/en
Publication of CN110119947A publication Critical patent/CN110119947A/en
Application granted granted Critical
Publication of CN110119947B publication Critical patent/CN110119947B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

This application provides a kind of shared proof of work to calculate the method and apparatus that power generates symbiosis block chain, fundamental chain mine pond can also be from the identity for getting the symbiosis block chain in the program, and the corresponding logical location information of every symbiosis block chain is determined according to the identity, wherein, the logical location information is used to determine the logical place of the newest block of every symbiosis block chain during generating the root data summarization of all symbiosis block chains.Since the logical place of the newest block of every symbiosis block chain can uniquely determine, fundamental chain mine pond writes back to testing data and can uniquely determine in a symbiosis block chain, avoids fundamental chain mine pond malice the problem of hanging more.

Description

Shared proof of work calculates the method and apparatus that power generates symbiosis block chain
Technical field
Power, which is calculated, this application involves information technology field more particularly to a kind of shared proof of work generates symbiosis block chain Method and apparatus.
Background technique
Block chain is the distributed data base system participated in by node, and its feature can not distort written block chain Data.It is a key concept of bit coin, and the copy of full bit coin block chain has recorded the every of its token (token) One transaction.By these information, we can find each address, the value that any point is possessed in history.
Proof of work (proof-of-work) mechanism based on bit coin block chain, the node for digging mine always all will most Long chain is considered as correct chain, and continues working and extend it.If there are two the new block that node broadcasts different editions simultaneously, that Successive difference will be present on the time for receiving the block in other nodes.When this situation, they will be in the area for taking the lead in receiving It works on the basis of block, but can also retain an other chain, become most long-chain to prevent the latter.Deadlock (tie's) breaks, and Until next proof of work is found, and it is longer one that a chain therein, which is proved to be, then at another point The node to work on branch will convert camp, start to work on longer chain.
Since the proof of work mechanism of bit coin block chain can waste a large amount of calculation power, and the capacity of each block has Limit, and the velocity-stabilization that block generates, therefore can not utilize in bit coin block chain and store mass data.To solve above-mentioned ask Topic can calculate power by the proof of work in shared existing mine pond in the prior art to generate Symbiotic Region block chain, pass through symbiosis block Block in chain records data, and block chain corresponding to existing mine pond is the fundamental chain of these symbiosis block chains.Due to altogether Block data content can be verified by fundamental chain in raw block chain, therefore it is also ensured that in data in symbiosis block chain Appearance can not distort.
Fig. 1 shows a kind of method that shared proof of work calculates power generation symbiosis block chain, and this method includes as follows Step:
Step S101, symbiosis chain node can believe the abstract for needing to be written the data content in the newest block of symbiosis block chain Breath is supplied to fundamental chain mine pond;
The abstract letter of the data content in the newest block of symbiosis block chain can be written in step S102, fundamental chain mine pond as needed Breath calculates the root data summarization of all symbiosis block chains, and is included in proof of work calculating, calculates proof of work number According to;
Step S103, if the difficulty of the proof of work data fit part symbiosis block chain, can be supplied to symbiosis Chain node for creating the newest block of corresponding symbiosis block chain, while can also provide so that the summary info can be by institute State radical testing data and make described data summarization can be by all in the buffer area of fundamental chain mine pond according to Digest Authentication That holds data verification tests data.
Step S104, symbiosis chain node create corresponding symbiosis block chain most after obtaining proof of work data New block, so that including the proof of work data in the newest block of these symbiosis block chains and described testing data etc. Information for being verified using fundamental chain to symbiosis block chain.
But in actual scene, the proof of work in shared fundamental chain mine pond is likely to occur fundamental chain mine pond malice when calculating power more The problem of extension so that write back in a symbiosis block chain to test data not unique, thus will cause symbiosis block chain resource Waste.
Apply for content
The purpose of the application, which is to provide a kind of shared proof of work, to be calculated power and generates the method for symbiosis block chain and set It is standby.
To achieve the above object, this application provides a kind of shared proof of work to calculate the side that power generates symbiosis block chain Method, this method comprises:
Fundamental chain mine pond obtains plucking for the data content in the newest block for needing to be written symbiosis block chain from symbiosis chain node Want information, generate the root data summarization of all symbiosis block chains according to the summary info, and based on described data summarization into Row proof of work calculates, to obtain proof of work data;
Fundamental chain mine pond provides the proof of work that can be used for creating the newest block of symbiosis block chain to symbiosis chain node Data make the summary info can be by the radical testing data and make described data summarization can according to Digest Authentication Data are tested by all the elements data verification in the buffer area of fundamental chain mine pond, so that the Symbiotic Region of symbiosis chain node creation Include: the proof of work data in the newest block of block chain and described tests data;It is characterized in that, the method is also wrapped It includes:
Fundamental chain mine pond obtains the identity of the symbiosis block chain from symbiosis chain node, and true according to the identity The fixed corresponding logical location information of every symbiosis block chain, wherein the logical location information is used to generate all Symbiotic Regions During the root data summarization of block chain, the logical place of the newest block of every symbiosis block chain, the logical bit are determined Set to make the summary info can by the radical according to Digest Authentication to test data related.
Further, fundamental chain mine pond generates the root data summarization of all symbiosis block chains according to the summary info, comprising:
Fundamental chain mine pond is according to the summary info, in a manner of Merkel tree, generates the radical evidence of all symbiosis block chains Abstract, wherein the logical location information is used for during generating the root data summarization of all symbiosis block chains, is determined every The newest block of symbiosis block chain corresponds to the logical place of Merkel's leaf nodes.
Further, the identity of the symbiosis block chain uses array [N1,N2,…Ni] data structure indicate, i For the integer greater than 1;
It is described when the newest block for determining every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes The node element of Merkel tree corresponds to the array element of the symbiosis block chain identity, and meets following rule:
N in the identity of every symbiosis block chainkIdentity mark of the corresponding node element as this symbiosis block chain N in knowledgek-1The child node of corresponding node element;
N in the identity of any two symbiosis block chainkWhen different, formed with Nk-1Corresponding node element is made For the bifurcated of father node, NkCorresponding node element is two child nodes in the bifurcated;
N in the identity of a plurality of symbiosis block chainkWhen identical, identical N is sharedkCorresponding node element.
Present invention also provides a kind of shared proof of work to calculate the method that power generates symbiosis block chain, this method comprises:
Symbiosis chain node provides plucking for the data content in the newest block for needing to be written symbiosis block chain to fundamental chain mine pond Information is wanted, so that fundamental chain mine pond generates the root data summarization of all symbiosis block chains according to the summary info, and is based on Described data summarization carries out proof of work calculating;
Symbiosis chain node obtains the workload that can be used for creating the newest block of symbiosis block chain from fundamental chain mine pond It proves data, make the summary info can be by the radical testing data and make the radical according to plucking according to Digest Authentication It wants that data can be tested by all the elements data verification in the buffer area of fundamental chain mine pond, and creates the newest of the symbiosis block chain Block, wherein include: the proof of work data in the newest block and described test data;It is characterized in that, described Method further include:
Symbiosis chain node provides the identity of the symbiosis block chain to fundamental chain mine pond, so that fundamental chain mine pond The corresponding logical location information of every symbiosis block chain is determined according to the identity, wherein the logical location information is used During generating the root data summarization of all symbiosis block chains, patrolling for the newest block of every symbiosis block chain is determined Volume position, the logical place to make the summary info can by the radical according to Digest Authentication to test data related.
Another aspect based on the application additionally provides a kind of mother of shared proof of work calculation power generation symbiosis block chain Chain mine pond, the fundamental chain mine pond include:
Data transmit-receive module, for obtaining the data in the newest block for needing to be written symbiosis block chain from symbiosis chain node The identity of the summary info of content and the symbiosis block chain, the offer of Xiang Gongsheng chain node can be used for creating the Symbiotic Region The proof of work data of the newest block of block chain make the summary info that can test data according to Digest Authentication by the radical And make described data summarization that can test data by all the elements data verification in the buffer area of fundamental chain mine pond, so that institute It states and includes: the proof of work data in the newest block of the symbiosis block chain of symbiosis chain node creation and described test number According to;
Data processing module, for generating the root data summarization of all symbiosis block chains, and base according to the summary info Proof of work calculating is carried out in described data summarization, to obtain proof of work data, and according to the identity Determine the corresponding logical location information of every symbiosis block chain, wherein the logical location information is used to generate all symbiosis During the root data summarization of block chain, the logical place of the newest block of every symbiosis block chain, the logic are determined Position to make the summary info can by the radical according to Digest Authentication to test data related.
Further, the data processing module, in a manner of Merkel tree, generating according to the summary info The root data summarization of all symbiosis block chains, wherein the logical location information is used in the root for generating all symbiosis block chains During data summarization, determine that the newest block of every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes.
Further, the identity of the symbiosis block chain uses array [N1,N2,…Ni] data structure indicate, i For the integer greater than 1;
It is described when the newest block for determining every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes The node element of Merkel tree corresponds to the array element of the symbiosis block chain identity, and meets following rule:
N in the identity of every symbiosis block chainkIdentity mark of the corresponding node element as this symbiosis block chain N in knowledgek-1The child node of corresponding node element;
N in the identity of any two symbiosis block chainkWhen different, formed with Nk-1Corresponding node element is made For the bifurcated of father node, NkCorresponding node element is two child nodes in the bifurcated;
N in the identity of a plurality of symbiosis block chainkWhen identical, identical N is sharedkCorresponding node element.
Present invention also provides a kind of shared proof of work to calculate the symbiosis chain node that power generates symbiosis block chain, the symbiosis Chain node includes:
Data transmit-receive module, for being provided to fundamental chain mine pond in the data in the newest block for needing to be written symbiosis block chain The summary info of appearance, so that fundamental chain mine pond generates the root data summarization of all symbiosis block chains according to the summary info, And proof of work calculating is carried out based on described data summarization, Xiang Suoshu fundamental chain mine pond provides the identity of the symbiosis block chain Mark, so that fundamental chain mine pond determines the corresponding logical location information of every symbiosis block chain according to the identity, In, the logical location information is used to determine every symbiosis during generating the root data summarization of all symbiosis block chains The logical place of the newest block of block chain, the logical place and makes the summary info can be by described data summarization Data correlation is tested in verifying, and the work that can be used for creating the newest block of symbiosis block chain is obtained from fundamental chain mine pond Work amount proves data, makes the summary info can be by the radical testing data and make the radical according to Digest Authentication Data can be tested by all the elements data verification in the buffer area of fundamental chain mine pond according to abstract;
Data processing module, for creating the newest block of the symbiosis block chain, wherein wrapped in the newest block It includes: the proof of work data and described testing data.
In addition, present invention also provides a kind of shared proof of work to calculate the fundamental chain mine pond that power generates symbiosis block chain, it should Fundamental chain mine pond includes:
Processor;And
One or more machine readable medias of machine readable instructions are stored with, when the processor execution machine can When reading instruction, so that the equipment executes shared proof of work and calculates the method that power generates symbiosis block chain.
Present invention also provides a kind of shared proof of work to calculate the symbiosis chain node that power generates symbiosis block chain, the symbiosis Chain node includes:
Processor;And
One or more machine readable medias of machine readable instructions are stored with, when the processor execution machine can When reading instruction, so that the equipment executes shared proof of work and calculates the method that power generates symbiosis block chain.
This application provides scheme in, fundamental chain mine pond needs to be written in the newest block of symbiosis block chain getting After the summary info of data content, the root data summarization of all symbiosis block chains can be generated according to the summary info, and Proof of work calculating is carried out based on described data summarization, to obtain proof of work data, and then is mentioned to symbiosis chain node For can be used for creating the proof of work data of the newest block of symbiosis block chain and make described data summarization can quilt Data are tested in all the elements data verification in the buffer area of fundamental chain mine pond, so that the symbiosis block of symbiosis chain node creation The newest block of chain, in above process, fundamental chain mine pond can also from the identity for getting the symbiosis block chain, and according to The identity determines the corresponding logical location information of every symbiosis block chain, wherein the logical location information is used for During the root data summarization for generating all symbiosis block chains, the logical bit of the newest block of every symbiosis block chain is determined It sets.Since the logical place of the newest block of every symbiosis block chain can uniquely determine, fundamental chain mine pond writes back to one Testing data and can uniquely determine in a symbiosis block chain avoids fundamental chain mine pond malice the problem of hanging more.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the process flow diagram of a kind of method of existing shared proof of work calculation power generation symbiosis block chain;
Fig. 2 is to calculate the method that power generates symbiosis block chain for implementing shared proof of work provided by the embodiments of the present application A kind of system structural schematic diagram
Fig. 3 is the schematic diagram for the content for including in bit coin block chain;
Fig. 4 is the process flow diagram shared when proof of work calculates power generation symbiosis block chain in the embodiment of the present application;
Fig. 5 and Fig. 6 plucks for the data content in a manner of Merkel tree by needing to be written the newest block of symbiosis block chain Schematic diagram when information being wanted to generate the root data summarization of all symbiosis block chains;
Fig. 7 (a) is to indicate that the logical place of symbiosis block chain is silent determined by identity-based mark in the embodiment of the present application The schematic diagram of Ke Er tree;
Fig. 7 (b) is to indicate that the logical place of symbiosis block chain is silent determined by identity-based mark in the embodiment of the present application Another schematic diagram of Ke Er tree;
Fig. 8 is the data in the embodiment of the present application in symbiosis block chain and the relationship between fundamental chain;
Fig. 9 is that a kind of shared proof of work provided by the embodiments of the present application calculates the knot that power generates the equipment of symbiosis block chain Structure schematic diagram;
Figure 10 is that another shared proof of work provided by the embodiments of the present application calculates the equipment that power generates symbiosis block chain Structural schematic diagram;
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
The application is described in further detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network include one or more processors (CPU), image processing unit (GPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media, can be by any side Method or technology realize that information stores.Information can be the device or other numbers of computer readable instructions, data structure, program According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM (CD- ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storages Equipment or any other non-transmission medium, can be used for storage can be accessed by a computing device information.
The embodiment of the present application provides a kind of method that shared proof of work calculates power generation symbiosis block chain, and this method can Symbiotic Region block chain is generated to calculate power by the proof of work for sharing fundamental chain mine pond, and can be by for each symbiosis block Chain sets identity, and every symbiosis block chain is determined using the identity during generating symbiosis block chain Newest block logical place, and then guarantee that the uniqueness of data can be tested, avoid fundamental chain mine pond malice the problem of hanging more.
Fig. 2 shows calculate a kind of system that power generates the method for symbiosis block chain for implementing above-mentioned shared proof of work Structure, include fundamental chain mine pond 210 and symbiosis chain node 220.Wherein, fundamental chain mine pond is that fundamental chain provides the mine pond for calculating power, Power is calculated required for block for providing to create on the maintained one or more of block chains of this programme, can be used any one Existing and by widely known block chain the mine pond of kind, such as the mine pond of bit coin block chain.The symbiosis chain node can be with The calculated proof of work data of miner in fundamental chain mine pond are obtained by access fundamental chain mine pond with fundamental chain mine Chi Tongxin, thus The calculation power in shared fundamental chain mine pond, to create the block on symbiosis block chain.
In actual scene, the fundamental chain mine pond and specific implementation of symbiosis chain node can be user equipment, network is set Standby or user equipment and the network equipment are integrated constituted equipment by network, or are also possible to run on above equipment Application program.The user equipment includes but is not limited to all kinds of terminal devices such as computer;The network equipment includes but unlimited It is realized in such as network host, single network server, multiple network server collection or set of computers based on cloud computing.? This, cloud is made of a large amount of hosts or network server for being based on cloud computing (Cloud Computing), wherein cloud computing is point One kind that cloth calculates, a virtual machine consisting of a loosely coupled set of computers.
Fig. 3 shows the schematic diagram for the content for including in bit coin block chain, and each block includes a block head (block header) may include following information in block head:
Version, version number;
Prev hash, i.e., the cryptographic Hash that the content based on previous block on the block chain generates;
Timestamp, the time which generates;
Nonce, random number, for realizing the mechanism of proof of work;
Difficulty, target difficulty, the difficulty met required for the block proof of work;
Merkle Root, root Hash, the corresponding Mei Keer tree of the content-data which includes (Merkle Tree) The cryptographic Hash of root.
In addition, each block also includes content data part, can be used in each data block Tx in the content data part It can be recorded in these data blocks in storing data, such as the Transaction Information of the corresponding currency of block chain etc..Bit at present Writable data capacity is very limited in coin block chain, and this strongly limits the block chain answering in terms of depositing card data With.A Merkle Root is ultimately generated in these data blocks by way of Merkle Tree, for verifying each data The correctness of content in block.
The block chain of new block generation is carried out based on proof of work mechanism (PoW), basic step is as follows: node is monitored complete Network data record, the data record by basic legitimate verification will be kept in;Node consume itself calculate power attempt it is different Random number carries out specified Hash calculation, and constantly repeats the process until finding reasonable random number;It finds reasonable random After number, new district block message, first input area build information are generated, then input data records information;Then overseas broadcast newly produces Raw block after other node verifications pass through, is connected in block chain, and main chain height adds one, and then all nodes switch to newly Continue proof of work behind block and block generates.Verifying node needs constantly consumption to calculate power work, carries out Hash meter It calculates, to find desired random number.By taking above-mentioned bit coin block chain as an example, the whole fortune of block chain is safeguarded by PoW mechanism Capable and safety.Node is prevented fraudulent trading, kept away by random hash operations to fight for the book keeping operation power of bit coin block chain Exempt from " dual payment ", this process needs to consume electric power, calculates power to complete.Therefore, verifying node is also referred to as " miner ", at random Number calculates search procedure and is known as " digging mine ".
Fig. 4, which is shown, shares fundamental chain mine pond 210 when proof of work calculates power generation symbiosis block chain in the embodiment of the present application With the process flow of symbiosis chain node 220, including following processing step:
Step S401, symbiosis chain node can believe the abstract for needing to be written the data content in the newest block of symbiosis block chain Breath is supplied to fundamental chain mine pond.Since symbiosis block chain needs to be verified based on fundamental chain, the data content in block need with The content of block is related in fundamental chain, it is possible thereby to which the derived life of data content in the newest block of symbiosis block chain will be needed to be written At root data summarization, be included in fundamental chain proof of work calculate in.And in needing to be written the newest block of symbiosis block chain It, can be internal in order to avoid data are excessive and ensure to verify during the derivative generation root data summarization of data content Hold data and carry out hash calculating, generates summary info and be available to mine pond later.
Symbiosis chain node can also carry the identity mark of symbiosis block chain when sending the summary info of data content simultaneously Know, which is determined for the corresponding logical location information of every symbiosis block chain, so that it is guaranteed that all generating During the root data summarization of symbiosis block chain, the logical place of the newest block of every symbiosis block chain is uniquely determined.
The abstract letter of the data content in the newest block of symbiosis block chain can be written in step S402, fundamental chain mine pond as needed Breath calculates the root data summarization of all symbiosis block chains, and is included in proof of work calculating, calculates proof of work number According to.Since symbiosis block chain generally has multiple, the data of the possible write-in in need of each symbiosis block chain, therefore fundamental chain mine The summary info of corresponding multiple symbiosis block chains is had in pond, hash calculating can be carried out to these summary infos, to calculate The root data summarization of all symbiosis block chains.
In actual scene, hash is carried out to content-data and calculates acquisition summary info and to summary info progress hash It, can be by the way of Merkel tree (merkle tree), in order to verify and calculate when calculating acquisition root data summarization.
For fundamental chain, the root data summarization of all symbiosis block chains is also as the newest block for needing to be written fundamental chain Middle a part of data content, thus fundamental chain mine pond can continuously attempt to random number N once when amount of calculation proves data, and In conjunction with the data content comprising all symbiosis block chain root data summarizations Merkle Root and such as prev hash, The information such as version number, timestamp, difficulty carry out hash calculating, so that the result that hash is calculated meets Fundamental chain target difficulty.In this process, can consider can be with for the corresponding information of block head (block header) of either block Measure the proof that the mine machine participates in fundamental chain work, i.e. proof of work data.Certainly, bit coin block chain is utilized in this application Block head be only a kind of citing that can be used as proof of work data, can arbitrarily be used to measure the mine in actual scene Machine participates in the proof information of fundamental chain work, can be used as a kind of feasible proof of work data.
Step S403, if the difficulty of the proof of work data fit part symbiosis block chain, fundamental chain mine pond can mention Symbiosis chain node is supplied, data can be tested for creating the newest block of corresponding symbiosis block chain, while can also provide.Wherein, The data of testing include so that the summary info can be by the radical testing data and make institute according to Digest Authentication Data can be tested by all the elements data verification in the buffer area of fundamental chain mine pond by stating root data summarization.
Step S404, symbiosis chain node create corresponding symbiosis block chain most after obtaining proof of work data New block, so that including the proof of work data in the newest block of these symbiosis block chains and described testing data etc. Information for being verified using fundamental chain to symbiosis block chain.
Can be related to the root data summarization of all symbiosis block chains in generating process since data can be tested, if with number of making a summary According to that can not uniquely determine, then described to test data and can not also uniquely determine, the malice that thus not can avoid fundamental chain mine pond is hung more.And In the scheme of the embodiment of the present application, due to data content of the fundamental chain mine pond in the write-in newest block of symbiosis block chain as needed Summary info calculate the radicals of all symbiosis block chains according in digest procedure, fundamental chain mine pond can be according to the identity It determines the corresponding logical location information of every symbiosis block chain, and then every symbiosis block chain is uniquely determined by logical location information Newest block logical place, due to logical place and making the summary info can be by the radical according to Digest Authentication Data correlation can be tested, the unique of data can be tested by thereby ensuring that, to effectively prevent fundamental chain mine pond malice the problem of hanging more.
In a kind of embodiment of the application, if generating the root data summarization of all symbiosis block chains according to the summary info When, in a manner of Merkel tree, the root data summarization of all symbiosis block chains is generated by summary info, then every symbiosis block chain The data content of newest block can correspond to Merkel's leaf nodes, i.e. logical location information is used to generate all Symbiotic Regions During the root data summarization of block chain, the newest block for uniquely determining every symbiosis block chain corresponds to Merkel's leaf nodes Logical place.In the embodiment of the present application, the node element of Merkel tree refers to the data element on Merkel tree, according to not With positional relationship of the node element in Merkel tree, leaf node, root node, father node, child node etc. can be, be different from altogether The concept of raw chain node.
Based on the mode of Merkel tree, so that described data summarization can be by all the elements number in the buffer area of fundamental chain mine pond Testing data and can include at least the corresponding summary info of each symbiosis block chain when generating root data summarization according to verifying Prove information.Wherein, the summary info is that the data content of the newest block based on current time a certain symbiosis block chain obtains It arrives, is denoted as mm hash.Such as the cryptographic Hash of the data content of the newest block of current time a certain symbiosis block chain is MR, Determining can directly use the MR as mm hash when summary info, MR can also be carried out Hash and calculate to obtain mm hash, Or after can also combining the derivative data of block previous on this block chain and MR, the common Hash that carries out calculates to obtain mm hash.At this point, proof information of the corresponding summary info of each symbiosis block chain when generating root data summarization can be with Symbiotic Region The corresponding summary info of block chain is generating radical according to mb (merkle branch, the branch's letter of Merkel tree in digest procedure Breath).Similar, so that the summary info can test data according to Digest Authentication by the radical, it is also possible to each symbiosis The summary info of the data content of the newest block of block chain is generating radical according to the merkle branch in digest procedure.
Fig. 5 shows the abstract in a manner of Merkel tree by needing to be written the data content of the newest block of symbiosis block chain Information generates the schematic diagram when root data summarization of all symbiosis block chains.Assuming that one shares 8 symbiosis block chains, it is corresponding The data content of newest block is respectively data1~8, and the summary info of these data contents can be calculated by hash to be obtained, Hash1~8 mm are denoted as, when generating root data summarization mr by the way of Merkel tree, mm hash1~8 makees in fundamental chain mine pond It can be as shown in Figure 5 for the logical place of Merkel's leaf nodes.At this point, for symbiosis block chain 1 (corresponding to mm hash1), Its corresponding proof information can be [mm hash2, hash34, hash5678].But in actual scene, if fundamental chain mine pond When generating root data summarization mr, the logical place of hash1~8 mm is had changed, such as shown in fig. 6, exchange compared to Fig. 5 The position of mm hash1 and mm hash2, then calculating the root data summarization mr generated by hash will be different, and corresponding Proof information can also change as [mm hash6, hash78, hash5234].Thus it will lead to and return to symbiosis block chain 1 It is not unique data can be tested.
And in scheme provided by the embodiments of the present application, it, should be by body due to joined the identity of each symbiosis block chain Part, which identifies identified logical location information, can be used in during generating the root data summarization of all symbiosis block chains, only One determines that the newest block of every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes, thereby ensures that fundamental chain mine Pond is during generating root data summarization mr, can not changing it in Merkel tree according to hash1~8 summary info mm Logical place, therefore hash1~8 mm can only leaf node according to logical place as shown in Figure 5 as Merkel tree, protect Having demonstrate,proved proof information will not change, and can only be [mm hash2, hash34, hash5678].
In some scenes, since the identity of symbiosis block chain is not determined and managed by fundamental chain mine pond, if directly It connects and is possible to collide as the identity of each symbiosis block chain using number ID, lead to symbiosis block chain logical place Obscure.As a result, in embodiments herein, the identity of symbiosis block chain uses array [N1,N2,…Ni] data knot Structure indicates that i is integer greater than 1, i.e., indicates identity using Multidimensional numerical by the way of, is just saying in this present embodiment Bright, each element in array is indicated with the positive integer for being 10 systems.
Based on the identity of above-mentioned form, correspond to Merkel tree in the newest block for determining every symbiosis block chain When the logical place of leaf node, the node element of the Merkel tree corresponds to the array member of the symbiosis block chain identity Element, and meet following rule: 1, in the identity of every symbiosis block chain NkCorresponding node element is as this Symbiotic Region N in the identity of block chaink-1The child node of corresponding node element;2, when in the identity of any two symbiosis block chain NkWhen different, formed with Nk-1Bifurcated of the corresponding node element as father node, NkCorresponding node element is in the bifurcated Two child nodes;3, as the N in the identity of a plurality of symbiosis block chainkWhen identical, identical N is sharedkCorresponding node.
For example, the identity difference of 8 symbiosis block chains is as follows:
Symbiosis block chain Identity
Chain1 [1,1,1,1]
Chain2 [1,1,1,2]
Chain3 [1,1,1,3]
Chain4 [1,2,2,1]
Chain5 [1,2,2,2]
Chain6 [1,2,3,1]
Chain7 [1,3,1,1]
Chain8 [1,3,2,4]
Based on above-mentioned rule, the Merkel tree as shown in Fig. 7 (a), the first identity of these symbiosis block chains can be formed First element of mark is 1, then corresponds to the node element 1a of first layer.Chain1, chain4, chain7 identity Second element be respectively 1,2,3, form bifurcated using node element 1a as father node, the child node in the bifurcated is distinguished For node element 2a, 2b and 2c corresponding to second element 1,2,3, and the of chain1, chain2, chain3 identity Two elements equal 1, second element for sharing node element 2a, chain4, chain5, chain6 identity of the second layer are equal 2, second element equal 3 of node element 2b, chain7, chain8 identity of the second layer is shared, the member of the second layer is shared Plain node 2c.And so on, it can determine the 4th layer of leaf node, and the 4th layer of 8 leaf nodes correspond to this 8 articles of Symbiotic Regions The newest block of block chain.The newest block that every symbiosis block chain can be uniquely determined through the above way corresponds to Merkel The logical place of leaf nodes, simultaneously because identity use array form, can be convenient in a manner of Merkel tree by Layer generates root data summarization, improves the computational efficiency of root data summarization, and is less prone to the case where identity is collided.
In leaf node corresponding based on the determining chain1~chain8 of above-mentioned rule, due to the body according to symbiosis block chain The array element of part mark successively determines, for chain6, chain7 and chain8 due on its corresponding Merkel tree Node element after third layer and not formed bifurcated, therefore can distinguish when calculating to third layer chain6, chain7 and chain8.In order to reduce calculation amount, for such situation, the 4th array being based further in its identity may not need Member usually determines its logical place, it is only necessary to building Merkel tree as shown in Fig. 7 (b), the leaf node of the Merkel tree Correspond to the logical place of chain1~chain8.
Meanwhile aforesaid way is also convenient for accessing and directly use the digital scene as identity, such as externally can be with First element of array is considered as a block chain as identity, and can internally safeguard that a data successively search distribution Rule, according to rule determine every symbiosis block chain data.When Fig. 8 is shown using aforesaid way, in symbiosis block chain Data and fundamental chain between relationship.
It, can be using any for distinguishing when identity-based identification information determines logical location information in actual scene The function of position indicates logical location information by the value of function, to determine logical place.The value of the function can be with identity Identify array element in array, random number and Merkel tree it is highly relevant, such as following function can be used:
f(Nk, Nonce, h) and={ [(N × 1103515245+12345)+Ni] × 1103515245+12345 } mod (2h),
Wherein, NkIndicate that k-th of element in array, Nonce indicate a random number, h indicates the height of Merkel tree.By This, each symbiosis block chain can indicate its logical place using a value, convenient for calculating and handling.
Based on the same inventive concept, shared proof of work is additionally provided in the embodiment of the present application calculates power generation symbiosis block The equipment of chain, the corresponding method of the equipment are the methods in previous embodiment, and its principle and this method for solving the problems, such as Similar, details are not described herein again.
Fig. 9, which shows one kind provided by the embodiments of the present application, can be realized shared proof of work calculation power generation symbiosis block The equipment 900 of chain, the equipment include include data transmit-receive module 910 and data processing module 920, can be used as in this programme Fundamental chain mine pond and symbiosis chain node.Its specific implementation can be user equipment, the network equipment or user equipment and the network equipment It is integrated constituted equipment by network, or is also possible to run on the application program of above equipment.The user equipment The including but not limited to all kinds of terminal devices such as computer;The network equipment includes but is not limited to such as network host, single network Server, multiple network server collection or set of computers based on cloud computing etc. are realized.Here, cloud is by being based on cloud computing A large amount of hosts or network server of (Cloud Computing) are constituted, wherein and cloud computing is one kind of distributed computing, by One virtual machine of the computer set composition of a group loose couplings.
When the equipment 900 is as fundamental chain mine pond, data transmit-receive module 910, which is used to obtain from symbiosis chain node, to be needed to be written altogether The identity of the summary info and the symbiosis block chain of data content in the newest block of raw block chain, Xiang Gongsheng chain link Point provides the proof of work data that can be used for creating the newest block of symbiosis block chain and makes described data summarization Data can be tested by all the elements data verification in the buffer area of fundamental chain mine pond, so that the symbiosis of symbiosis chain node creation Include: the proof of work data in the newest block of block chain and described tests data.
Data processing module 920 is used to generate the root data summarization of all symbiosis block chains according to the summary info, and Proof of work calculating is carried out based on described data summarization, to obtain proof of work data, and according to the identity mark Know and determine the corresponding logical location information of every symbiosis block chain, wherein the logical location information is used for all total in generation During the root data summarization of raw block chain, the logical place of the newest block of every symbiosis block chain is determined, it is described to patrol Volume position to make the summary info can by the radical according to Digest Authentication to test data related.
Further, the data processing module 920 can be raw according to the summary info, in a manner of Merkel tree At the root data summarization of all symbiosis block chains, wherein the logical location information is used to generate all symbiosis block chains During root data summarization, determine that the newest block of every symbiosis block chain corresponds to the logical bit of Merkel's leaf nodes It sets.
The identity of the symbiosis block chain uses array [N1,N2,…Ni] data structure indicate, i be greater than 1 Integer;
It is described when the newest block for determining every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes The node element of Merkel tree corresponds to the array element of the symbiosis block chain identity, and meets following rule:
N in the identity of every symbiosis block chainkIdentity mark of the corresponding node element as this symbiosis block chain N in knowledgek-1The child node of corresponding node element;
N in the identity of any two symbiosis block chainkWhen different, formed with Nk-1Corresponding node element is made For the bifurcated of father node, NkCorresponding node element is two child nodes in the bifurcated;
N in the identity of a plurality of symbiosis block chainkWhen identical, identical N is sharedkCorresponding node element.
When the equipment 900 is as symbiosis chain node, data transmit-receive module 910, which is used to provide to fundamental chain mine pond, to be needed to be written The summary info of data content in the newest block of symbiosis block chain, so that fundamental chain mine pond is raw according to the summary info Proof of work calculating is carried out at the root data summarization of all symbiosis block chains, and based on described data summarization, to the mother Chain mine pond provides the identity of the symbiosis block chain, so that fundamental chain mine pond determines that every is total to according to the identity The corresponding logical location information of life block chain, wherein the logical location information is used in the root for generating all symbiosis block chains During data summarization, determine the logical place of the newest block of every symbiosis block chain, the logical place with make The summary info can test data correlation according to Digest Authentication by the radical;And it obtains and can be used for from fundamental chain mine pond It creates the proof of work data of the newest block of symbiosis block chain and makes described data summarization can be by fundamental chain mine pond Data are tested in all the elements data verification in buffer area;
Data processing module 920 is used to create the newest block of the symbiosis block chain, wherein wraps in the newest block It includes: the proof of work data and described testing data.
In conclusion fundamental chain mine pond can also be from the identity for getting the symbiosis block chain in the scheme of the embodiment of the present application Mark, and the corresponding logical location information of every symbiosis block chain is determined according to the identity, wherein the logical place Information is used to determine every new district symbiosis block Lian during generating the root data summarization of all symbiosis block chains The logical place of block.Since the logical place of the newest block of every symbiosis block chain can uniquely determine, fundamental chain mine Pond writes back to testing data and can uniquely determine in a symbiosis block chain, avoids fundamental chain mine pond malice the problem of hanging more.
In addition, using the identity of array form, the logical place of the leaf node corresponding to Merkel tree, by upper The newest block that the mode of stating can uniquely determine every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes, together When due to identity use array form, can be convenient and successively generate root data summarization in a manner of Merkel tree, raising The computational efficiency of root data summarization, and the case where be less prone to identity collision.
In addition, a part of the application can be applied to computer program product, such as computer program instructions, when its quilt When computer executes, by the operation of the computer, it can call or provide according to the present processes and/or technical solution. And the program instruction of the present processes is called, it is possibly stored in fixed or moveable recording medium, and/or pass through Broadcast or the data flow in other signal-bearing mediums and transmitted, and/or be stored according to program instruction run calculating In the working storage of machine equipment.Here, including an equipment as shown in Figure 10 according to one embodiment of the application, this sets Standby includes being stored with one or more machine readable medias 1010 of machine readable instructions and for executing machine readable instructions Processor 1020, wherein when the machine readable instructions are executed by the processor, so that the equipment can be used as fundamental chain mine pond Or symbiosis chain node executes the method and/or technology scheme based on aforementioned multiple embodiments according to the application.
It should be noted that the application can be carried out in the assembly of software and/or software and hardware, for example, can adopt With specific integrated circuit (ASIC), general purpose computer or any other realized similar to hardware device.In one embodiment In, the software program of the application can be executed by processor to realize above step or function.Similarly, the software of the application Program (including relevant data structure) can be stored in computer readable recording medium, for example, RAM memory, magnetic or CD-ROM driver or floppy disc and similar devices.In addition, hardware can be used to realize in some steps or function of the application, for example, As the circuit cooperated with processor thereby executing each step or function.
It is obvious to a person skilled in the art that the application is not limited to the details of above-mentioned exemplary embodiment, Er Qie In the case where without departing substantially from spirit herein or essential characteristic, the application can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and scope of the present application is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the application.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.

Claims (10)

1. a kind of shared proof of work calculates the method that power generates symbiosis block chain, this method comprises:
Fundamental chain mine pond obtains the abstract letter of the data content in the newest block for needing to be written symbiosis block chain from symbiosis chain node Breath generates the root data summarization of all symbiosis block chains according to the summary info, and carries out work based on described data summarization Work amount proves to calculate, to obtain proof of work data;
Fundamental chain mine pond to symbiosis chain node provide can be used for creating the newest block of symbiosis block chain proof of work data, So that the summary info can be by the radical testing data and make described data summarization can be female according to Digest Authentication Data are tested in all the elements data verification in the buffer area of chain mine pond, so as to wrap in the newest block of the symbiosis block chain It includes: the proof of work data and described testing data;It is characterized in that, the method also includes:
Fundamental chain mine pond obtains the identity of the symbiosis block chain from symbiosis chain node, and is determined often according to the identity The corresponding logical location information of symbiosis block chain, wherein the logical location information is used to generate all symbiosis block chains Root data summarization during, determine the logical place of the newest block of every symbiosis block chain, the logical place with So that the summary info can test data correlation according to Digest Authentication by the radical.
2. according to the method described in claim 1, wherein, fundamental chain mine pond generates all symbiosis block chains according to the summary info Root data summarization, comprising:
Fundamental chain mine pond is according to the summary info, in a manner of Merkel tree, generates the root data summarization of all symbiosis block chains, Wherein, the logical location information is used for during generating the root data summarization of all symbiosis block chains, determines that every is total to The newest block of raw block chain corresponds to the logical place of Merkel's leaf nodes.
3. according to the method described in claim 2, wherein, the identity of the symbiosis block chain uses array [N1,N2,… Ni] data structure indicate that i is integer greater than 1;
When the newest block for determining every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes, the Merck The node element of your tree corresponds to the array element of the symbiosis block chain identity, and meets following rule:
N in the identity of every symbiosis block chainkIn identity of the corresponding node element as this symbiosis block chain Nk-1The child node of corresponding node element;
N in the identity of any two symbiosis block chainkWhen different, formed with Nk-1Corresponding node element is saved as father The bifurcated of point, NkCorresponding node element is two child nodes in the bifurcated;
N in the identity of a plurality of symbiosis block chainkWhen identical, identical N is sharedkCorresponding node element.
4. a kind of shared proof of work calculates the method that power generates symbiosis block chain, this method comprises:
Symbiosis chain node provides the abstract letter of the data content in the newest block for needing to be written symbiosis block chain to fundamental chain mine pond Breath, so that fundamental chain mine pond generates the root data summarization of all symbiosis block chains according to the summary info, and based on described Root data summarization carries out proof of work calculating;
Symbiosis chain node obtains the proof of work that can be used for creating the newest block of symbiosis block chain from fundamental chain mine pond Data make the summary info can be by the radical testing data and make described data summarization can according to Digest Authentication Data are tested by all the elements data verification in the buffer area of fundamental chain mine pond, and create the new district symbiosis block Lian Block, wherein include: the proof of work data in the newest block and described test data;It is characterized in that, the side Method further include:
Symbiosis chain node provides the identity of the symbiosis block chain to fundamental chain mine pond so that fundamental chain mine pond according to The identity determines the corresponding logical location information of every symbiosis block chain, wherein the logical location information is used for During the root data summarization for generating all symbiosis block chains, the logical bit of the newest block of every symbiosis block chain is determined Set, the logical place to make the summary info can by the radical according to Digest Authentication to test data related.
5. a kind of calculate the fundamental chain mine pond that power generates symbiosis block chain for sharing proof of work, which is characterized in that the fundamental chain mine Pond includes:
Data transmit-receive module, for obtaining the data content in the newest block for needing to be written symbiosis block chain from symbiosis chain node Summary info and the symbiosis block chain identity, Xiang Gongsheng chain node offer can be used for creating the symbiosis block chain The proof of work data of newest block, make the summary info can by the radical according to Digest Authentication test data and So that described data summarization can test data by all the elements data verification in the buffer area of fundamental chain mine pond, so that described total Include: the proof of work data in the newest block of the symbiosis block chain of raw chain node creation and described tests data;
Data processing module for generating the root data summarization of all symbiosis block chains according to the summary info, and is based on institute It states root data summarization and carries out proof of work calculating, to obtain proof of work data, and it is determining according to the identity The corresponding logical location information of every symbiosis block chain, wherein the logical location information is used to generate all symbiosis blocks During the root data summarization of chain, the logical place of the newest block of every symbiosis block chain, the logical place are determined To make the summary info can by the radical according to Digest Authentication to test data related.
6. fundamental chain mine according to claim 5 pond, wherein the data processing module is used for according to the summary info, In a manner of Merkel tree, the root data summarization of all symbiosis block chains is generated, wherein the logical location information is used in life During root data summarization at all symbiosis block chains, determine that the newest block of every symbiosis block chain corresponds to Merkel The logical place of leaf nodes.
7. fundamental chain mine according to claim 6 pond, wherein the identity of the symbiosis block chain uses array [N1, N2,…Ni] data structure indicate that i is integer greater than 1;
When the newest block for determining every symbiosis block chain corresponds to the logical place of Merkel's leaf nodes, the Merck The node element of your tree corresponds to the array element of the symbiosis block chain identity, and meets following rule:
N in the identity of every symbiosis block chainkIn identity of the corresponding node element as this symbiosis block chain Nk-1The child node of corresponding node element;
N in the identity of any two symbiosis block chainkWhen different, formed with Nk-1Corresponding node element is saved as father The bifurcated of point, NkCorresponding node element is two child nodes in the bifurcated;
N in the identity of a plurality of symbiosis block chainkWhen identical, identical N is sharedkCorresponding node element.
8. a kind of calculate the symbiosis chain node that power generates symbiosis block chain for sharing proof of work, which includes:
Data transmit-receive module, for providing the data content in the newest block for needing to be written symbiosis block chain to fundamental chain mine pond Summary info, so that fundamental chain mine pond generates the root data summarization of all symbiosis block chains, and base according to the summary info Proof of work calculating is carried out in described data summarization, Xiang Suoshu fundamental chain mine pond provides the identity mark of the symbiosis block chain Know, so that fundamental chain mine pond determines the corresponding logical location information of every symbiosis block chain according to the identity, wherein The logical location information is used to determine every symbiosis block during generating the root data summarization of all symbiosis block chains The logical place of the newest block of chain, and obtained from fundamental chain mine pond and can be used for creating the new district symbiosis block Lian The proof of work data of block make the summary info can be by the radical testing data and make institute according to Digest Authentication Data can be tested by all the elements data verification in the buffer area of fundamental chain mine pond by stating root data summarization;
Data processing module, for creating the newest block of the symbiosis block chain, wherein include: institute in the newest block State proof of work data and it is described test data, the logical place with make the summary info can be by the radical according to plucking That to be verified tests data correlation.
9. a kind of shared proof of work calculates the fundamental chain mine pond that power generates symbiosis block chain, which is characterized in that fundamental chain mine Chi Bao It includes:
Processor;And
One or more machine readable medias of machine readable instructions are stored with, when the processor executes the machine readable finger When enabling, so that the equipment executes method according to any one of claims 1 to 3.
10. a kind of shared proof of work calculates the symbiosis chain node that power generates symbiosis block chain, which is characterized in that the symbiosis chain link It puts and includes:
Processor;And
One or more machine readable medias of machine readable instructions are stored with, when the processor executes the machine readable finger When enabling, so that the equipment executes method as claimed in claim 4.
CN201810124429.XA 2018-02-07 2018-02-07 Method and apparatus for shared workload proof computing power generation of symbiotic blockchains Active CN110119947B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810124429.XA CN110119947B (en) 2018-02-07 2018-02-07 Method and apparatus for shared workload proof computing power generation of symbiotic blockchains

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810124429.XA CN110119947B (en) 2018-02-07 2018-02-07 Method and apparatus for shared workload proof computing power generation of symbiotic blockchains

Publications (2)

Publication Number Publication Date
CN110119947A true CN110119947A (en) 2019-08-13
CN110119947B CN110119947B (en) 2021-08-10

Family

ID=67519678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810124429.XA Active CN110119947B (en) 2018-02-07 2018-02-07 Method and apparatus for shared workload proof computing power generation of symbiotic blockchains

Country Status (1)

Country Link
CN (1) CN110119947B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339203A (en) * 2020-02-28 2020-06-26 北京金和网络股份有限公司 Block chain data acquisition method, device and system
TWI706346B (en) * 2019-10-31 2020-10-01 鴻海精密工業股份有限公司 Mining machine, storage medium, and method for limiting calculation power of mining machine
CN113206851A (en) * 2021-05-06 2021-08-03 杭州复杂美科技有限公司 Parallel chain consensus method, computer device, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107038639A (en) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 A kind of alliance's chain building method of compatible many Asset Type fast transactions
US20170316497A1 (en) * 2016-04-28 2017-11-02 Coinplug, Inc. Method for creating, registering, revoking authentication information and server using the same
CN107657438A (en) * 2017-09-18 2018-02-02 联动优势科技有限公司 A kind of block chain generation method, data verification method, node and system
CN107807951A (en) * 2017-09-18 2018-03-16 联动优势科技有限公司 A kind of block chain generation method, data verification method, node and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170316497A1 (en) * 2016-04-28 2017-11-02 Coinplug, Inc. Method for creating, registering, revoking authentication information and server using the same
CN107038639A (en) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 A kind of alliance's chain building method of compatible many Asset Type fast transactions
CN107657438A (en) * 2017-09-18 2018-02-02 联动优势科技有限公司 A kind of block chain generation method, data verification method, node and system
CN107807951A (en) * 2017-09-18 2018-03-16 联动优势科技有限公司 A kind of block chain generation method, data verification method, node and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
邵奇峰 等: ""区块链技术:架构及进展"", 《计算机学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI706346B (en) * 2019-10-31 2020-10-01 鴻海精密工業股份有限公司 Mining machine, storage medium, and method for limiting calculation power of mining machine
CN111339203A (en) * 2020-02-28 2020-06-26 北京金和网络股份有限公司 Block chain data acquisition method, device and system
CN111339203B (en) * 2020-02-28 2023-07-14 北京金和网络股份有限公司 Block chain data acquisition method, device and system
CN113206851A (en) * 2021-05-06 2021-08-03 杭州复杂美科技有限公司 Parallel chain consensus method, computer device, and storage medium

Also Published As

Publication number Publication date
CN110119947B (en) 2021-08-10

Similar Documents

Publication Publication Date Title
CN110493325B (en) Block chain state data synchronization method and device and electronic equipment
CN106897348B (en) Data storage method, data verification method, data source tracing method and equipment
US20180121909A1 (en) System and method to dynamically setup a private sub-blockchain based on agility of transaction processing
US20220051238A1 (en) Method and apparatus for verifying commodities in batches based on blockchain, and electronic device
Shavit et al. Elimination trees and the construction of pools and stacks
CN110119947A (en) Shared proof of work calculates the method and apparatus that power generates symbiosis block chain
US20200351074A1 (en) System for synchronizing a cryptographic key state through a blockchain
CN110473030B (en) Block chain-based electronic bill number claiming method and device and electronic equipment
CN110046523B (en) Intelligent contract checking method and device and electronic equipment
CN103164523A (en) Inspection method, device and system of data consistency inspection
WO2020220742A1 (en) Method and device for anchoring data on a block chain at a given time, and electronic device
CN108039190B (en) Test method and device
CN110020544A (en) The Hash information processing method and system of record are stored in the block of block chain
CN109669622A (en) A kind of file management method, document management apparatus, electronic equipment and storage medium
WO2020019792A1 (en) Block release method and apparatus, and electronic device
CN114780285A (en) Block chain data recovery method and device and electronic equipment
CN110505311A (en) A kind of across the chain exchange method of isomorphism block chain and system
CN110443612B (en) Block chain-based reimbursement expense segmentation method and device and electronic equipment
CN109829076A (en) A kind of method and apparatus generating block chain
CN105518612A (en) Write-in method and apparatus for monitoring data
CN114518981A (en) eMMC test method, device, readable storage medium and electronic equipment
CN112291321B (en) Service processing method, device and system
CN109460406A (en) A kind of data processing method and device
CN109325011A (en) Data storage, processing, sharing method and system based on block chain
US20160055211A1 (en) Apparatus and method for memory storage and analytic execution of time series data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant