CN110298657A - A kind of block chain common recognition method, relevant apparatus and system - Google Patents

A kind of block chain common recognition method, relevant apparatus and system Download PDF

Info

Publication number
CN110298657A
CN110298657A CN201810233990.1A CN201810233990A CN110298657A CN 110298657 A CN110298657 A CN 110298657A CN 201810233990 A CN201810233990 A CN 201810233990A CN 110298657 A CN110298657 A CN 110298657A
Authority
CN
China
Prior art keywords
block
node
target
information
target block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810233990.1A
Other languages
Chinese (zh)
Inventor
毕伟
刘翔宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhong Si Bo An Technology (beijing) Co Ltd
Original Assignee
Zhong Si Bo An Technology (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhong Si Bo An Technology (beijing) Co Ltd filed Critical Zhong Si Bo An Technology (beijing) Co Ltd
Priority to CN201810233990.1A priority Critical patent/CN110298657A/en
Publication of CN110298657A publication Critical patent/CN110298657A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9024Graphs; Linked lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of block chain common recognition method, relevant apparatus and systems, the vote information that first node passes through the target block of generation creation, then the target block and preposition block cryptographic Hash are sent to second node simultaneously, second node verifies the target information.Due to using target block and the cryptographic Hash of preposition block as two parts, so that in target block and do not include prefix area block cryptographic Hash, but the cryptographic Hash of preposition block is stored jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash, target block can be made to can be used during multiple authentication, the efficiency that block builds block parallel is improved, and then improves block chain effectiveness of performance;And when being verified to target block, the corresponding vote information individually stored and preposition block cryptographic Hash need to only be verified without access target block, the wasting of resources and the lower problem of efficiency in block chain common recognition are avoided due to the reduction of verification information.

Description

A kind of block chain common recognition method, relevant apparatus and system
Technical field
The present invention relates to block chain technical fields, more particularly to a kind of block chain common recognition method, relevant apparatus and system.
Background technique
Recent years, block chain technology using more and more extensive.For narrow sense, block chain be it is a kind of sequentially in time A kind of linked data structure that data block is combined into such a way that sequence is connected, and what is guaranteed in a manner of cryptography can not usurp The distributed account book that can not be forged changed.Broadly, block chain technology is verified and is stored using block linked data structure Data know together algorithm using distributed node to generate and more new data, guarantee in the way of cryptography data transmission and visit The safety asked is programmed and distributed base that one kind of operation data is completely new using the intelligent contract of automatized script code composition Plinth framework and calculation paradigm.
Algorithm of knowing together is the expert, scholar and technical staff in the field always in exploratory development.Public affairs common at present Department algorithm have: proof of work (POW), equity prove (POS), act on behalf of equity prove (DPOS) and use Byzantium (PBFT) Deng.Wherein, POW proof of work calculates the random number for meeting rule, that is, obtains by enumerating the cryptographic Hash operation of formula It obtains this book keeping operation originally, issues the data that epicycle needs to record, stored together after other node verifications of 50% or more the whole network, it is scarce Point is to need to compete the power of packing, and vast resources is caused to waste, and the acknowledging time of block is difficult to shorten, and efficiency is difficult to adapt to commercialization Using needing to wait multiple confirmations and forever without lastness;POS equity proves, is a kind of upgrading common recognition mechanism of POW, i.e., According to the ratio of token shared by each node and time, mine disaster degree is dug in the reduction of equal proportion, so that the speed of random number is looked in quickening, The disadvantage is that may not wish to participate in book keeping operation without participant that is specialized, possessing equity, it is easy to produce bifurcated, needs to wait multiple Confirmation, forever without lastness, needs checkpointing mechanism to make up lastness, low efficiency;DPOS share authorisation verification mechanism, class It is similar to board of directors's ballot, money-holder launches a certain number of nodes, acts on behalf of them and verify and keep accounts., base of the DPOS in POS It is on plinth, the role for the people that keeps accounts is specialized, equity is first passed through to select book keeping operation people, is kept accounts in turn again between the people that then keeps accounts, Disadvantage is: the wish of actively voting of token holder it is not strong or ballot centralization, cause a degree of centralization to cause The wasting of resources;Equally, PBFT there is also serious forgiveness it is low, flexibility is poor, low efficiency the disadvantages of.As it can be seen that existing block chain is total The problems such as knowledge mechanism in resource in the prevalence of waste, low efficiency is be easy to cause.
Summary of the invention
It is directed to the above problem, the present invention provides a kind of block chain common recognition method, relevant apparatus and system, solves existing The problem of wasting of resources and low efficiency of block chain common recognition algorithm.
To achieve the goals above, the embodiment of the invention provides following technical solutions:
A kind of block chain common recognition method, is applied to first node, comprising:
Target block is generated according to information to be received;
The corresponding target information of the target block is sent to second node, wherein the target information includes described Target block and the corresponding preposition block cryptographic Hash of the target block, the second node be cluster in addition to first node Remaining node;
Receive the vote information of second node feedback, the vote information includes the target information and to the mesh Mark the ballot of block;
The vote information is verified, result is verified;
Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded On the block chain of the first node.
Preferably, further includes:
Obtain the cryptographic Hash summary info of the target block;
The cryptographic Hash summary info of the target block is characterized as the target block.
Preferably, further includes:
The verification result of the target block is sent to the second node, realizes the second node to the target The verifying again of block.
A kind of block chain common recognition method, is applied to second node, comprising:
Receive the corresponding target information of target block that first node is sent, wherein the target information includes the mesh Mark block and the corresponding preposition block cryptographic Hash of the target block;The first node is certain in addition to second node in cluster One node;
The target block is effectively verified according to the target information, obtains the ballot letter of the target block Breath, and the vote information is sent to the first node and the remaining second node in addition to the second node, it waits The residue second node feeds back the vote information, wherein the vote information includes the target information and to the mesh Mark the ballot of block;
After receiving the vote information of the remaining second node feedback, the vote information is verified, It is verified result;
Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded On the block chain of the second node.
Preferably, described that the target block is effectively verified according to the target information, obtain the target area The vote information of block, and the vote information is sent to the first node and the residue second in addition to the second node Node waits the remaining second node to feed back the vote information, comprising:
The target information is verified, result is verified;
Judge whether the verification result is correct, if it is, throwing the corresponding target block of the target information correct Ticket;
The vote information of the target block is generated according to the voting results of the target block;
The vote information is sent to the first node and the remaining second node in addition to the second node, etc. The vote information is fed back to the remaining second node.
Preferably, further includes:
Classify to the target block, the corresponding vote information of the target block of same classification is counted, is obtained To ballot statistical result;
Judge whether the quantity of the correct ticket in the ballot statistical result is greater than the first preset threshold, if it is, sentencing Whether the identical data of cryptographic Hash for the preposition block that the disconnected target block for throwing correct ticket is transmitted are greater than the second preset threshold;
If it is, the target block is verified as effective block, conversely, being then verified as the target block in vain Block.
Preferably, when receiving the verification result for the target block that the first node is sent, further includes:
Ballot poll in the verification result is counted;
If the statistical magnitude of the ballot poll is greater than default statistical threshold, the corresponding target block of voting is Effective block, conversely, the corresponding target block of the ballot is invalid block.
A kind of first node, comprising:
Generation module, for generating target block according to information to be received;
Sending module, for the corresponding target information of the target block to be sent to second node, wherein the target Information includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the second node is to remove in cluster Remaining node outside first node;
Receiving module, for receiving the vote information of the second node feedback, wherein the vote information includes described Target information and ballot to the target block;
Authentication module verifies the vote information, is verified result;
Logging modle, for judging whether the verification result is effective, if it is, by the vote information and described testing Card result is recorded on the block chain of the first node.
A kind of second node, comprising:
Module is monitored, for receiving the corresponding target information of target block of first node transmission, wherein the target letter Breath includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the first node is in cluster except the A certain node outside two nodes;
Vote module obtains the target for effectively being verified according to the target information to the target block The vote information of block, and by the vote information be sent to the first node and in addition to the second node remaining the Two nodes wait the remaining second node to feed back the vote information, wherein the vote information includes the target information With the ballot to the target block;
Authentication module, for after receiving the vote information of the remaining second node feedback, to the ballot Information is verified, and result is verified;
Logging modle judges whether the verification result is effective, if it is, the vote information and the verifying are tied Fruit is recorded on the block chain of the second node.
A kind of block chain common recognition system, comprising:
First node as described above and second node described above.
Compared to the prior art, then first node of the present invention will by the vote information of the target block of generation creation The target block and preposition block cryptographic Hash are sent to second node simultaneously, and second node verifies the target information.By In using target block and the cryptographic Hash of preposition block as two parts, so that in target block and not including the Hash of prefix area block Value, but the cryptographic Hash of preposition block is stored jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash, Target block can be made to can be used during multiple authentication, improve the efficiency that block builds block parallel, and then improve Block chain effectiveness of performance;It, only need to be to corresponding list without access target block and when being verified to target block The vote information and preposition block cryptographic Hash solely stored is verified, since the reduction of verification information is avoided in block chain The lower problem of the wasting of resources and efficiency in common recognition.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of block chain common recognition method provided in an embodiment of the present invention;
Fig. 2 is a kind of block chain data structure schematic diagram provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another block chain common recognition method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of first node provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of second node provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Term " first " and " second " in description and claims of this specification and above-mentioned attached drawing etc. are for area Not different objects, rather than for describing specific sequence.Furthermore term " includes " and " having " and their any deformations, It is intended to cover and non-exclusive includes.Such as it contains the process, method of a series of steps or units, system, product or sets It is standby not to be set in listed step or unit, but may include the step of not listing or unit.
A kind of block chain common recognition method is provided in an embodiment of the present invention, and referring to Fig. 1, this method may include following Step:
S11, target block is generated according to information to be received;
It include multiple nodes in a communication cluster, one block chain of corresponding record on each node, which is Verified using block linked data structure with storing data, and generate and update using the common recognition method of distributed node Data.
It include multiple nodes in communication cluster in embodiments of the present invention, when a certain node is there are when block to be verified, This kind of node is corresponded into first node.The target block is used to characterize block to be verified, has recorded in target block waiting Receive the relevant information of the block.
S12, the corresponding target information of the target block is sent to second node, wherein the target information includes The target block and the corresponding preposition block cryptographic Hash of the target block;The second node is that first node is removed in cluster Outer remaining node;
S13, the vote information for receiving second node feedback, wherein the vote information include the target block, The corresponding preposition block cryptographic Hash of the target block and the ballot to the target block.
In another embodiment of the invention, further includes:
Obtain the cryptographic Hash summary info of the target block;
The cryptographic Hash summary info of the target block is characterized as the target block.
It is consumed to save network transmission bandwidth, raising network transmission efficiency, in the vote information, the target block The summary infos such as the cryptographic Hash of the target block can be used to be replaced, to achieve the purpose that compress information.
S14, the vote information is verified, is verified result;
S15, judge whether the verification result is effective, if it is, executing S16;
S16, the vote information and the verification result are recorded on the block chain of the first node.
Optionally, further includes:
The verification result of the target block is sent to the second node, realizes the second node to the target The verifying again of block.
Referring to fig. 2, the block chain structure is by three for the block chain data structure that some node is recorded in the embodiment of the present invention Part forms: block, ballot structure and preceding piece of cryptographic Hash, wherein Block indicates current block and traditional block chain structure Different is in block in the present invention and not include the cryptographic Hash of preceding block block;PreHash is indicated to previous block in Fig. 2 Cryptographic Hash record, Vote indicates to the voting records of current block.
After generating the vote information of the target block, corresponding target information can be sent to the second section by first node Remaining node in point i.e. cluster, the target information include target block, the target block represent block information or It represents and is currently verified the cryptographic Hash of block (target block) and the cryptographic Hash of currently stored preposition block.
Then second node votes to the target block to according to the target information, referring to Fig. 3 in the present invention Another block chain common recognition method is additionally provided in embodiment, is applied to second node, comprising:
S21, the corresponding target information of target block that first node is sent is received, wherein the target information includes institute State target block and the corresponding preposition block cryptographic Hash of the target block;The first node be cluster in addition to second node A certain node;
S22, the target block is effectively verified according to the target information, obtains the ballot of the target block Information, and the vote information is sent to the first node and the remaining second node in addition to this node, described in waiting Remaining second node feeds back the vote information, wherein the vote information includes the target information and to the target area The ballot of block;
S23, after receiving the vote information of the remaining second node feedback, the vote information is tested Card, is verified result;
S24, judge whether the verification result is effective, if it is, executing S25;
S25, the vote information and the verification result are recorded on the block chain of the second node.
Therefore, the method that a kind of pair of target block is voted is additionally provided in embodiments of the present invention, may include:
Receive the target block that creation is completed;
Transaction Information in the target block is verified, if verification result is correct, the target block is thrown Correct ticket;
The vote information of the target block is generated according to the voting results of the target block.
Since target block only has recorded corresponding transaction data, when first node receives target block created When, since the target block is block to be verified, so second node can verify it, which may include: It examines the signing messages of the target block, verify the signing messages traded in the target block, transaction with the presence or absence of honeysuckle etc., be somebody's turn to do Verification process is the voting process to the target block, that is, is verified and throws correct ticket.
A kind of verification method is further comprised in another embodiment of the invention, comprising:
Classify to the target block, the corresponding vote information of the target block of same classification is counted, is obtained To ballot statistical result;
Judge whether the quantity of the correct ticket in the ballot statistical result is greater than the first preset threshold, if it is, sentencing Whether the identical data of cryptographic Hash for the preposition block that the disconnected target block for throwing correct ticket is transmitted are greater than the second preset threshold;
If it is, the target block is verified as effective block, conversely, being then verified as the target block in vain Block.
Second node first classifies the target information that the first node received is sent according to target block, classifies Whether it is mutually all standard that standard is with target block information, which can be the cryptographic Hash of the target block.If Identical is one kind.Why carrying out classification is because multiple nodes may be respectively to different target blocks in voting process It votes, at this point, receiving a large amount of vote information, it is that it is corresponding to need to compare vote information for which target block, and will Ballot for the same target block is divided into one kind.So carrying out classification can be improved verification efficiency.
Statistics and more corresponding preposition block cryptographic Hash are carried out to the voting results of sorted same class block.Such as The poll that the structure of the verifying of fruit target block throws correct ticket is greater than preset first threshold value or its ratio is greater than preset ratio value Assuming that 50%, and the identical data of preposition block cryptographic Hash that the node for throwing correct ticket is transmitted are also greater than default second threshold Value, first threshold and second threshold can be set to it is identical, can also the requirement according to business to safety and performance adjust It is whole.If above-mentioned two aspect is all satisfied, the target block is considered as effective block, is otherwise considered as invalid block.
If the verification result of the target block is effective block, first node the target information is recorded described On the block chain of first node.
First node of the present invention is by generating the vote information of the target block of creation, then by the target block and preposition Block cryptographic Hash is sent to second node simultaneously, and second node verifies the target information.Due to by target block and before The cryptographic Hash of block is set as two parts, so that in target block and do not include the cryptographic Hash of prefix area block, but by prefix area The cryptographic Hash of block stores jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash, can make target area Block can be used during multiple authentication, improve the efficiency that block builds block parallel, and then improve block chain effectiveness of performance; It, only need to be to the corresponding vote information individually stored without access target block and when being verified to target block It is verified with preposition block cryptographic Hash, since the reduction of verification information avoids the wasting of resources in block chain common recognition The lower problem with efficiency.
It is corresponding, in another embodiment provided by the invention further include:
Ballot poll in the verification result is counted;
If the statistical magnitude of the ballot poll is greater than default statistical threshold, the corresponding target block of voting is Effective block, conversely, the corresponding target block of the ballot is invalid block.
Namely obtained after result after obtaining second node and being verified target block whether be active block structure Afterwards, which can be delivered to second node namely remaining all node by corresponding first node again.
Why select to deliver again is because the above process completes the one step completed throwing carried out to target block Ticket.For example, 50% or more node throws correct ticket, then being considered as the target block is active block, is otherwise considered as invalid block, still The reason of generating invalid block may be 50% or more node ballot mistake;Block itself is effective, but 50% or more node because The reasons such as communication time-out, node failure, malicious action do not launch correct ticket.In practical applications, in order to avoid these reasons, It needs the target block for not reaching 50% to last round of ballot to vote again, is rejected phenomenon to avoid effective block It generates.
If verified again, counted according to the poll of the first round, is considered as ballot greater than 50% effectively, ballot Corresponding block is then considered as effective block, and it is invalid to be otherwise considered as.The voting results are also recorded in corresponding block chain.Nothing Effect block node, which can be broken up, sends back to block chain entrance.
Therefore, no matter voting the result shows that whether block effective, node can record block cochain.Due to block Voting results and preposition Hash are all recorded in chain together, so can distinguish effective, invalid block and transaction in inquiry.
To include preposition piece of cryptographic Hash when block is packaged in traditional block chain common recognition algorithm, it may be assumed that on chain the last one The cryptographic Hash of block.Block is connected in turn by the cryptographic Hash of block, forms the structure of a chain type.There are multiple sections When putting while building block, these blocks all encapsulate same preposition piece of cryptographic Hash, and in common recognition, one and only one area Block can finally enter chain, remaining block will be considered as invalid block in epicycle common recognition.Transaction in invalid block " will be beaten Dissipate ", and it will be packaged into again new block in next round, to strive for entering chain in next round common recognition.
In the present invention, preposition piece of cryptographic Hash is not comprised in block, and is stored in each node.Do not having , it is specified that the preposition cryptographic Hash that node is stored be specific format (such as sky or be particular value) when creating generation block.
In embodiments of the present invention, although the block that the namely verifying of every wheel common recognition is stored, but due to It does not include the cryptographic Hash of preposition block in block, so the block that multiple nodes are built up can also be in the common recognition of next round It uses, the transaction in these blocks does not need to break up builds block again again, builds the concurrent efficiency of block to greatly improve, increases The performance of block catenary system.
The common recognition method that the embodiment of the present invention is proposed is without breaing up no adopted block, it is possible to take strategy The repeat number traded in block is reduced, block concurrency is built with maximized raising.Such as it can be using the form of transaction grouping Different groups of transaction is sent to the strategy that different nodes are packaged to distribute transaction etc..
A kind of first node 10 is additionally provided in embodiments of the present invention, referring to fig. 4, comprising:
Generation module 101, for generating target block according to information to be received;
Sending module 102, for the corresponding target information of the target block to be sent to second node, wherein described Target information includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the second node is cluster In remaining node in addition to first node;
Receiving module 103, for receiving the vote information of second node feedback, wherein the vote information includes The target information and ballot to the target block;
Authentication module 104 verifies the vote information, is verified result.
Logging modle 105, for judging whether the verification result is effective, if it is, by the vote information and institute Verification result is stated to be recorded on the block chain of the first node.
It is corresponding, a kind of second node 20 is additionally provided in embodiments of the present invention, referring to Fig. 5, comprising:
Module 201 is monitored, for receiving the corresponding target information of target block of first node transmission, wherein the mesh Mark information includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the first node is in cluster A certain node in addition to second node;
Vote module 202 obtains the mesh for effectively being verified according to the target information to the target block The vote information of block is marked, and the vote information is sent to the first node and the residue in addition to the second node Second node waits the remaining second node to feed back the vote information, wherein the vote information includes the target letter Breath and the ballot to the target block;
Authentication module 203, for after receiving the vote information of the remaining second node feedback, to the throwing Ticket information is verified, and result is verified;
Logging modle 204 judges whether the verification result is effective, if it is, by the vote information and described testing Card result is recorded on the block chain of the second node.
It in another embodiment of the invention further include a kind of block chain common recognition system, including above-mentioned first node and the Two nodes, wherein the first node is the node for receiving target block to be verified, and second node is in the cluster except the Remaining node outside one node.
First node of the present invention is by generating the vote information of the target block of creation, then by the target block and preposition Block cryptographic Hash is sent to second node simultaneously, and second node verifies the target information.Due to by target block and before The cryptographic Hash of block is set as two parts, so that in target block and do not include the cryptographic Hash of prefix area block, but by prefix area The cryptographic Hash of block stores jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash, can make target area Block can be used during multiple authentication, improve the efficiency that block builds block parallel, and then improve block chain effectiveness of performance; It, only need to be to the corresponding vote information individually stored without access target block and when being verified to target block It is verified with preposition block cryptographic Hash, since the reduction of verification information avoids the wasting of resources in block chain common recognition The lower problem with efficiency.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

  1. A kind of method 1. block chain is known together, which is characterized in that be applied to first node, comprising:
    Target block is generated according to information to be received;
    The corresponding target information of the target block is sent to second node, wherein the target information includes the target Block and the corresponding preposition block cryptographic Hash of the target block, the second node are the residue in cluster in addition to first node Node;
    Receive the vote information of second node feedback, the vote information includes the target information and to the target area The ballot of block;
    The vote information is verified, result is verified;
    Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded described On the block chain of first node.
  2. 2. the method according to claim 1, wherein further include:
    Obtain the cryptographic Hash summary info of the target block;
    The cryptographic Hash summary info of the target block is characterized as the target block.
  3. 3. the method according to claim 1, wherein further include:
    The verification result of the target block is sent to the second node, realizes the second node to the target block Verifying again.
  4. A kind of method 4. block chain is known together, which is characterized in that be applied to second node, comprising:
    Receive the corresponding target information of target block that first node is sent, wherein the target information includes the target area Block and the corresponding preposition block cryptographic Hash of the target block;The first node is a certain section in cluster in addition to second node Point;
    The target block is effectively verified according to the target information, obtains the vote information of the target block, and The vote information is sent to the first node and the remaining second node in addition to the second node, is waited described surplus Remaining second node feeds back the vote information, wherein the vote information includes the target information and to the target block Ballot;
    After receiving the vote information of the remaining second node feedback, the vote information is verified, is obtained Verification result;
    Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded described On the block chain of second node.
  5. 5. according to the method described in claim 4, it is characterized in that, it is described according to the target information to the target block into Row effectively verifying, obtains the vote information of the target block, and the vote information is sent to the first node and is removed Remaining second node other than the second node waits the remaining second node to feed back the vote information, comprising:
    The target information is verified, result is verified;
    Judge whether the verification result is correct, if it is, throwing correct ticket to the corresponding target block of the target information;
    The vote information of the target block is generated according to the voting results of the target block;
    The vote information is sent to the first node and the remaining second node in addition to the second node, waits institute It states remaining second node and feeds back the vote information.
  6. 6. according to the method described in claim 5, it is characterized by further comprising:
    Classify to the target block, the corresponding vote information of the target block of same classification is counted, is thrown Ticket statistical result;
    Judge whether the quantity of the correct ticket in the ballot statistical result is greater than the first preset threshold, if it is, judgement is thrown Whether the identical data of cryptographic Hash for the preposition block that the target block of correct ticket is transmitted are greater than the second preset threshold;
    If it is, the target block is verified as effective block, conversely, the target block is then verified as dead space Block.
  7. 7. according to the method described in claim 4, it is characterized in that, when the target area for receiving the first node transmission When the verification result of block, further includes:
    Ballot poll in the verification result is counted;
    If the statistical magnitude of the ballot poll is greater than default statistical threshold, the corresponding target block of voting is effective Block, conversely, the corresponding target block of the ballot is invalid block.
  8. 8. a kind of first node characterized by comprising
    Generation module, for generating target block according to information to be received;
    Sending module, for the corresponding target information of the target block to be sent to second node, wherein the target information Including the corresponding preposition block cryptographic Hash of the target block and the target block, the second node is that first is removed in cluster Remaining node outside node;
    Receiving module, for receiving the vote information of the second node feedback, wherein the vote information includes the target Information and ballot to the target block;
    Authentication module verifies the vote information, is verified result;
    Logging modle, for judging whether the verification result is effective, if it is, the vote information and the verifying are tied Fruit is recorded on the block chain of the first node.
  9. 9. a kind of second node characterized by comprising
    Module is monitored, for receiving the corresponding target information of target block of first node transmission, wherein the target information packet The target block and the corresponding preposition block cryptographic Hash of the target block are included, the first node is that the second section is removed in cluster A certain node outside point;
    Vote module obtains the target block for effectively being verified according to the target information to the target block Vote information, and the vote information is sent to the first node and the second section of residue in addition to the second node Point waits the remaining second node to feed back the vote information, wherein the vote information includes the target information and right The ballot of the target block;
    Authentication module, for after receiving the vote information of the remaining second node feedback, to the vote information It is verified, is verified result;
    Logging modle judges whether the verification result is effective, if it is, the vote information and the verification result are remembered It records on the block chain of the second node.
  10. The system 10. a kind of block chain is known together characterized by comprising
    First node as claimed in claim 8 and second node as claimed in claim 9.
CN201810233990.1A 2018-03-21 2018-03-21 A kind of block chain common recognition method, relevant apparatus and system Pending CN110298657A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810233990.1A CN110298657A (en) 2018-03-21 2018-03-21 A kind of block chain common recognition method, relevant apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810233990.1A CN110298657A (en) 2018-03-21 2018-03-21 A kind of block chain common recognition method, relevant apparatus and system

Publications (1)

Publication Number Publication Date
CN110298657A true CN110298657A (en) 2019-10-01

Family

ID=68025333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810233990.1A Pending CN110298657A (en) 2018-03-21 2018-03-21 A kind of block chain common recognition method, relevant apparatus and system

Country Status (1)

Country Link
CN (1) CN110298657A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110796547A (en) * 2019-10-30 2020-02-14 桂林电子科技大学 Improved practical Byzantine fault-tolerant system based on alliance block chain
CN110995701A (en) * 2019-12-02 2020-04-10 远光软件股份有限公司 Block chain consensus method, system, electronic equipment and storage medium
CN111177262A (en) * 2019-12-27 2020-05-19 中思博安科技(北京)有限公司 Block chain consensus method, related device and system
CN111211904A (en) * 2019-12-13 2020-05-29 杭州复杂美科技有限公司 Consensus method, device and storage medium
CN111931220A (en) * 2020-09-24 2020-11-13 腾讯科技(深圳)有限公司 Consensus processing method, device, medium and electronic equipment for block chain network
CN113472825A (en) * 2020-03-30 2021-10-01 中国移动通信集团设计院有限公司 NB-IoT (NB-IoT) terminal transaction processing method and device based on block chain
WO2023279970A1 (en) * 2021-07-07 2023-01-12 支付宝(杭州)信息技术有限公司 Blockchain-based data synchronization method and apparatus

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548349A (en) * 2016-11-02 2017-03-29 江苏通付盾科技有限公司 Transaction Information verification method and system
CN106650495A (en) * 2016-12-16 2017-05-10 杭州嘉楠耘智信息科技有限公司 File verification method and device
CN106682907A (en) * 2016-12-10 2017-05-17 江苏恒为信息科技有限公司 Comparison and consensus method for block chain data
CN106789908A (en) * 2016-11-23 2017-05-31 江苏通付盾科技有限公司 Block common recognition method for building up and system in block chain
WO2017109140A1 (en) * 2015-12-22 2017-06-29 Bigchaindb Gmbh Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction
CN107171810A (en) * 2017-06-27 2017-09-15 中国联合网络通信集团有限公司 The verification method and device of block chain
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
GB201800761D0 (en) * 2018-01-17 2018-02-28 Setl Development Ltd Interaction between blockchains
WO2018041066A1 (en) * 2016-08-29 2018-03-08 北京瑞卓喜投科技发展有限公司 Data processing method, apparatus and system based on block chain technology

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017109140A1 (en) * 2015-12-22 2017-06-29 Bigchaindb Gmbh Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction
WO2018041066A1 (en) * 2016-08-29 2018-03-08 北京瑞卓喜投科技发展有限公司 Data processing method, apparatus and system based on block chain technology
CN106548349A (en) * 2016-11-02 2017-03-29 江苏通付盾科技有限公司 Transaction Information verification method and system
CN106789908A (en) * 2016-11-23 2017-05-31 江苏通付盾科技有限公司 Block common recognition method for building up and system in block chain
CN106682907A (en) * 2016-12-10 2017-05-17 江苏恒为信息科技有限公司 Comparison and consensus method for block chain data
CN106650495A (en) * 2016-12-16 2017-05-10 杭州嘉楠耘智信息科技有限公司 File verification method and device
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN107171810A (en) * 2017-06-27 2017-09-15 中国联合网络通信集团有限公司 The verification method and device of block chain
GB201800761D0 (en) * 2018-01-17 2018-02-28 Setl Development Ltd Interaction between blockchains

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
FRANCISCO PRIETO-CASTRILLO ET AL,: "Distributed Sequential Consensus in Networks: Analysis of Partially Connected Blockchains with Uncertainty", COMPLEXITY, pages 1 - 11 *
闵新平等: "许可链多中心动态共识机制", 计算机学报, vol. 41, pages 1 - 16 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110796547A (en) * 2019-10-30 2020-02-14 桂林电子科技大学 Improved practical Byzantine fault-tolerant system based on alliance block chain
CN110995701A (en) * 2019-12-02 2020-04-10 远光软件股份有限公司 Block chain consensus method, system, electronic equipment and storage medium
CN110995701B (en) * 2019-12-02 2022-11-29 远光软件股份有限公司 Block chain consensus method, system, electronic equipment and storage medium
CN111211904A (en) * 2019-12-13 2020-05-29 杭州复杂美科技有限公司 Consensus method, device and storage medium
CN111177262A (en) * 2019-12-27 2020-05-19 中思博安科技(北京)有限公司 Block chain consensus method, related device and system
CN113472825A (en) * 2020-03-30 2021-10-01 中国移动通信集团设计院有限公司 NB-IoT (NB-IoT) terminal transaction processing method and device based on block chain
CN113472825B (en) * 2020-03-30 2023-01-13 中国移动通信集团设计院有限公司 NB-IoT terminal transaction processing method and device based on block chain
CN111931220A (en) * 2020-09-24 2020-11-13 腾讯科技(深圳)有限公司 Consensus processing method, device, medium and electronic equipment for block chain network
WO2023279970A1 (en) * 2021-07-07 2023-01-12 支付宝(杭州)信息技术有限公司 Blockchain-based data synchronization method and apparatus

Similar Documents

Publication Publication Date Title
CN110298657A (en) A kind of block chain common recognition method, relevant apparatus and system
CN110784346B (en) Reputation value-based PBFT consensus system and method
CN109872152B (en) Block chain consensus method based on share authorization certification mechanism and related equipment
CN109447795B (en) Byzantine consensus method supporting rapid achievement of final confirmation
CN109146484A (en) Common recognition verification method, digging mine machine and block catenary system based on block chain
CN107480990A (en) Block chain bookkeeping methods and device
CN113347164B (en) Block chain-based distributed consensus system, method, device and storage medium
CN109819022A (en) A kind of block chain common recognition method based on credit appraisal
CN109982435A (en) Frequency spectrum access and management method based on block chain
CN109242299A (en) Distribution digs mine method, digs mine machine and block catenary system
CN108717630A (en) One kind going out block method and its realizes system
CN109286685A (en) The system architecture of the more subchains of main chain adduction row of subchain can be expanded
CN110796547A (en) Improved practical Byzantine fault-tolerant system based on alliance block chain
CN109118214A (en) The method and apparatus for running intelligent contract
CN109165944A (en) Multiple party signatures authentication method, device, equipment and storage medium based on block chain
CN106899698A (en) A kind of across chain mutual operation method between block chain
CN107612973A (en) Block chain structure, generation method and transaction verification method for intelligent sliding moved end
CN109255713A (en) In a kind of block chain network in certain time period book keeping operation power acquisition methods
CN109087111A (en) Common recognition verification method, digging mine machine and block catenary system based on block chain
US20220067063A1 (en) Apparatus and method for adaptively managing sharded blockchain network based on deep q network
CN112163856A (en) Consensus method and system for block chain and Internet of things fusion scene
Sun et al. Rtchain: A reputation system with transaction and consensus incentives for e-commerce blockchain
CN109087105A (en) For digging the Hash Search method of mine, digging mine machine and block catenary system
CN111130790A (en) Block co-recognition method based on block chain node network
CN109919760A (en) Byzantine failure tolerance common recognition algorithm based on voting mechanism

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination