CN109426952A - A kind of block chain framework - Google Patents

A kind of block chain framework Download PDF

Info

Publication number
CN109426952A
CN109426952A CN201810955983.2A CN201810955983A CN109426952A CN 109426952 A CN109426952 A CN 109426952A CN 201810955983 A CN201810955983 A CN 201810955983A CN 109426952 A CN109426952 A CN 109426952A
Authority
CN
China
Prior art keywords
node
verifying
super
matrix
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810955983.2A
Other languages
Chinese (zh)
Other versions
CN109426952B (en
Inventor
李庆华
陶鸥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hsbc (beijing) Technology Co Ltd
Original Assignee
Hsbc (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hsbc (beijing) Technology Co Ltd filed Critical Hsbc (beijing) Technology Co Ltd
Publication of CN109426952A publication Critical patent/CN109426952A/en
Application granted granted Critical
Publication of CN109426952B publication Critical patent/CN109426952B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The present invention relates to a kind of block chain frameworks.The block chain framework introduces novel mixing common recognition mechanism and also introduces super node in addition to ordinary node.As long as each host node meets qualification can select super node progress PoW digging mine as the candidate of super node, random algorithm under same probability.Transaction verification and proof of work task can be distributed to its lower level node by the block chain architecture design one tree network, super node, complete corresponding calculate with concurrent fashion.The chance that top layer PoW is won in stronger calculation power increase can be obtained by doing so.MATRIX chain structure of the invention has a three advantages: first, the redundancy of effort between node largely reduces;Second, the handling capacity of parallel computation General Promotion verifying transaction and the calculated performance of proof of work;Third, block chain network can be organized to calculate power output stage similar to extensive.

Description

A kind of block chain framework
Technical field
The present invention relates to a kind of block chain and its bottom architectures, in particular to MATRIX chain framework.
Background technique
Bit coin: the milestone in block chain 1.0-encryption currency epoch.
On January 3rd, 2009, this acute hearing has issued the first edition bit coin client of open source in the creator of block chain technology. On the same day, first bit coin block chain is born in the world, and first batch of 50 bit coin are continuously created simultaneously to be come, this indicates bit coin The formal establishment of network.As the Floor layer Technology of bit coin, block chain formally climbs up history dance as the network technology of a new generation Platform.Bit coin network has started a completely new Age of Technology, and middle acute hearing establishes one with the theory for surmounting the epoch and goes to trust Change, decentralization, distributed autonomous a networked society.Bit coin is properly termed as the first person to do of block chain, can also regard area as The milestone in 1.0 epoch of block chain --- the encryption currency epoch.Although having the wisdom and theory in epoch where being far more than, middle sheet The block chain that acute hearing is created remains limitation corresponding with technology development at that time, for example, design bit coin when It waits, middle acute hearing does not expect that block chain can become an epoch-making technology, can be answered by being so widely commercialized in future With, so the block chain network in 1.0 epoch is in the demand that can no longer meet the epoch now, it can not veritably be large-scale commercial applications Change application and support is provided, however, bit coin is still the mark post for encrypting the positioning of currency core value.
Ether mill: block chain 2.0-sizable application epoch.
Year ends 2013, ether mill founder Vitalik Buterin have issued ether mill first edition white paper, have formally pulled open The prelude in 2.0 epoch of block chain.From initial target only serve encryption the bit coin of currency it is different, intelligent conjunction has been introduced in ether mill Concept about, from the demand that truly can satisfy commercial applications publication.Ether mill can be used to program, and disperse, load It protects and transaction anything, such as: ballot, domain name, financial transaction, crowd raise, company management, contract and most agreement, knows Know property right, there are also the various intellectual capitals for having benefited from hardware integration.
As the model of second generation block chain technology, ether mill still has the place for being unsatisfactory for people's demand.
Qualitative problem quantification: although ether mill provides intelligent contract, but current ether mill intelligence contract can only Simple linear problem is solved, more complicated agreement terms can not be solved, that is, qualitative condition can not quantitatively be switched to Computer language, this also greatly limits the space of transaction and the application of block chain and range.So in order to which block chain can be more Widely commercial applications, intelligent block chain technology must have can be by the feature of qualitative problem quantification.
Intelligent contract is popular: as the core of second generation block chain technology, intelligent contract improves the application of block chain Range and imagination space, but intelligent contract (by taking ether mill as an example) must be familiar with the technical staff of code by minority to provide at present The user of computer language is not grasped in technical service and support, can not actively, easily use intelligent contract.So such as What makes intelligent contract popular, is an essential condition and intelligence district that block chain technology really penetrates into everyone life The prerequisite major criterion feature of block chain technology.
The characteristic to grow with each passing hour: traditional block chain technology is all limited to the epoch of its research and development, that is, " publication is i.e. fixed Type ", then gradually can because development due to be difficult to adapt to the epoch, the bit coin technology of today is exactly a good example.Although Past, almost all of technology all have the characteristics that today that is such, but developing in technology high-speed, and especially block chain is this simultaneously The new technology of mainstream is not become, primary update in several years can all be brought to almost all of application developer and user Different degrees of puzzlement.
Calculate power public good: it is well known that PoW (Proof of Work) is that current block chain industry is most important a kind of total Knowledge mechanism, and the mine type encryption currency that digs most of at present is all to waste calculation power and resource, such as bit with having no social effect Coin, a large amount of electric power and calculation power are used to calculate skimble-skamble HASH value.Although this value is critically important on this chain One component part, but this numerical value itself is for entire society, it is meaningless.These how are made full use of to calculate power and money Source, to do more beneficial things, i.e. calculation power public good for the public, and to be thought deeply one of next-generation block chain technology is important Problem.
With the explosive increase of block chain technology in recent years, and widely applied by all trades and professions, while nothing By being the extensive obstruction of DAO event or ether mill for the previous period, all in the deficiency for reminding our current block chain technologies.
Currently a popular some block chains, its core parameter is also just fixed up after a chain research and development determine.But with The variation of service object and external environment, many parameters will all become bottleneck.For example, bit coin is due to setting block size It is set to 1Mbyte, the single digging mine time is set as 10 minutes, and initial stage comparison condition is loose.When online transaction is very crowded, greatly Part grouped commercial transaction is not suitable for carrying out on bit coin.Although ether mill provides intelligent contract, but at present Ether mill intelligence contract can only solve simple linear problem, can not solve more complicated agreement terms, so greatly limiting Transaction and the space applied and range on chain.
Common recognition algorithm is the key that influence a currency stabilization, and current common recognition algorithm is divided into three classes: (1) CPU-like; (2)GPU-like;(3)ASIC-like.Every kind represents a kind of interests style.Usual CPU/GPU-Like, ordinary user can be situated between Enter, while can also be added by calculating power rental basis;And ASIC-like, then face the profession competition of ASIC-like.At present A large amount of wastes of the common recognition mechanism in the prevalence of the energy and electric power, low, the centralization outstanding problem for the treatment of effeciency, safety The drawbacks such as problem and ease of use issues.
Further, since calculate rent paid in labour rent it is unstable with miner, will bring the whole network calculate power fluctuation, to block stability out It makes a big impact;Due to profession calculate power leasing market (for example, NICEHASH) presence, the PoW algorithm of all existing maturations, External attacker can buy calculation power from calculation power market and implement 51% attack to it.Such attack is set without purchasing a large amount of mines of digging It is standby, it is only necessary to pay the calculation power price in certain time, therefore greatly reduce intrusion scene.
For these problems, how current various development bottlenecks overcome, and become the great themes that people face.
Summary of the invention
For foregoing the problems of the prior art, the present invention is intended to provide a kind of with the broader technology visual field Solution.
Traditional block chain is solved the problems, such as in insincere channel reliable information, value Transfer, and machine of knowing together System solve the problems, such as block chain how under distributed scene compliance.Inwardly solution of the common recognition mechanism in decentralization It has determined the problem of trusting each other between node;The release of ether mill intelligence contract then makes block chain technology be more nearly reality, extends Social life and business are arrived;And intelligent block chain then introduces artificial intelligence in block bottom, allows artificial intelligence from every aspect (AI) it participates in more being previously required to " judgement " and " execution " that the mankind can complete, and introduces " group intelligence " and " contract constitution ", The learning ability of AI itself is utilized simultaneously, and continuous evolution block chain itself realizes that one has real human consciousness and thinking Block chain ecology.Specifically include intelligent block chain how self-assessment, how self-renewing, how to execute self-renewing and seamless Inherit legacy data chain method, and it is how user friendly, how using the method for cloud service, AI cloud service be how with AI Chain combination.
The target that intelligent block chain introduces AI includes the following:
Intelligent block chain self is evolved: by AI identification and reasoning, guaranteeing that intelligent block chain can rapidly adapt to external rings The variation in border;
Mine machine AIization: mine machine is calculated by meaningless HASH operation, is converted to AI calculating, digs mine itself and has value;
Safe and intelligent contract: executing contract using AI engine, supports to solve the loophole and trap in intelligent contract using AI, Counterparty can select without discrimination mode of doing business, also can choose into the trade mode protected based on AI;
Intelligent block chain AI services (AI as a Service): intelligent block chain the whole network is provided with AI ability;In system frame The polymorphic AI service assembly under chain cochain is supported in comprehensive support AI cloud service on frame.
Intelligent block chain is the block chain technology of a new generation, and artificial intelligence technology is innovatively introduced block chain and produced by it Industry, is incited somebody to action and the two is tightly combined together, and creates the product across the epoch.Intelligent block chain is not a mechanism, and Be it is a smart collaboration, the bottom-layer network system of open source can be realized on block chain, it provides and a platform and provides Corresponding programming language enables developer to calculate power and block chain technology using artificial intelligence to establish and issue next-generation point Cloth application, and to be later, the various new demands being not yet susceptible at present lay technical foundation.
As New Generation of Intelligent block chain, target is that building one is safe and reliable, has natural evolution ability MATRIX chain Block chain.MATRIX will establish that one user friendly, cloud service-oriented, closely merges with AI by endoprosthetic's intelligence The ecosystem.
The core technology of MATRIX chain includes:
(1) the block chain network architecture design of the tree network based on node.
MATRIX chain devises a tree network, and on the basis of host node, 32 super sections are elected in use at random step by step Point, 21 meetings therein are selected as PoW node again and carry out digging mine, and super node can be transaction verification and proof of work task Its lower level node is distributed to, corresponding calculating is completed with concurrent fashion, stronger calculation power increase can be obtained by, which doing so, wins top layer The chance of PoW.The framework has a three advantages: first, the redundancy of effort between node largely reduces;Second, parallel computation is complete Face improves the handling capacity of verifying transaction and the calculated performance of proof of work;Third, block chain network can be organized to be similar In calculation power output stage on a large scale.
(2) the intelligent contract security system based on AI, including AI formal verification technology, smelt based on distributed AI security breaches Spy technology, contract safety inspection technology based on opponent's network etc..
MATRIX chain can actively remove discovery code and contract loophole in the forming process of intelligent contract, while can also It is enough to generate confrontation network, by self continuous attack, go to discover whether that there are system vulnerabilities.
(3) the two-stage PoW mechanism based on MCMC.
Traditional PoW common recognition mechanism is all nodes of the whole network according to oneself being the calculating service (when calculating power X of network contribution It is long) obtain remuneration, that is, dig mine.The distinct disadvantage done so is exactly the wasting of resources, because being related to largely having no The calculating task of meaning calculates greatly electric power and calculation power caused by the not HASH value of practical significance compared to traditional PoW algorithm and provides Source waste, MATRIX chain use the training process of deep learning or the markov Monte carlo algorithm of Bayesian inference (MCMC) it is used as proof of work, the design object of the two-stage PoW mechanism based on MCMC not only can solve system-wide effect Rate problem, and more slack resources can be used to calculate power output and transaction data processing.
(4) AI ability comprising Bayesian inference machine, deep learning network, the 3-D image identification technology based on AI with Dynamic behaviour identification technology etc..
MATRIX is passed through by the dynamic protection of AI including the carry out overall relevance examination to miner's execution contract collection Loop discovery is found out based on such association contract transaction.MATRIX chain is relied on by dynamic audit timestamp or random number It relies on, it can be to avoid occurring corresponding dependent behavior in contract.MATRIX chain also passes through deep learning, finds out and calls in contract The coding mode for triggering exception or nondeterministic statement behavioural characteristic in the process obtains the code book feature of similar hacker's modus operandi Library, go forward side by side line code library static state and dynamic audit.Therefore, MATRIX chain moves block chain behavior using artificial intelligence technology State analysis, therefrom finds potential malignant activity and is protected.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described.It should be evident that drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the schematic diagram of the overall architecture of MATRIX chain according to the present invention;
Fig. 2 is the schematic diagram of the router mode of the node of MATRIX chain framework according to the present invention;
Fig. 3 is that the host node internal module of MATRIX chain framework according to the present invention divides the schematic diagram distributed with thread;
Fig. 4 is the schematic diagram of the node deployment mode of MATRIX chain framework according to the present invention
Fig. 5 is the digging mine of MATRIX chain according to the present invention and the schematic diagram of verifying process.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to implementation of the invention Mode, which is done, to be further described in detail.
MATRIX overall architecture
Fig. 1 is the schematic diagram of the overall architecture of MATRIX chain according to the present invention.MATRIX chain is used as block chain of new generation, Target is to construct a block chain that is safe and reliable, having natural evolution ability.MATRIX chain will be built by endoprosthetic's intelligence Found user friendly, a cloud service-oriented, the ecosystem closely merged with AI.
It will be seen from figure 1 that the core network only actually of MATRIX chain includes a series of full node.Full node packet Containing host node and ordinary node;Wherein, host node be for example calculate power reach 1000TPS (Transaction Per Second, often Second issued transaction amount), and provide such as 10000MAN coin (" MAN " represents a kind of power of corresponding MATRIX chain in the present invention The general proof of benefit, i.e. the Token in block chain field, also referred to as logical card, also someone uses " token " this address), and support RPC The node of (Remote Procedure Call, remote procedure call) service can provide and dig mine and externally service;And it is ordinary Node is then the node for being synchronized whole blocks, and having information propagation capabilities, can also provide external calculation power output.
The basic task of MATRIX network can be completed in usually minimum only 3 nodes.And exist including light node and wallet Interior service is realized by way of with the attached connection of host node.In addition, full node can also provide and calculate power service and include AI, tradition CPU/GPU calculate power output, storage service etc., these services can obtain MAN reward.In addition, any one equipment is all It can be suspended to full node or light node mode by connecing, obtain corresponding service.Light node will be also supported in further version Various service outputs are provided.
In addition, MATRIX will also provide the network service of IPFS, which will be suspended to full node completion by connecing."IPFS" (Inter Planetary File System, interspace file system) is one and is intended to create lasting and distributed storage and is total to Enjoy the network transmission protocol of file.
Since MATRIX provides a series of AI service, host node will be directly connected to by common interface form The free AI ancillary service node that the whole network provides, the node will be provided including language identification, image/video optimization, AI parameter model The interface of optimization and auxiliary commissioning.
And external service acts on behalf of Agent interface, mainly completion internal computing resources and external resource exchanges, and supports Coin is cashed and transaction.Any one seeks the external equipment of MATRIX network capabilities and AI ability, can be completed by Agent each Kind exchange and use.
Current block chain field face a series of problems, one of them is exactly that transactions velocity is slow.MATRIX's is final Target be by improve design of node and common recognition algorithm come reach such as 50KTPS (TPS:Transactions Per Second, That is the number of transactions of server processing per second) transactions velocity.Meanwhile host node is connected to artificial intelligence ancillary service by interface Node is output to the outside AI and calculates calculation power, effectively prevents calculating power waste.Therefore, the processing capacity of individual node, is necessarily required to There are the upper limits.Conventional criteria server (E5-2620V3) configuration is as shown in table 1:
Table 1
Configuration item Average behavior Peak value or high-performance configuration
I/O interface rate 20Mbps 100Mbps
CPU configuration E5-2620V3 > 16 threads
Memory configurations 16Gbyte Greater than 64Gbyte
ECDSA signature speed 7000 10000
ECDSA verifying speed 2000 3000
* ECDSA (calculate by Elliptic Curve Digital Signature Algorithm, digital signature of elliptic curve Method)
And in MATRIX chain, the content comprising 250byte is equivalent to 2000bits by every transaction.It considers Every transaction can actually be transmitted by network at least twice, and be 50% by the conversion of other expenses.Therefore, the message of single transaction Total bandwidth is in 8kbps.So in general, the real-time bandwidth of 1KTPS is configured in 8Mbps.
By analysis it can be found that the calculating demand of 1000TPS must be completed by multi-core processor, comprising: (1) independent Network processes and parsing kernel;(2) independent encryption and decryption sign test kernel;(3) it individually stores and memory management thread;(4) Additional issued transaction kernel.
If further, whole system rises to 50KTPS, then whole structure must be revised as router mode, i.e., such as Technical solution shown in Fig. 2.Fig. 2 shows the signals of the router mode of the node of MATRIX chain framework according to the present invention Figure, interior joint (Node) can be multiple host nodes and be spliced, and be also possible to host node and other host nodes, through consultation It is collectively formed.
But the model of above-mentioned 50KTPS is usually just able to achieve under enterprise network or relatively good test pessimistic concurrency control, and in public affairs Under many network conditions, it is typically only capable to realize the calculation processing ability of 5KTPS.
In laboratory internal, by disposing three cluster servers, each comprising 6 pieces of 2U servers, (U is a kind of expression clothes The unit for device external dimensions of being engaged in, is the abbreviation of unit), and connected using gigabit Ethernet, it is based on simple batch signature sign test, With transaction data compression transmission mode, the simplation verification of 50KTPS can be completed.
The host node internal module that Fig. 3 shows MATRIX chain framework according to the present invention is divided to be distributed with thread.Pass through Module shown in Fig. 3 divides, and the multi-threading parallel process of MATRIX internal task may be implemented.Need the module packet of independent design Include mode as shown in Table 2:
Table 2
The Economic Model of MATRIX
Referring to fig. 4, it illustrates the node deployment modes of MATRIX chain framework of the invention.
MATRIX chain of the invention is in order to discharge internal calculation power, and on the basis of host node, use elects 32 at random step by step Super node (SuperNode).21 meetings therein are selected as PoW node again and carry out digging mine.Meanwhile then independently electing 11 Verifying super node is exercised supervision and is adjudicated, and provides the distribution verifying of calculating task.
Above with respect to the quantity of super node, the quantity for dig the PoW node of mine elected, verifying super node Quantity is only schematical, and the present invention is not limited to disclosed embodiments.
The quantity of super node, the quantity for dig the PoW node of mine elected, the quantity of verifying super node are big In the integer for being equal to 3, it is therefore preferable to 22,32,42,122, the quantity for dig the PoW of mine and verifying super node elected The sum of quantity be equal to the quantity of super node.Preferably, when the quantity of super node is 22, carrying out of electing digs mine The quantity of PoW is 15, and the quantity for verifying super node is 7;When the quantity of super node is 42, carrying out of electing digs mine The quantity of PoW is 31, and the quantity for verifying super node is 11;When the quantity of super node is 122, what is elected carries out digging mine PoW quantity be 81, verify super node quantity be 41.
It is unrestrained that greatly electric power and calculation power resource caused by the not HASH value of practical significance is calculated compared to traditional PoW algorithm Take, this design object not only can solve system-wide efficiency, and can be used to calculate power by more slack resources In output and transaction data processing, for example, calculation power, which is contributed to human genomic sequence, calculates this kind of item with scientific value Mesh.
The super node of elected PoW node just successfully achieves book keeping operation power, can enjoy the 50% of total revenue, remaining Income is then distributed downwards by contribution degree.The host node of not elected super node cannot participate within this period digs mine and verifying, but That they can receive calculating task, according to the calculation power of contribution how much, to enjoy income.External client submits task to Agent And paid with MAN, it is sent after Agent standardization task to non-top layer verifying node (non-super node), verifies node for task It advanced optimizes decomposition and distributes task to non-top layer PoW node, each calculate node completes that task submits at the appointed time can It is integrated, submits Agent, Agent to deliver to customer result after verifying node integration.Wherein, integral is to aim to execute outside The reward form of the non-top mode design of task, exists in the form of integrating pond.One node is completed to refer at the appointed time Determine task, corresponding integral can be obtained, integral can fulfil the MAN coin reward of external client's payment, these will pass through intelligence Contract is realized.
Data will not be written in block in the task of calculating task, but performance-reward on total mark needs to be written, then Agent is integrated according to this and is provided reward.In addition, strong man's work intelligent task and public good task can be when calculating the power free time It fills up, reward is provided by the reward of defined block.The strong man that computing market closed loop ecology is formd with regard to this and is constantly evolved Work intelligence system.
The design of election cycle, main purpose, which is to provide a stabilization, reasonably to be calculated rent paid in labour and rents time interval, while being protected again Each bottom host node is demonstrate,proved to have the opportunity to become super node completion digging mine and verifying work.Even according to statistics as a result, 1 In the case of ten thousand host nodes, every 2 week, any host node has the opportunity to become super node.
Between two election cycles, the node of elected top mode, which can execute, digs mine and verifying, and not elected section Point can undertake in the meantime and complete external calculating task.After opening new round election, and this process can be repeated.To It ensure that all qualified host nodes can have an opportunity to enjoy and dig mine and verifying income, and can be defeated in the case where not elected The calculation power of oneself gets income out, avoids wasting.
Specific election process is as follows: MATRIX chain of the invention provides a random function, this function will generate one The value in a [0~1] section, and each node is not in the way of overlapping, the ability reported according to itself obtains a section Distribution.Random number falls in that section, and the host node in that section will become the person of winning;Remaining node arranging rule in sequence Ternary tree is formed, the tree network structure of completion is ultimately formed.It practises fraud in order to prevent, for the ability reported, MATRIX chain tool There is a verification algorithm, it is unified that all host nodes are verified in starting block locations at random and in the defined period.Separately Outside, for generating random number, MATRIX chain also has the method for preventing cheating, generates random seed, and random number using joint Seed needs verifier's node to issue in an encrypted form, to guarantee that cheating can not occur.
In addition, black dull defender hiding at random is additionally provided, for ensuring cheating or the connection of miner and verifier Cooperation disadvantage situation is found in time.
MATRIX chain by be arranged it is a kind of it is black dull guard mechanism, with protect disparate networks attack with for conventional Super node Seize attack on both sides by the arms.By setting " black dull defender ", whether mainly real-time verification whole network has cheating, and core is to test Card general ledger counts each account/each transaction categories using Double entry bookkeeping.(it is managed and prison by MATRIX regulator MATRIX project is superintended and directed, such as can be foundation either one of the nomocracy community organization for bearing corresponding function Deng) it will do it deployment, while the Validation Code of this part can be announced.This belongs to voluntary labour, but if discovery has cheating existing As, and notifying regulator, regulator will do it reward.The defender of regulator itself will not be rewarded.
Miner's network
As an example, the election cycle of miner are as follows: 3600 × 2n, n ∈ [- 3 ,+4], unit is the second;N default value is 0;I.e. 1 hour election is primary.
Only schematical above with respect to the election cycle of miner, the present invention is not limited to disclosed embodiments.
Preferably, the election cycle of miner can be 0.25 hour, 0.5 hour, 2 hours, 3 hours.
The main purpose of election cycle design is to provide the reasonable calculation rent paid in labour of stabilizations for miner to rent time interval, simultaneously It can guarantee that each bottom host node has the opportunity to become super node to complete to dig mine and verify work again.According to the knot of statistics Fruit, even in the case of 10,000 host nodes, every two week, any host node has the opportunity to become super node.
On MATRIX chain framework, the value (Value) of each miner is calculated first, this value system conduct Elect the basic foundation of probability.On-line time ranking can be passed through by calculating power evaluation criterion as an example (OrderofOnLineTime), the parameters such as regulation moment of transaction capabilities (TPS), verifying network calculate, and show as one Example, preferred power evaluation criterion of calculating is as shown in following equation 1:
Valueminer(i)=(TPSPower(i)×CoeTPS+Depositstake(i)×CoeSTK)×Lasttime(i),
i∈MasterNodeCollection
Wherein, OrderofOnLineTime indicates on-line time ranking;TPS is transaction capabilities; MasterNodeCollection indicates host node set;Stake indicates the mortgage amount of money of user in a network, usually passes through intelligence It can contract realization;CoeTPSIndicate the coefficient of TPS, CoeSTKIndicate the coefficient of the mortgage amount of money, Valueminer(i) verifying can be passed through Network generates block and obtains in regulation moment, supervision the whole network.
When being elected successfully this election cycle, line duration will halve.Never start when selecting, in addition original Time integral carries out online hours and adds up, and the statistics of online hours is to continue the block time, passes through verifying node and adjacent node It supervises mutually and reaches.
As an example, Valueminer(i) each coefficient in is fixed tentatively as shown in following equation 3:
The method of election are as follows:
1) user all in global listings (global list) is ranked up according to Value value, and is divided into this 32 groups.For example, Value value can be ranked first, the 33rd, the 65th ... user is divided into the 1st group, Value ranking the 2nd, 34, the the 66th ... user is divided into the 2nd group, and so on.
2) host node inside every group is according to Valueminer(i), it is successively arranged from big to small, wherein maximum Value The host node of value is since 0.If the Value value of node is in the same size, arrange from big to small according to corresponding TX Hash (TX Hash is the field value that node is distributed when putting up).The interval range that each node occupies is following equation 4 It is shown:
3) all host node HASH values organized according to the HASH of current block and currently are as basic random seed;In order to Prevent block generator from practising fraud, a pair of of public key and private key will be generated at random by all verifying each of node, and the key pair is not It can be identical as what is generated before;In next block, each verifying node will announce the private key;When verifying node refuses to respond When, it chooses according to fixed form wherein more than the private key of half as verifying random seed;Verify random seed and basis with Machine will generate random number used in election results.The random number is between [0~1].
4) random number falls into that host node section, then the node becomes super node, i.e. SuperNode.
5) ternary tree formation rule, according to breadth First sequence, successively chosen node.Core principles are: first, whole groups Tree construction as far as possible to balanced tree develop;Second, the Connected degree of each node is as close possible to when the node of same layer is not full Timing cannot configure next node layer.Third is preferentially equipped with left sibling, and after then whole left siblings are assorted, then right node is matched It sets.The sequence of node configuration is according to the Value calculatedminer(i) value.It is that it is possible to form one using the advantages of trident tree construction A orderly tree construction, each layer of number of nodes be it is fixed, have fixed relationship, such as set membership, brother between each other Younger brother's relationship, convenient for inquiry.
If previous election appearance is abnormal, or random seed can not be provided, then this election selection closes 32 advised most Miner's node of big Value.If discontented 32, have several, is elected to several.
Verify network
The election cycle for verifying super node is 3600 × 2n, n ∈ [- 3 ,+4], unit is the second;N default value is 0;I.e. 1 Hour election is primary.
Only schematical above with respect to the election cycle of verifying super node, the present invention is not limited to disclosed embodiment party Case.
Preferably, the election cycle for verifying super node can be 0.25 hour, 0.5 hour, 2 hours, 3 hours.
The purpose of the election cycle is the consistency in order to guarantee entire block chain issued transaction.In view of verifying and miner Join possible network instability simultaneously, therefore, the position that 16 blocks generate will be present in proving period and election cycle It moves, causes network connection to be fluctuated so as to avoid the flow that affairs handover generates while verifying and miner.
Verifying super node makes final block by ballot and generates adjustment, and periodically new term election then avoids fixation It verifies the possible plutocracy of super node and gangs up.
One illustrative verifying super node maximum configured is 11, and maximum supports three layers, i.e. L1 layers of attached verifying Node is 22, and L2 layers of attached verifying node is 44, and the attached verifying node of L3 is 88, amounts to 165 available verifyings Node verifies node as candidate.
Only schematical above with respect to the quantity of candidate verifying node, the present invention is not limited to disclosed embodiments.
The quantity of candidate's verifying node is the integer more than or equal to 1, it is therefore preferable to 11,22,44,88,165.
The premise of verifying node can be become:
(1) before the election cycle, the intelligent contract of deposit (Deposit) is submitted, to confirm that deposit can satisfy It is required that the basic condition for becoming verifying node is the verifying ability for for example having 100000MAN, and having such as 2000TPS.
(2) it in the period for determining election, will be verified according to highest 165 nodes of deposit are automatically selected as candidate Node., will be using block timestamp as the first judgement foundation when occurring verifying in the identical situation of node deposit, timestamp is more Early triumph;And the far and near work of HASH Hamming distance (Hamming distance) to elect the HASH value and intelligent contract of block For the second judging basis, the lesser triumph of Hamming distance;Finally using node ID generate the moment as judgement foundation, generation the moment compared with Early triumph.Node except 165 will be automatically performed the execution of intelligent contract, return deposit, and can rejoin In the election of miner's node.
(3) pick out most 165 can with verifying node after, will according to verifying Value value as selecting super node Core foundation, and trident tree construction is generated with this.
It is that it is possible to form an orderly tree, each layer of number of nodes using the advantages of trident tree construction Be it is fixed, have fixed relationship, such as set membership, brotherhood between each other, convenient for inquiry.
Lower level node is not involved in verifying, is only used as the verifying super node election that backup node pond participates in every wheel.There are meanings Justice is exactly that 11 verifying super nodes is avoided to be reappointed or reelected consecutively the behaviors such as bring cheating.
Verify the working principle of block:
(1) verifying block, which will provide, collects Transaction Information and relevant issues (for example, the external calculating task undertaken), and According to loop signature scheme, submit to miner's node, when signature obtain 11 verifying the total wealth weight of super node 75% with On, or 7 signatures are obtained, and wealth value, at 60% or more, block generates effective;Otherwise block will occur and jump block.By mine Work node will adopt (i.e. 11 total wealth weights of verifying super node of signature acquisition unanimously for 11 verifying super nodes are obtained 75% or more, or obtain 7 signature, and wealth value is 60% or more) block content carry out PoW signature, to obtain Reward.
(2) whole nodes (i.e. all 11 verifying super nodes) in block are verified, will be generated according to election HASH value Random sequence, initiate transaction sign test in turn, and collect within the defined period sign tests of other verifying nodes.Due to whole It can establish more stable connection between verifying node, therefore any sign test request must reply, and turnaround time is in local area Within the scope of block audit time.In addition, it is contemplated that network attack situation, sign test can support storage forwarding form to send, i.e., each The obligated forwarding of node transmits other verifying node signatures to this verifying host node.
(3) verifying host node completes basic transaction block (basic transaction block refers to through the block after verifying node verification) It is packaged, and supports by electing network to be sent to all host nodes;In addition, will also be sent to all miner's nodes according to rule; All miner's nodes will send basic transaction block to adjacent host node.In addition, all verifying nodes support RPC form to provide transaction Block message.Wherein, verifying host node be 11 verifying super node in head (Leader) verifying nodes, other 10 be from (Follower) node is verified, and is elected in turn by algorithm election.
(4) by packing free transaction block, (free transaction block refers to some areas that miner oneself is collected into each miner's node Block), free transaction block content needs and basic transaction block content duplicate removal, and after the completion of digging mine, submits to the whole network.At this point, testing Card transaction node will check entire block legitimacy, and legitimacy is confirmed in next basic transaction block, that is, include 11 The signature of a verifying super node.If verified, node confirmation is illegal, and miner loses the packing qualification of this election cycle;The node Corresponding 2 child nodes, which will fill vacancies in the proper order, carries out digging mine;And all miners restart to basic transaction block before and local free block It is packaged.
Verify node power to acquisite approachs
(1) the highest 165 verifyings node of deposit is selected, corresponding Value is then calculatedverifer(i), i ∈ [1, 165], wherein shown in the following equation 5 of calculation formula:
Valueverifier(i)=Stake (i) × Lasttime(i) (equation 5)
Wherein, Stake (i) is the MAN quantity of i-th of verifying node mortgage, Lasttime(i) node is verified for i-th On-line time;After wherein user is elected to, it to be used for the online hours Last calculatedtime(i) will halve, what is reduced by half will not Reduce by half again.For example, party A-subscriber, before user becomes verifying super node, original online hours are 1000 blocks, then Lasttime(i)=1000, after the formal super node as verifying, Lasttime(i)=500;If the verifying of each election cycle Super node continues 240 blocks, then the node is equivalent before election next timeSuch as Fruit is elected to again, then equivalent duration becomesIf equivalent again without elected Duration becomes Lasttime(i)=620+240=860.
(2) election algorithm:
165 candidate verifying nodes are according to Valueverifer(i) it is successively arranged from big to small, is then divided into 11 Group is (for example, can be by Valueverifer(i) value is ranked first, the 12nd, the 23rd ... user is divided into the 1st group, Value value ranking 2nd, the 13rd, the 24th ... user is divided into the 2nd group, and so on), then elect a node for each group.
Wherein in each group, all nodes are according to Value value size, and add up arrangement since 0, and whole range of nodes occupy [0~1].If node Value value is in the same size, arrange from big to small according to corresponding TX Hash.What each node occupied Interval range is that wherein interface point is all for previous node:
Therefore, all host node HASH values organized according to the HASH of current block and currently are as basic random seed; Block generator practises fraud in order to prevent, and all node is each will generate a pair of of public key and private key at random for verifying, and the key pair is not It can be identical as what is generated before;In next block, each verifying node will announce the private key;When verifying node refuses to respond When, it chooses according to fixed form wherein more than the private key of half as verifying random seed;Verify random seed and basis with Machine will generate random number used in election results.The random number is between [0~1].
If previous election appearance is abnormal, or random seed can not be provided, then this election selection closes 11 advised most The verifying node of big Value value.If discontented 11, have several, is elected to several.
Verify node power lost path
Node is verified, is not responded to if there is cheating or continuous 6 block sign tests, other host nodes will be consistent to its After voting, then verifying power is lost.The consistent voting is initiated by super node, and needs to obtain the signature of the whole network host node 2/3 With the Stake for the whole network host node for being more than 50%, and block is written.
It guards node and impeaches network
One verifying node of independent deployment and one are guarded section by the malicious attack of network in order to prevent, MATRIX regulator Point.The verifying node of MATRIX regulator will be returned uncontested to verify super node in the case where keeping normal online situation, and with Other verifying super nodes work together.All conditions and income distribution method are consistent with other verifying super nodes.
All Activity information can then be audited, and by rule built in MATRIX to the exception of discovery by guarding node The broadcast of the whole network host node is carried out, then abnormal transaction is verified by the whole network host node.If it turn out that then starting mine to be abnormal The impeachment of work and abnormal verifying super node.It impeaches and mainly passes through the consistent table of simple majority (Simple Majority) host node Certainly surmount 2/3 two conditions with the Stake of whole host nodes to reach, can be completed.The process carries out message biography by P2P network Pass and broadcast completion.It is set up if impeached, current term election node failure, into standard the whole network host node PoW mode, and from different Normal block starts, and all fails to the block generated during impeachment.Node is guarded to be only capable of impeaching within the scope of current 24 blocks It is abnormal.If guarded, node sends spoofing or voting does not pass through, and block remains valid.
Node is guarded by impeaching successfully, and by sending corresponding signature information to regulator, to obtain regulator The impeachment reward individually sent.And guard node and impeach failure, then need to undertake in the follow-up election period at least 24 blocks Miner's reward.
It can be anonymous node due to guarding node, any one node can serve as guarding node, both can be with The message is sent to full node, to forward the message by full node;It is also possible to full node itself verification, to find different Often.
The unexpected message response of all necessary processing system of any one full node, and after confirmation, carry out signature forwarding.When Receiving system host node is more than simple majority to the abnormal signature of same event, and decides by vote and agree to that the Stake of node is more than all The 2/3 of host node Stake can be transferred to standard the whole network host node PoW mode, terminate until this election cycle.
Network profit distributes method
Integral dispensing principle as an example is as shown in table 3 below:
Table 3
Miner is always rewarded, the block reward distribution of income principle of an exemplary is as follows, subsequent to will do it according to net Network operation conditions is adjusted, and core principles are the lasting longtime runnings for guaranteeing network, as shown in table 4 below:
Table 4
After reaching total amount, block tranaction costs and external service payment procedure expense will be rewarded as core, and mine is dug in support Income.
Any one host node of MATRIX chain framework can accept external CPU calculating task or AI task, and complete Realize that process needs task distribution network/verifying network and external agent to complete in portion.These be by MATRIX inside wisdom Contract and it is divided into mode and completes.In addition, completing to calculate every time, there is a contract expense duration of freezing, is used for external generation Boundary carries out certain verifying, after verifying, can thaw in advance or timing is thawed.
Verifier is rewarded, the distribution principle of an exemplary is as shown in table 5 below:
Table 5
Further, since Agent can support oracle database business, and complete the conversion of external various calculating tasks, Therefore it needs to provide intelligent contract by superblock (Superblock) by Agent and the reward method of salary distribution forms support, such as Shown in the following table 6:
Table 6
The common recognition algorithms selection of MATRIX
Common recognition algorithm is the key that influence a currency stabilization, and common recognition algorithm can be divided into three classes: (1) CPU-like;(2) GPU-like;(3)ASIC-like.Every kind represents a kind of interests style.
Usual CPU/GPU-Like, ordinary user can intervene, while can also be added by calculating power rental basis;And ASIC-like then faces the profession competition of ASIC-like.
In order to facilitate community users wide participation, increase community's active degree, more community users are more deepened Understand the operating mechanism of MATRIX chain framework with entering.MATRIX has used the algorithm more friendly for home computer, Yi Jiji Draw adaptation plate/mobile phone terminal digging mine software so as to community anywhere or anytime with MATRIX common recognition network connection together with.
In addition, due to the presence of profession calculation power leasing market (for example, NICEHASH), the PoW algorithm of all existing maturations, External attacker can buy calculation power from calculation power market and implement 51% attack to it.Such attack is set without purchasing a large amount of mines of digging It is standby, it is only necessary to pay the calculation power price in certain time, therefore greatly reduce intrusion scene.And the PoW algorithm of MATRIX with Current all kinds of PoW algorithms are different, the markov Meng Teka of training process or Bayesian inference based on deep learning Lip river algorithm (MCMC) algorithm.As an example, the common recognition algorithm of MATRIX will be based on AI matrix operation, in addition novel HASH group The mode of conjunction designs PoW algorithm.Meanwhile algorithm of knowing together will also be adjusted to support the two-way support of GPU/CPU, to guarantee main section The participating user of point is enough.
In addition, calculate rent paid in labour rent it is unstable with miner, will bring the whole network calculate power fluctuation, block stability out is caused Extreme influence.Therefore, MATRIX will use the adjusting of difficulty algorithm of dynamic tracing, and utilize verifier, carry out fixture block time-out Consistency decides by vote mechanism, to avoid the catastrophic effect of block generation fluctuation.
Therefore, MATRIX will by one it is reasonable calculate power deployment and common recognition algorithm design, guarantee value of money stabilization and into Change.Concrete measure includes:
(1) MATRIX will provide smooth upgrade scheme, and announce corresponding counter-measure and scheme in community in advance, After knowing together to community, upgraded.
(2) the common recognition algorithm of MATRIX uses the new algorithm of GPU and CPU close friend.
(3) MATRIX makes final block and generates adjustment and principle of supervising by verifier;Under normal circumstances, the section The effect of point will not embody.
By mentioned above principle, MATRIX will realize stably generating for entire block, and mention for the realization of intelligent algorithm Power basis is calculated for enough realizations.
The common recognition mechanism of MATRIX can be considered as the fusion of " super node+PoW ", introduce AI core technology, taking into account Meet performance and security requirement while centralization.
The PoW common recognition mechanism of ordinary circumstance is calculating service (calculation power X of all nodes of the whole network according to oneself for network contribution Duration) obtain remuneration, that is, dig mine.The distinct disadvantage done so is exactly the wasting of resources, because being related to a large amount of millis Meaningless calculating task.
MATRIX network introduces novel mixing common recognition mechanism.In addition to ordinary node, the general of super node is also introduced It reads.Can be as the candidate of super node as long as each host node meets qualification, selection cycle can be 15 minutes to 1 small When.Random algorithm can select such as 32 super nodes under same probability and carry out PoW digging mine.In 32 digging mine super node layers Secondary, common recognition mechanism still continues to use PoW, i.e. node competes with one another for, and the node that completion work proves first will obtain reward.32 sections The processing speed of point is necessarily involved in than whole nodes fast very much.On the other hand, super node and its between cluster node be Cooperative relationship.Either what kind of super node may all be limited by the computing capability of equipment, and transaction and processing speed are limited 's.MATRIX devises a tree network, and super node can distribute to transaction verification and proof of work task under it Node layer completes corresponding calculate with concurrent fashion.The chance that top layer PoW is won in stronger calculation power increase can be obtained by doing so. It has a three advantages: first, the redundancy of effort between node largely reduces;Second, the verifying of parallel computation General Promotion is handed over The calculated performance of easy handling capacity and proof of work;Third, block chain network can be organized to be defeated similar to extensive calculation power Platform out.
The PoW of MATRIX network eliminates the reliance on traditional Hash calculation, but use deep learning training process or The markov Monte carlo algorithm (MCMC) of Bayesian inference is used as proof of work.That is, MATRIX network is total to Knowledge mechanism is calculated power for public good and is designed.The special machine learning task publisher node of MATRIX network arrangement, can be with Receive the model and training data that need user to specify.32 top modes are when carrying out common recognition calculating, first from publisher node Task is got, completion task is then competed.Training data and task are assigned to following node by top mode, using asynchronous point Machine learning training process is completed in cloth parallel computation.Such as in depth network training task, each node instructs a part Practice sample to carry out processing calculating gradient and be submitted to other nodes, each node updates gradient with asynchronous, distribution mode;Top layer simultaneously 32 nodes respectively lead the lower level node of oneself to be trained, take the lead in completing training (such as reaching certain accuracy of identification) Super node wins awards, and shared with its lower level node.
One exemplary based on the bottom-up election Python of host node, (it is a kind of explanation type, object-oriented, dynamic The high-level programming language of state data type) algorithm, having uploaded to GitHub, (it is one towards open source and privately owned software The hosted platform of project), it is subsequent to do more improvements, it is ensured that entire MATRIX is run steadily in the long term.
The digging mine and verifying process of MATRIX:
Fig. 5 is the digging mine of MATRIX chain according to the present invention and the schematic diagram of verifying process.Miner's super node is by this section Point transaction is broadcast to all verifying super nodes → verifying host node and initiates block verifying, new to the broadcast of all verifying super nodes Block → each verifying super node completes block verifying within given time, and to all verifying host node verifying broadcasts results → any verifying super node is collected into the verifying signature set for meeting common recognition condition, that is, is broadcast to miner's super node, miner Super node starts to dig after mine → miner's super node goes out block using the success of PoW algorithm-digging mine, by random number N once (Number Used once), CoinBase, block Hash (Block Hash) be transmitted to verifying super node (if miner's super node is specified Do not go out block, the digging mine result for spare miner's super node that verifying super node can select regulator to safeguard in time)
Specific embodiments of the present invention are described in detail above, it is to be understood that, without departing from the spirit of the present invention may be used To be modified to it.Claim of the invention is intended to cover these modifications, to guarantee that it falls into true scope of the invention In spirit.

Claims (7)

1. a kind of MATRIX chain framework comprising:
Core network comprising a series of full node, the full node include host node and ordinary node;Wherein, host node Reach 1000TPS to calculate power, provide 10000MAN coin, and support the node of RPC service, provides and dig mine and externally service;It is flat All nodes are to be synchronized whole blocks, and have the node of information propagation capabilities, provide external calculation power output;
IPFS network service will be suspended to full node completion by connecing;
AI service, host node will be directly connected to the free AI ancillary service node that the whole network provides by common interface form, should Node will be provided including language identification, image/video optimization, the optimization of AI parameter model, auxiliary commissioning interface;
External service acts on behalf of Agent interface, and completion internal computing resources are exchanged with external resource, and are propped up and cashed and hand over cash in hand Easily, any one external equipment for seeking MATRIX network capabilities and AI ability is completed various exchanges and is made by Agent interface With.
2. MATRIX chain framework according to claim 1, wherein the node deployment of the MATRIX chain framework is using routing Device mode, node can be multiple host nodes and be spliced, and be also possible to host node and other host nodes common shape through consultation At.
3. MATRIX chain framework according to claim 1, wherein on the basis of host node, use elects 32 at random step by step A super node, 21 super nodes therein are selected as PoW node again and carry out digging mine, then independently to elect 11 verifyings super Node is exercised supervision and is adjudicated, and provides the distribution verifying of calculating task.
4. MATRIX chain framework according to claim 3, wherein
The election cycle of miner's super node is 3600 × 2n, n ∈ [- 3 ,+4], unit is the second, and n default value is 0;
The value of each miner is calculated, calculate power evaluation criterion can by on-line time ranking, transaction capabilities, test It demonstrate,proves the parameters such as the regulation moment of network to calculate, and provides a random function, this function will generate 0~1 section Value, and each node is in the way of being mutually overlapped, the ability reported according to itself obtains a section distribution, and random number falls in that The host node in a section, that section will become super node;Arranging rule forms trident tree construction to remaining node in sequence.
5. MATRIX chain framework according to claim 3, wherein
The election cycle of the verifying super node is 3600 × 2n, n ∈ [- 3 ,+4], unit is the second, and n default value is 0;
According to highest 165 nodes of deposit are automatically selected, node is verified as candidate, verifying node cash pledge is identical when occurring In the case where, it will be using block timestamp as the first judgement foundation, the triumph of timestamp earlier;And the HASH value to elect block It is far and near with the HASH Hamming distance of intelligent contract, as the second judging basis, the lesser triumph of Hamming distance;Finally with node ID The moment is generated as judgement foundation, the generation moment wins earlier;Node except 165 will be automatically performed intelligent contract It executes, returns deposit, and can rejoin in the election of miner's node;
After picking out most 165 available verifying nodes, as the foundation of election verifying super node, selected according to validation value Enumerate 11 verifying super nodes;
Verifying host node is the first verifying node verified in super node, is elected in turn also by algorithm election.
6. MATRIX chain framework according to claim 3, wherein MATRIX regulator independently dispose a verifying node and One is guarded node, and the verifying node, will be returned uncontested to verify super node in the case where keeping normal online situation, and and its It verifies super node and works together;The built-in rule guarded node and pass through MATRIX chain structure, to All Activity information It is audited, and the broadcast of the whole network host node is carried out to the abnormal of discovery, then abnormal transaction is verified by the whole network host node.
7. MATRIX chain framework according to claim 1, wherein the common recognition mechanism of MATRIX chain structure uses deep learning Training process or Bayesian inference markov Monte carlo algorithm MCMC as proof of work.
CN201810955983.2A 2017-08-22 2018-08-21 Block chain structure Active CN109426952B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710723728 2017-08-22
CN2017107237280 2017-08-22

Publications (2)

Publication Number Publication Date
CN109426952A true CN109426952A (en) 2019-03-05
CN109426952B CN109426952B (en) 2021-06-01

Family

ID=65514559

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201810956219.7A Active CN109427012B (en) 2017-08-22 2018-08-21 Transaction and verification method based on block chain
CN201810955798.3A Active CN109426567B (en) 2017-08-22 2018-08-21 Node deployment and election method of block chain
CN201810955983.2A Active CN109426952B (en) 2017-08-22 2018-08-21 Block chain structure

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN201810956219.7A Active CN109427012B (en) 2017-08-22 2018-08-21 Transaction and verification method based on block chain
CN201810955798.3A Active CN109426567B (en) 2017-08-22 2018-08-21 Node deployment and election method of block chain

Country Status (1)

Country Link
CN (3) CN109427012B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109688012A (en) * 2018-12-29 2019-04-26 杭州趣链科技有限公司 A kind of method of alliance's chain node hot standby switch
CN109768935A (en) * 2019-03-14 2019-05-17 海南梯易易智能科技有限公司 Wireless router and its method for safe operation with intelligent recognition and filtering function
CN109922155A (en) * 2019-03-18 2019-06-21 众安信息技术服务有限公司 The method and device of intelligent agent is realized in block chain network
CN109951481A (en) * 2019-03-19 2019-06-28 全链通有限公司 Information processing method and system based on block chain network adjacent node
CN110417883A (en) * 2019-07-23 2019-11-05 杭州云象网络技术有限公司 A kind of design method of the point to point network structure applied to block chain
CN110460471A (en) * 2019-08-15 2019-11-15 广州蚁比特区块链科技有限公司 A kind of super node polling method, device and storage medium
CN110611701A (en) * 2018-08-21 2019-12-24 汇链丰(北京)科技有限公司 Parameter configuration and transaction processing method based on block chain
CN110995408A (en) * 2019-12-19 2020-04-10 深圳市超算科技开发有限公司 Distributed computing method and system based on data encryption
CN111314374A (en) * 2020-03-11 2020-06-19 上海交通大学 Block chain structure for quick verification and generating system and verification method thereof
CN111539729A (en) * 2020-05-21 2020-08-14 北京俩撇科技有限公司 Transaction signature checking method and device based on block chain
CN111598569A (en) * 2020-05-21 2020-08-28 昆明大棒客科技有限公司 Tree block chain expansion method and device
CN111679905A (en) * 2020-05-11 2020-09-18 天津大学 Calculation network fusion network model
CN112235379A (en) * 2020-09-30 2021-01-15 电子科技大学 Block chain bottom layer shared storage method
CN113841359A (en) * 2019-04-12 2021-12-24 区块链控股有限公司 Method and apparatus for propagating tiles in a blockchain network
CN111193596B (en) * 2019-12-30 2023-09-05 达闼机器人股份有限公司 Block generation system, method, server and workload verification device

Families Citing this family (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110060159A (en) * 2019-03-12 2019-07-26 蔡少龙 Data processing method and device based on super node
CN109993004B (en) * 2019-04-10 2020-02-11 广州蚁比特区块链科技有限公司 Block chain autonomous method and system based on credit mechanism
CN109800211B (en) * 2019-04-17 2019-08-13 深圳市先河系统技术有限公司 Control method, system and the relevant device of decentralization storage
CN110188137B (en) * 2019-04-19 2021-08-31 杭州电子科技大学 Integrity-based block chain consensus mechanism
CN112036875A (en) * 2019-06-03 2020-12-04 厦门本能管家科技有限公司 Sequencing block transaction method and system
CN110245147B (en) * 2019-06-19 2021-08-13 腾讯科技(深圳)有限公司 Block chain data processing method and device, readable storage medium and computer equipment
CN110300167B (en) * 2019-06-28 2020-07-31 京东数字科技控股有限公司 Service information processing method and device based on block chain and readable storage medium
CN110378697B (en) * 2019-07-22 2023-03-31 南京信息工程大学 Block chain light node UTXO transaction verification method and device based on RSA accumulator
CN110535654B (en) * 2019-07-23 2021-09-14 平安科技(深圳)有限公司 Block chain based parallel system deployment method and device and computer equipment
CN110413345A (en) * 2019-07-26 2019-11-05 云湾科技(嘉兴)有限公司 Program verification method, calculates equipment and computer storage medium at device
CN110543757B (en) * 2019-08-01 2023-06-06 立旃(上海)科技有限公司 Authentication incentive method and system based on block chain
CN110517140B (en) * 2019-08-26 2020-08-04 华东师范大学 Block chain intelligent contract transaction concurrent execution method
CN110675257B (en) * 2019-09-12 2022-09-06 广州蚁比特区块链科技有限公司 Block group chain construction method and device
CN112600866A (en) * 2019-10-02 2021-04-02 陈小虎 Simple and efficient tandem service workload proving scheme
CN110933088B (en) * 2019-12-02 2022-11-08 深圳启元信息服务有限公司 Decentralization verifiable hiding representing method and system based on block chain
CN113383364B (en) * 2019-12-03 2023-05-16 深圳市迅雷网络技术有限公司 Method, electronic equipment, system and medium for selecting nodes of verifier
CN111130790B (en) * 2019-12-09 2022-06-10 四川星际荣威科技有限公司 Block co-recognition method based on block chain node network
CN111191212B (en) * 2019-12-31 2020-12-15 卓尔智联(武汉)研究院有限公司 Block chain-based digital certificate processing method, device, equipment and storage medium
CN111049696B (en) * 2020-03-16 2020-06-12 支付宝(杭州)信息技术有限公司 Method, node and computing device for node management of blockchain system
CN111432014B (en) * 2020-03-30 2023-05-05 上海玳鸽信息技术有限公司 Method and device for selecting main node in block chain consensus algorithm
CN113742417A (en) * 2020-05-29 2021-12-03 同方威视技术股份有限公司 Multi-level distributed consensus method and system, electronic device and computer readable medium
CN111654492B (en) * 2020-06-01 2022-04-26 中国联合网络通信集团有限公司 Method and device for preventing block chain attack
CN112491823B (en) * 2020-11-13 2022-07-19 齐鲁工业大学 DDoS attack joint defense system and method based on block chain
CN112799867B (en) * 2021-02-03 2022-02-18 柏科数据技术(深圳)股份有限公司 Election method based on distributed storage system and distributed storage system
CN112991058B (en) * 2021-02-19 2023-09-22 区块动力(广州)科技有限公司 Verification method and system for conducting transaction based on blockchain
CN112835855A (en) * 2021-02-22 2021-05-25 北京众享比特科技有限公司 File storage method and system based on block chain
CN112948853A (en) * 2021-02-26 2021-06-11 安徽航天信息科技有限公司 Block chain-based medical data sharing method, device, equipment and storage medium
CN112948501B (en) * 2021-05-13 2021-08-10 支付宝(杭州)信息技术有限公司 Data analysis method, device and system
CN113641631B (en) * 2021-08-10 2023-05-23 深圳技术大学 IPFS file management method, device and storage medium based on block chain
CN114708773A (en) * 2021-10-11 2022-07-05 深圳市海凌科电子有限公司 Block chain teaching system
CN114499885B (en) * 2022-02-14 2024-03-19 中国农业银行股份有限公司 Workload proving method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864198A (en) * 2017-11-07 2018-03-30 济南浪潮高新科技投资发展有限公司 A kind of block chain common recognition method based on deep learning training mission

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017109140A1 (en) * 2015-12-22 2017-06-29 Bigchaindb Gmbh Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction
CN105719185B (en) * 2016-01-22 2019-02-15 杭州复杂美科技有限公司 The data comparison and common recognition method of block chain
CN106445711B (en) * 2016-08-28 2019-04-30 杭州云象网络技术有限公司 A kind of Byzantine failure tolerance common recognition method applied to block chain
CN106656974B (en) * 2016-10-17 2019-07-16 江苏通付盾科技有限公司 The grouping common recognition method and system of block chain
US10862959B2 (en) * 2016-11-28 2020-12-08 Keir Finlow-Bates Consensus system and method for adding data to a blockchain
CN106651332B (en) * 2016-12-29 2020-11-06 成都质数斯达克科技有限公司 Method for generating new block in block chain and block chain
CN110445619B (en) * 2017-03-30 2020-10-16 腾讯科技(深圳)有限公司 Block chain system, message processing method and storage medium
CN108390891A (en) * 2018-03-28 2018-08-10 电子科技大学天府协同创新中心 Information protecting method based on privately owned block chain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864198A (en) * 2017-11-07 2018-03-30 济南浪潮高新科技投资发展有限公司 A kind of block chain common recognition method based on deep learning training mission

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
NICK: "Ask MATRIX第七期互动精选", 《MATRIX新一代区块链》 *
SERENA: "Ask MATRIX第一期互动精选", 《MATRIX新一代区块链》 *
张大侠: "EOS去中心化的社会实验和MATRIX去中心化的落地实践", 《MATRIX新一代区块链》 *
熊佰祥: "共识机制问题频发,HPoW或将带来变革", 《MATRIX新一代区块链》 *

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110611701A (en) * 2018-08-21 2019-12-24 汇链丰(北京)科技有限公司 Parameter configuration and transaction processing method based on block chain
CN109688012A (en) * 2018-12-29 2019-04-26 杭州趣链科技有限公司 A kind of method of alliance's chain node hot standby switch
CN109768935A (en) * 2019-03-14 2019-05-17 海南梯易易智能科技有限公司 Wireless router and its method for safe operation with intelligent recognition and filtering function
CN109768935B (en) * 2019-03-14 2023-10-10 海南梯易易智能科技有限公司 Wireless router with intelligent recognition and filtering functions and safe operation method thereof
CN109922155A (en) * 2019-03-18 2019-06-21 众安信息技术服务有限公司 The method and device of intelligent agent is realized in block chain network
CN109922155B (en) * 2019-03-18 2022-03-04 众安信息技术服务有限公司 Method and device for realizing intelligent agent in block chain network
CN109951481B (en) * 2019-03-19 2021-01-15 全链通有限公司 Information processing method and system based on block chain network adjacent nodes
CN109951481A (en) * 2019-03-19 2019-06-28 全链通有限公司 Information processing method and system based on block chain network adjacent node
CN113841359A (en) * 2019-04-12 2021-12-24 区块链控股有限公司 Method and apparatus for propagating tiles in a blockchain network
CN110417883A (en) * 2019-07-23 2019-11-05 杭州云象网络技术有限公司 A kind of design method of the point to point network structure applied to block chain
CN110417883B (en) * 2019-07-23 2021-09-24 杭州云象网络技术有限公司 Design method of point-to-point network structure applied to block chain
CN110460471A (en) * 2019-08-15 2019-11-15 广州蚁比特区块链科技有限公司 A kind of super node polling method, device and storage medium
CN110995408B (en) * 2019-12-19 2023-08-15 深圳市乾数科技有限公司 Distributed computing method and system based on data encryption
CN110995408A (en) * 2019-12-19 2020-04-10 深圳市超算科技开发有限公司 Distributed computing method and system based on data encryption
CN111193596B (en) * 2019-12-30 2023-09-05 达闼机器人股份有限公司 Block generation system, method, server and workload verification device
CN111314374A (en) * 2020-03-11 2020-06-19 上海交通大学 Block chain structure for quick verification and generating system and verification method thereof
CN111679905A (en) * 2020-05-11 2020-09-18 天津大学 Calculation network fusion network model
CN111679905B (en) * 2020-05-11 2022-03-08 天津大学 Calculation network fusion network model system
CN111598569A (en) * 2020-05-21 2020-08-28 昆明大棒客科技有限公司 Tree block chain expansion method and device
CN111539729A (en) * 2020-05-21 2020-08-14 北京俩撇科技有限公司 Transaction signature checking method and device based on block chain
CN111598569B (en) * 2020-05-21 2023-09-08 昆明大棒客科技有限公司 Tree block chain expansion method and device
CN112235379A (en) * 2020-09-30 2021-01-15 电子科技大学 Block chain bottom layer shared storage method

Also Published As

Publication number Publication date
CN109427012A (en) 2019-03-05
CN109427012B (en) 2021-06-01
CN109426567B (en) 2021-05-04
CN109426952B (en) 2021-06-01
CN109426567A (en) 2019-03-05

Similar Documents

Publication Publication Date Title
CN109426952A (en) A kind of block chain framework
Bouraga A taxonomy of blockchain consensus protocols: A survey and classification framework
Ferdous et al. Blockchain consensus algorithms: A survey
Chen et al. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology
Xiao et al. A survey of distributed consensus protocols for blockchain networks
Wang et al. Challenges of blockchain in new generation energy systems and future outlooks
Zheng et al. An overview of blockchain technology: Architecture, consensus, and future trends
Zheng et al. Blockchain challenges and opportunities: A survey
Yu et al. Proof-of-QoS: QoS based blockchain consensus protocol
Zheng et al. Blockchain challenges and opportunities: A survey
US20190370793A1 (en) Hybrid consensus for blockchain using proof of work and proof of stake
CN109964242A (en) A kind of block chain common recognition method based on trusting relationship
CN110580653A (en) Block chain consensus mechanism based on transaction
Sun et al. Rtchain: A reputation system with transaction and consensus incentives for e-commerce blockchain
US20220012806A1 (en) Electricity market trading and evaluation method based on weak centralized consortium blockchain
CN111131184A (en) Autonomous adjusting method of block chain consensus mechanism
Choobineh et al. Game-theoretic peer-to-peer solar energy trading on blockchain-based transaction infrastructure
Kumar et al. Peer consonance in blockchain based healthcare application using ai-based consensus mechanism
Motepalli et al. Sok: Decentralized sequencers for rollups
Putra et al. Decentralised trustworthy collaborative intrusion detection system for IoT
Deuber et al. Minting Mechanisms for Blockchain--or--Moving from Cryptoassets to Cryptocurrencies
Zhao et al. Blockchain-based decentralized federated learning: A secure and privacy-preserving system
Wang et al. Revisiting the fairness and randomness of delegated proof of stake consensus algorithm
Wang et al. Design and analysis of an effective securing consensus scheme for decentralized blockchain system
Di Stefano et al. Resolution of Blockchain Conflicts through Heuristics-based Game Theory and Multilayer Network Modeling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant