CN109462587A - Block chain is layered common recognition method, block chain network system and block chain node - Google Patents
Block chain is layered common recognition method, block chain network system and block chain node Download PDFInfo
- Publication number
- CN109462587A CN109462587A CN201811336181.XA CN201811336181A CN109462587A CN 109462587 A CN109462587 A CN 109462587A CN 201811336181 A CN201811336181 A CN 201811336181A CN 109462587 A CN109462587 A CN 109462587A
- Authority
- CN
- China
- Prior art keywords
- common recognition
- node
- business datum
- local links
- visible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
Abstract
The embodiment of the present application provides a kind of block chain layering common recognition method, block chain network system and block chain node, belongs to block chain technical field.This method comprises: obtaining business datum to be known together, determine the visible permission of business datum, in visible permission permission visible for the first kind, common recognition node business datum being sent in local links, to carry out common recognition processing to business datum by the common recognition node in local links, in visible permission permission visible for the second class, business datum is sent to the common recognition node in global chain, to carry out common recognition processing to business datum by the common recognition node in global chain.It can be seen that; selection in local links or in global chain can be selected to share the business datum based on the different visible permission of business datum; it is i.e. more in Internet of things node number and when network environment is various; it can be according to trust and data degree of privacy; selective public data; so that the spread scope of the business datum is substantially reduced, data-privacy protecting effect is improved.
Description
Technical field
This application involves block chain technical fields, are layered common recognition method, block link network in particular to a kind of block chain
Network system and block chain node.
Background technique
Block chain technology is also referred to as distributed account book technology, is a kind of distributed interconnection database technology.Based on block
The network of chain technology building can be referred to as block chain network, (can also be referred to as in the block chain network comprising network node
For block chain node, hereinafter referred to as node), each node corresponds at least one block chain, on each block chain at least
Include a block.Block chain network (or block chain technology) have decentralization, it is open and clear, can not distort, trusted
The features such as.Based on these features, block chain technical applications are more and more extensive.
In Internet of Things application scenarios, since Internet of things node number is more, network environment multiplicity, if necessary to shared letter
The Internet of things node for ceasing and establishing trust systems, because of the difference of trusting degree and environmental factor, determines under entire trust systems
Shared data is also different, and all nodes in existing block chain network can participate in the shared of data, make total
According to spread scope it is very big, it is shared that can not data be carried out with selection, and then cannot achieve data-privacy protection.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of layering of block chain common recognition method, block chain network
System and block chain node.
In a first aspect, the embodiment of the present application provides a kind of block chain layering common recognition method, applied to the section in local links
Point, the local links are the network that multiple nodes in block chain network are formed, which comprises obtain business to be known together
Data determine the visible permission of the business datum;In visible permission permission visible for the first kind, by the business number
According to the common recognition node being sent in the local links, to be carried out by the common recognition node in the local links to the business datum
Common recognition processing, wherein the visible permission of the first kind shows that the business datum needs carry out at common recognition in the local links
Reason;In visible permission permission visible for the second class, the business datum is sent to the common recognition node in global chain, with
Common recognition processing is carried out to the business datum by the common recognition node in the global chain, wherein the overall situation chain is each office
The network that at least one node chosen in portion's chain is formed together.
During above-mentioned realization, the business datum by treating common recognition determines corresponding visible permission, is then based on not
Same visible permission selects selection in local links or in global chain to share the business datum, i.e., more in Internet of things node number
It, can be according to trust and data degree of privacy, selective public data, so that the business datum and when network environment multiplicity
Spread scope be substantially reduced, improve data-privacy protecting effect, with it is existing realization data-privacy protection block chain skill
Art is compared, and there is no the risks that transaction data is arbitrarily propagated, and improves the safety of data dissemination.
Optionally, in visible permission permission visible for the second class, the business datum is sent to the overall situation
Common recognition node in chain, to carry out common recognition processing to the business datum by the common recognition node in the global chain, comprising:
When the visible permission is the second class visible permission, then first pass through common recognition node in the local links to the business datum into
Row common recognition processing after, then by it is described the overall situation chain in common recognition node common recognition processing is carried out to the business datum.
During above-mentioned realization, before business datum is known together in global chain, first know together in local links, so
It knows together in global chain again afterwards, so that the data known together in global chain are that user wishes number that is shared and transmitting
According to improve data-privacy protecting effect.
Optionally, described to obtain business datum to be known together, before the visible permission for determining the business datum, also wrap
Include: by from the common recognition node broadcasts selected in the local links to other nodes in the local links so that other described sections
Whether point is to agreeing to that providing common recognition service by the common recognition node that selects votes;It is that the first kind can in the visible permission
When seeing permission, the business datum is sent to the common recognition node in the local links, to pass through the common recognition in the local links
Node carries out common recognition processing to the business datum, comprising: for the visible permission of the first kind and is receiving in the visible permission
When the common recognition sent to other described nodes passes through message, the common recognition section that the business datum is sent in the local links
Point, to carry out common recognition processing to the business datum by the common recognition node in the local links.
During above-mentioned realization, part of nodes is selected from the node in local links as common recognition node, so that not having to
All nodes all participate in common recognition process, reduce the number of nodes for participating in common recognition process, improve the efficiency of decision-making.
Optionally, the local links are according to the different by the block chain of the differences of application scenarios or data-privacy degree
Multiple nodes in network are divided and the network that is formed.
During above-mentioned realization, local links are divided according to application scenarios or data-privacy degree, so as to root
It is divided into different local links according to user demand, allows to realize the shared of data inside local links, and between local links
Cannot shared data, improve data-privacy protecting effect.
Second aspect, the embodiment of the present application provide a kind of block chain network system, and the block chain network system includes
Multiple nodes, the multiple node divide form multiple networks, and each network is a local links, in each local links
Node is fully visible for business datum and has the visible permission of the first kind, can not for business datum between different local links
See, selects the network that at least one node is formed together respectively from each local links and be used as global chain;In business datum can
When seeing that permission is the visible permission of the first kind, the business datum is carried out at common recognition by the common recognition node in the local links
Reason, in the visible permission of business datum permission visible for the second class, by the common recognition node in the global chain to the industry
Business data carry out common recognition processing.
It is local links and global chain by multiple node divisions in block chain network system, to industry during above-mentioned realization
Two layers of common recognition mechanism of local links and global chain may be implemented in business data, so that the spread scope of the business datum contracts significantly
It is small, improve data-privacy protecting effect.
The third aspect, a kind of block chain node, the block chain node include:
Data acquisition module determines the visible permission of the business datum for obtaining business datum to be known together;
Local links' common recognition processing module is used in visible permission permission visible for the first kind, by the business number
According to the common recognition node being sent in the local links, to be carried out by the common recognition node in the local links to the business datum
Common recognition processing, wherein the visible permission of the first kind shows that the business datum needs carry out at common recognition in the local links
Reason;
Global chain common recognition processing module is used in visible permission permission visible for the second class, by the business number
According to the common recognition node being sent in global chain, to be known together by the common recognition node in the global chain to the business datum
Processing, wherein the overall situation chain is the network that at least one node chosen in each local links is formed together.
Optionally, the global chain common recognition processing module, is specifically used in the visible permission being the visible permission of the second class
When, then it first passes through after the common recognition node in the local links carries out common recognition processing to the business datum, then pass through the overall situation
Common recognition node in chain carries out common recognition processing to the business datum.
Optionally, the block chain node further include:
Common recognition node selection module, for that will be given in the local links from the common recognition node broadcasts selected in the local links
Other nodes so that whether other described nodes to agreeing to that providing common recognition service by the common recognition node that selects throws
Ticket;
Local links' common recognition processing module, for being the visible permission of the first kind in the visible permission and receiving
When the common recognition that other described nodes are sent passes through message, the business datum is sent to the common recognition node in the local links,
To carry out common recognition processing to the business datum by the common recognition node in the local links.
Optionally, the local links are according to the different by the block chain of the differences of application scenarios or data-privacy degree
Multiple nodes in network are divided and the network that is formed.
Fourth aspect, the embodiment of the present application provide a kind of electronic equipment, including processor and memory, the memory
It is stored with computer-readable instruction fetch, when the computer-readable instruction fetch is executed by the processor, operation such as above-mentioned the
On the one hand the step in the method provided.
5th aspect, the embodiment of the present application provide a kind of readable storage medium storing program for executing, are stored thereon with computer program, the meter
The step in the method that first aspect offer is as above provided is run when calculation machine program is executed by processor.
The embodiment of the present application provides one kind, and block chain is layered common recognition method, block chain network system and block chain node, should
In method, business datum to be known together is obtained by the node in local links, the visible permission of the business datum is determined, in institute
When to state visible permission be the first kind visible permission, the business datum is sent to the common recognition node in the local links, with logical
The common recognition node crossed in the local links carries out common recognition processing to the business datum, is that the second class is visible in the visible permission
When permission, the business datum is sent to the common recognition node in global chain, to pass through the common recognition node pair in the global chain
The business datum carries out common recognition processing, wherein the overall situation chain is that at least one node for choosing is together in each local links
The network of formation.As it can be seen that determining corresponding visible permission by the business datum for treating common recognition, it is then based on different visible power
Limit selection the selection sharing business datum, i.e., more in Internet of things node number and network environment in local links or in global chain
It, can be according to trust and data degree of privacy, selective public data, so that the spread scope of the business datum when various
It is substantially reduced, improves data-privacy protecting effect, compared with the block chain technology of existing realization data-privacy protection, do not deposit
In the risk that transaction data is arbitrarily propagated, the safety of data dissemination is improved.
Other feature and advantage of the application will be illustrated in subsequent specification, also, partly be become from specification
It is clear that by implementing the embodiment of the present application understanding.The purpose of the application and other advantages can be by written theorys
Specifically noted structure is achieved and obtained in bright book, claims and attached drawing.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of division schematic diagram of block chain network provided by the embodiments of the present application;
Fig. 2 is the flow chart that a kind of block chain provided by the embodiments of the present application is layered common recognition method;
Fig. 3 is a kind of structural schematic diagram of block chain network system provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of block chain node provided by the embodiments of the present application;
Fig. 5 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Ground description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually exist
The component of the embodiment of the present application described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed the application's to the detailed description of the embodiments herein provided in the accompanying drawings below
Range, but it is merely representative of the selected embodiment of the application.Based on embodiments herein, those skilled in the art are not being done
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
A kind of block chain network provided by the present application is identical as existing various block chain networks, the block link network of the application
Network is also to be made of multiple nodes, and each node is the electronic equipment or module with operation and store function.Such as it is each
Node is one or one group of computer or is a module wherein with operation independent and store function.
Firstly, block chain is introduced, block chain is to participate in going for maintenance jointly by nodes all in block chain network
Centralization distributed data base system, it is by a series of data chunks generated based on cryptography method into each data block
A block as in block chain.According to the sequencing of generation time, block is linked together in an orderly manner, forms one
Data chain is visually known as block chain.Some concepts of block chain network are introduced below.
Node in block chain network is properly termed as block chain node, and wherein block chain network is based on P2P (Peer to
Peer, peer-to-peer network) network, it each participates in business and block is stored, verified, the P2P network node of forwarding is a block
Node in chain network.
User identity in block chain can be used public key and either be indicated according to the account address that the public key generates, and
Public key and private key occur in pairs, wherein private key by user grasp without being published in above-mentioned block chain network, public key or
The above-mentioned account address of person can arbitrarily issue in block chain network.Wherein, after public key can be by specific Hash and coding
As above-mentioned account address.It is noted that one-to-one relationship, Yong Huke is not present in user identity and block chain node
With the private key on any one block chain node using oneself.
Data about block chain are written, and are to be traded from block chain node by issuing to block chain network
(Transaction) it realizes to block chain and data is written.The transaction includes: block chain link point according to preset transaction data format
The number that the transaction data package carries out is signed to the transaction data package of generation, and using the private key of the block chain node oneself
Name, the digital signature are used to prove the identity of the user of the block chain node;Then, the transaction is by " the mine in block chain network
Work " (i.e. the block chain node of execution PoW (Proof Of Work, work prove) common recognition competition mechanism) is recorded into block chain
The new block of generation, and the transaction is published in block chain network, pass through (its by other block chain node verifications in the transaction
His node can obtain the public key of the block chain node from the transaction that the block chain node generates, and according to the block chain node
Public key above-mentioned digital signature is verified, can also be verified other than verifying digital signature transaction data package whether be
Defined data structure) and after receiving, which is written into block chain.Wherein, the new block in block chain is by above-mentioned
" miner " (mechanism is it is to be understood that each " miner " wants according to the default technology of block by executing PoW common recognition competition mechanism
It asks, such as requires according to preset random number to calculate random number jointly, which " miner ", which first calculates, meets the random number
It is required that random number, should " miner " block for generating just be used as the new block) and periodically generate, therefore generate new block when
Between be spaced usually related to above-mentioned default technical requirements, can change the production of block chain by the different default technical requirements of setting
The time interval of raw new block.
Wherein, the data in block chain are to safeguard that node exists jointly by each block chain node in the block chain network
When receiving service request, generally require by caching, common recognition with store these three links can be by the corresponding industry of service request
Business data are stored into block, and will be on the corresponding block chain of block cochain node.When the majority section in the block chain network
When point stores the business datum in the block chain data of respective node, which is just considered as being stored in each node
In the block data safeguarded jointly.
Common recognition is used as essential link, and currently used common recognition mechanism has proof of work (POW) mechanism, Byzantium
Fault-tolerant (PBFT) mechanism, equity mechanism proof etc. are a variety of.It is illustrated by taking proof of work mechanism as an example below.
Specifically, node can receive the service request that user sends first, include business datum in the service request, wherein
The service request can be user and directly input the node, also can receive the business of other node broadcasts in block chain network
Request.How the specific node, which receives the service request, does not impact the execution of business.
Later, which can determine corresponding business datum according to the service request.Wherein, the node is according to service request
Determine that the process of corresponding business datum can be described as node and accept service request, as to how determining that the business datum may be with
The difference of concrete condition and it is different.It such as the business datum carried in common service request and contains business needs to be implemented
Content carries payer address, the payer amount of money, payment gold for example, requesting for transaction business in transaction business request
The information such as volume, beneficiary address, the then node for receiving the service request directly can determine the business datum according to the service request.
For another example, due to also may include for business datums such as the instructions of intelligent contract in ordinary business practice request.In this way, the node is being accepted
When the service request, it may also need to be carried out at business according to business datum according to the difference of the business datum in service request
Reason, and obtain business processing as a result, then node, can also be using the result of the business processing as the industry when determining business datum
Business data.Certainly, which can also be by the result of the business datum carried in the service request and progress business processing together
As the corresponding business datum of the service request.The content of the specific business datum can be different according to the configuration of block chain,
As long as corresponding with the service request, need to be stored in the data in the block chain data and be considered as business datum.
It should be noted that node in block chain network can be divided into for a service request accept node and it is non-by
Node is managed, the node that accepts here refers to that receiving user or other equipment sends the node of the service request, non-to accept node
Refer to the node for obtaining the service request from other nodes by broadcast mode.
When the determining business datum is not stored in the block chain data for have already passed through common recognition, the business datum
For business datum to be known together, and can be stored in the caching of the node.
Then, after the node determines the business datum to be known together, which can be by the business datum to be known together
Other nodes into the block chain network are broadcasted, that is, in other nodes being synchronized in the block chain network.This
Sample, each node in the block chain network can receive the business datum that should be to be known together sent by way of broadcast.Rear
Continuous when being known together, the business datum that each node in the block chain network can be to be known together to this is known together.
Finally, each node in the block chain network can determine according to the common recognition mechanism of the block chain and initiate common recognition
Node, and the node known together by the initiation, from the business datum respectively to be known together that the node stores, selection is used for the industry of common recognition
Business data.And then it can be according to the common recognition mechanism of the block chain, to the section of initiation common recognition by each node in the block chain network
The business datum for common recognition of point selection is known together.
Wherein, the business respectively to be known together that each node in the block chain network is sent in the node known together to the initiation
When data are known together, the business datum respectively to be known together received can determine whether, if be also stored in the nodal cache
Wait which if so, determining that the business respectively to be known together received common recognition passes through, and business number respectively to be known together will be recorded in list of knowing together
According to new block be stored in the block chain data of the node maintenance, if it is not, not storing then.
It should be noted that the node in above-mentioned local links can be Internet of things node.
Fig. 1 is please referred to, in the embodiment of the present application, in order to be substantially reduced the spread scope of business datum, to provide number
According to secret protection effect, then block chain network is divided at least two-tier network comprising local links and global chain.Wherein, part
Chain is the network that multiple nodes in block chain network are formed, and global chain is at least one node one chosen in each local links
Act the network formed.
The local links are will be in the block chain network according to the difference or the different of data-privacy degree of application scenarios
Multiple nodes divided and the network that is formed.For example, including multiple nodes in block chain network, these can be saved
Point is classified according to geographical location or network environment, and as in different LAN environments, Internet of Things network users and equipment may be wished
It hopes and shares part private data in a small range, realize small-scale access control, user and equipment are wished in global scope
Part of data are provided, including being realized whereby by the data of other LAN environment interior joint relationships to reach global common recognition
Concurrent processing under the access control of global scope or data sharing and different network environments.In addition stroke of its local links
Dividing can also divide according to the degree of privacy of shared data, for example, under environment of internet of things, especially when the whole network is addressed using ipv6
When, Internet of Things network users may protect the data on chain with equipment by component difference trust systems, while accelerate decision process,
Relative to the single-stranded mode using secret protection means, this is a kind of more flexible or transition mode, allows Physical Network application
Fang Gengjia is ready to share data cochain.
Different local links may represent different Internet of Things application scenarios, and by taking smart home as an example, each local links can
To indicate different office and home environment, and can be false under same or different LAN environment, as shown in figure 1
If sharing in local links 1 and what is transmitted being data that certain user records in smart home environment, local links 2 may be office ring
The data that smart machine and people directly transmit and record in border, local links 3 are then likely to be interim outgoing wait and need altogether in environment
The data enjoyed and recorded.
It should be noted that the not necessarily complete corresponding relationship of different local links and LAN environment, different offices
Domain user off the net may be different because of data degree of privacy from equipment, usually belong to different local links, but the same local area network
Under, it is also possible to there are multiple local links, by flexible data sharing, to complete the function that scenes of internet of things defines.
The division of local links is designed according to application scenarios, and the node of same local links may have like attribute, Huo Zhetong
Equal security levels, record needs data to be sharing in local links.When the node of same local links is reached common understanding, data cochain
Afterwards, upward level-one local links (or privately owned chain of entire trust systems) shared data, that is, initiate to propose.In same local links
Node can see all processes of data interaction, and the node in different local links cannot see that the data interaction of other side
Journey.
In addition, since Internet of Things application scenarios are often as unit of Small-scale LAN network, and in order to accelerate decision mistake
Journey, the node divided in the local links generally after division will not be too many, when interstitial content is less, all sections in local links
Point both participates in common recognition and verifying, if interstitial content is excessive, can participate in knowing together from some nodes are wherein chosen and verify.
Global chain is that the network that at least one node chosen in each local links is formed together as shown in figure 1 can be from part
At least one node is chosen in chain 1, chooses at least one node from local links 2 and at least one section is chosen from local links
Point is formed together global chain, that is to say, that the node in global chain is that the node from local links is selected.
Global chain and local links are illustrated with an actual example below.
Assuming that some block chain network is the different departments composition of some unit, personnel department and finance in unit management
The data of department usually require to other departments maintain secrecy, and administrative department it should be understood that each department traffic-operating period and data, because
This each node that can be protected personnel department point is in a local links, and each node point that a Finance Department is protected is one
In a local links, administrative department is made of at least one respective node of personnel department and Finance Department.Inside personnel department
Data can be shared as it can be seen that the data inside Finance Department can be shared as it can be seen that still counting between personnel department and Finance Department
If according to cannot share and as it can be seen that still administrative department it should be understood that personnel department and Finance Department traffic-operating period and data
When, data can be shared with the node of Finance Department selected by personnel department inside administrative department, that is, manage
It is visible that data sharing can be carried out inside department.
It should be noted that above-mentioned block chain network has been divided into local links and two layers of chain of the overall situation, above-mentioned is only example,
Can also select some nodes as upper layer node from the node in global chain, as on above-mentioned administrative department there is also
CEO Office department, CEO Office department can be made of at least two nodes in administrative department, and administrative department can be by certain numbers
It is shared according to CEO Office department is reported to.
Referring to figure 2., Fig. 2 is the flow chart that a kind of block chain provided by the embodiments of the present application is layered common recognition method, the party
Method is applied to the node in local links, which is the network that multiple nodes in block chain network are formed.The method packet
Include following steps:
Step S110: obtaining business datum to be known together, and determines the visible permission of the business datum.
Succinct for description, the node during being described below in local links is local links' node, the section in global chain
Point is global chain node.In the embodiment of the present application, what local links' node can be used as business datum accepts node, can also not
As the node that accepts of business datum, and the host node as node or this common recognition processing for initiating common recognition processing,
Here it is not specifically limited.
If local links' interior joint accepts node as business datum, then local links' node can be from being locally stored
A part of business datum is fished in the business datum accepted as business datum to be known together, in order to subsequent for fishing for
The partial service data initiate common recognition processing.
If local links' node is not as the accepting node of business datum and as the host node that this common recognition is handled, then should
Local links' node can fish for a part of business datum as business number to be known together from business datum resource pool to be known together
According in order to the subsequent common recognition processing initiated for the partial service data fished for.
Specifically, it is getting after the business datum known together, is determining the visible permission of the business datum, wherein can
First to determine the business for generating the business datum to be known together, the corresponding service class of business datum to be known together then is determined again
Type, and then determine according to type of service the visible permission of business datum.
Here type of service can be divided according to the function difference of business, such as: business can be divided into order class
Type (being order type in the corresponding type of service of business datum that order generation phase generates), type of payment are (i.e. comprising branch
The corresponding type of service of business datum for paying information is type of payment) etc..It can also be divided according to business tine difference, example
Such as: business can be divided into hair fastener type (i.e. the corresponding type of service of business datum comprising selling information is hair fastener type), hand over
Easy type (i.e. the corresponding type of service of business datum comprising Transaction Information is type of transaction) etc., here for type of service
Division can be not specifically limited,
After getting business datum to be known together, determine the corresponding type of service of each business datum respectively, due to
Some types of service the case where there are alternate coverings, determining the corresponding type of service of each business datum at this time in practical application
When, (or other modes, be not specifically limited here) the biggish industry of coverage area can be determined by the way of cluster
Service type as obtain to the corresponding business of business datum to be known together.
Such as: the existing order type of the corresponding type of service of business datum to be known together got has type of payment again,
So according to for business tine, these business datums belong to type of transaction, then can determine that these are to be known together
The corresponding type of service of business datum is type of transaction.
It should be noted that type of service determined by here can be one kind, or a variety of.If it is determined that industry
Service type be it is a variety of, then in the next steps, common recognition algorithm corresponding to this multiple business type can be used same total
Know algorithm;Or this multiple business type respectively corresponds multiple common recognition algorithms, but can determine one in multiple common recognition algorithms
Kind common recognition algorithm is all suitable for this multiple business type.
After the type of service of above-mentioned determining business datum, corresponding visible permission can be arranged to each type of service,
Corresponding visible permission, i.e., global chain and local links are provided with to the visible permission of business datum to each type of service in advance
Inconsistent, if business datum needs to share in local links, corresponding visible permission is the visible permission of the first kind, if business
When data need to share in global chain, corresponding visible permission is the visible permission of the second class.
Wherein it is possible to which the business datum of which type of service of self-defining is the visible permission of the first kind, which type of service
Business datum be the visible permission of the second class, for example, can by type of service be order type business datum be set as the first kind
It can be seen that permission, can set the visible permission of the second class for the business datum that type of service is type of payment.Certainly, what is be arranged can
See that permission can be configured according to actual needs.
Step S120: in visible permission permission visible for the first kind, the business datum is sent to the office
Common recognition node in portion's chain, to carry out common recognition processing to the business datum by the common recognition node in the local links.
It, will be described if the visible permission is the first kind visible permission after the visible permission of above-mentioned determining business datum
Business datum is sent to the common recognition node in local links, is then known together by the common recognition node in local links to business datum
Processing.
Wherein it is possible to common recognition node of some nodes as local links be selected from the node in local links, if office certainly
When the number of nodes of portion's chain is less, all nodes in local links can be used as common recognition node, by common recognition node come to business
Data carry out common recognition processing.
Step S130: in visible permission permission visible for the second class, the business datum is sent to global chain
In common recognition node, to carry out common recognition processing to the business datum by the common recognition node in the global chain.
After the visible permission of above-mentioned determining business datum, if the visible permission is the second class visible permission, by industry
Business data are sent to the common recognition node in global chain, to be total to by the common recognition node in global chain to the business datum
Knowledge processing.
Wherein, in business datum permission visible for the first kind, show that business datum needs are divided in local links
It enjoys, in business datum permission visible for the second class, shows that business datum needs are shared in global chain.
In addition, carrying out the common recognition algorithm of common recognition processing may include but be not limited to following several: proof of work (Proof
of Work;PoW), equity proves (Proof of Stake;POS), share authorisation verification (Delegate proof of
Stake;DPoS), practical Byzantine failure tolerance (practical Byzantine Fault Tolerance;PBFT), authorization, which is visitd, accounts for
Fault-tolerant (the Delegated Byzantine Fault Tolerance in front yard;DBFT) etc..
So in the present embodiment, the business datum by treating common recognition determines corresponding visible permission, it is then based on not
Same visible permission selects selection in local links or in global chain to share the business datum, i.e., more in Internet of things node number
It, can be according to trust and data degree of privacy, selective public data, so that the business datum and when network environment multiplicity
Spread scope be substantially reduced, improve data-privacy protecting effect, with it is existing realization data-privacy protection block chain skill
Art is compared, and there is no the risks that transaction data is arbitrarily propagated, and improves the safety of data dissemination.Also, due to participating in knowing together
Node greatly reduce, the efficiency of decision-making can also be provided.
It on the basis of the above embodiments, can also be only since the node in local links can be all as common recognition node
A portion node is chosen as common recognition node, process are as follows: the common recognition node broadcasts selected from the local links are to institute
Other nodes in local links are stated, so that whether other described nodes are to agreeing to provide common recognition clothes by the common recognition node that selects
Business is voted, if the visible permission of business datum is the first kind visible permission, the common recognition for receiving the transmission of other nodes is logical
Message is crossed, the business datum is sent to the common recognition node in the local links, to pass through the common recognition section in the local links
Point carries out common recognition processing to the business datum.
When the common recognition node in local links can be after the common recognition processing operation to the business datum, local links' node can be with
The common recognition node for receiving selection send to the common recognition result of the business datum when, however, it is determined that the common recognition of the business datum
As a result it needs to carry out in local links all to share, then the common recognition result of the business datum is sent in local links and is not engaged in
Then the common recognition node of common recognition can store the common recognition result of business datum into block chain.
During above-mentioned realization, part of nodes is selected from the node in local links as common recognition node, so that not having to
All nodes all participate in common recognition process, reduce the number of nodes for participating in common recognition process, improve the efficiency of decision-making.
In addition, if needs are shared in global chain when the visible permission of business datum is the second class visible permission,
Since the node in global chain is the node composition in local links, so, it, can be with before business datum is shared in global chain
It first passes through after the common recognition node in the local links carries out common recognition processing to the business datum, then by the global chain
Common recognition node carries out common recognition processing to the business datum, that is to say, that the data shared in global chain can be local links
The interior certain business datums selected after common recognition is handled are shared in global chain.
During above-mentioned realization, before business datum is known together in global chain, first know together in local links, so
It knows together in global chain again afterwards, so that the data known together in global chain are that user wishes number that is shared and transmitting
According to improve data-privacy protecting effect.
Node in above-mentioned local links or global chain is dynamic change, if participate in the common recognition number of nodes of global chain compared with
When more, can dynamic the divide local links, it can predefined mathematical model is considered, by the mathematical model come to local links
Carry out dynamic division.
Wherein, the node having in local links or global chain may be malicious attack nodes, inside local links or global chain
It is provided with the mechanism detected whether as malicious attack nodes, if if local links or global chain detect that some node is malicious attack
When node, then this malicious attack nodes can be rejected from local links or global chain, subsequent data cannot be continued to participate in
Share.
In addition, the node in local links is before carrying out common recognition processing, it is also necessary to be initialized, the process of initialization
Are as follows: local data is collected, for example prepares to need the data of cochain, key pair is generated, also needs Shen if relying on PKI authentication identity
Please certificate, the necessary information of oneself, mainly public key are registered on chain, then start local links common recognition and the service for checking credentials, complete
Data structure initialization, the starting of the treatment progress such as node formula and verifying, prison is locally stored in the initialization of some registry entries
Listen the proposal etc. from other nodes.
The initialization procedure of its node is the process of verifying identity mutually, the node conduct selected from the node in local links
When the node of global chain, the node of the overall situation chain is also required to carry out initialization procedure, to the initialization procedure of node with existing
Verification process in technology is consistent, no longer excessively repeats herein.
In addition, if the node of addition needs to provide local links when having new node to be added in global chain or local links
Or the certification of global chain authentication foundation, local links or global chain by the common recognition completion of present node to newly added node,
If certification passes through, newly added node registration message on chain, it may participate in the common recognition and verifying of local links or global chain, open
Dynamic correlation preparation.
Referring to figure 3., Fig. 3 is a kind of structural block diagram of block chain network system provided by the embodiments of the present application, the area
Block chain network system includes multiple nodes, and the multiple node is carried out division and forms multiple networks, each network is a part
Chain, the node in each local links is fully visible for business datum and has the visible permission of the first kind, between different local links
It is invisible for business datum, it selects the network that at least one node is formed together respectively from each local links and is used as the overall situation
Chain;In the visible permission of business datum permission visible for the first kind, by the common recognition node in the local links to the industry
Business data carry out common recognition processing, in the visible permission of business datum permission visible for the second class, by the global chain
Common recognition node carries out common recognition processing to the business datum.
The specific implementation process of the embodiment please refers to the realization process of the above method, no longer excessively repeats herein.
Referring to figure 4., Fig. 4 is a kind of structural block diagram of block chain node 200 provided by the embodiments of the present application, the block
Chain node 200 includes:
Data acquisition module 210 determines the visible permission of the business datum for obtaining business datum to be known together;
Local links' common recognition processing module 220 is used in visible permission permission visible for the first kind, by the business
Data are sent to the common recognition node in the local links, with by the common recognition node in the local links to the business datum into
Row common recognition processing, wherein the visible permission of the first kind shows that the business datum needs are known together in the local links
Processing;
Global chain common recognition processing module 230 is used in visible permission permission visible for the second class, by the business
Data are sent to the common recognition node in global chain, to be total to by the common recognition node in the global chain to the business datum
Knowledge processing, wherein the overall situation chain is the network that at least one node chosen in each local links is formed together.
Optionally, the global chain common recognition processing module 230, is specifically used in the visible permission being the visible power of the second class
In limited time, then it first passes through after the common recognition node in the local links carries out common recognition processing to the business datum, then by described complete
Common recognition node in office's chain carries out common recognition processing to the business datum.
Optionally, the block chain node further include:
Common recognition node selection module, for that will be given in the local links from the common recognition node broadcasts selected in the local links
Other nodes so that whether other described nodes to agreeing to that providing common recognition service by the common recognition node that selects throws
Ticket;
Local links' common recognition processing module 220, for being the visible permission of the first kind in the visible permission and connecing
When receiving the common recognition that other described nodes are sent and passing through message, the common recognition section that the business datum is sent in the local links
Point, to carry out common recognition processing to the business datum by the common recognition node in the local links.
Optionally, the local links are according to the different by the block chain of the differences of application scenarios or data-privacy degree
Multiple nodes in network are divided and the network that is formed.
Referring to figure 5., Fig. 5 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application, and the electronics is set
Standby may include: at least one processor 110, such as CPU, at least one communication interface 120,130 He of at least one processor
At least one communication bus 140.Wherein, communication bus 140 is for realizing the direct connection communication of these components.Wherein, this Shen
The communication interface 120 of equipment it please be used to carry out the communication of signaling or data with other node devices in embodiment.Memory 130 can
To be high speed RAM memory, it is also possible to non-labile memory (non-volatile memory), for example, at least one
Magnetic disk storage.Memory 130 optionally can also be that at least one is located remotely from the memory block chain node of aforementioned processor.
Computer-readable instruction fetch is stored in memory 130, when the computer-readable instruction fetch is executed by the processor 110
When, electronic equipment executes method process shown in above-mentioned Fig. 2.
The embodiment of the present application provides a kind of readable storage medium storing program for executing, when the computer program is executed by processor, executes such as
Method process performed by electronic equipment in embodiment of the method shown in Fig. 2.
It is apparent to those skilled in the art that for convenience and simplicity of description, the block of foregoing description
The specific work process of chain node no longer can excessively repeat herein with reference to the corresponding process in preceding method.
In conclusion the embodiment of the present application provides one kind, block chain is layered common recognition method, block chain network system and block
Chain node in this method, business datum to be known together is obtained by the node in local links, determines the visible of the business datum
The business datum is sent to the common recognition in the local links in visible permission permission visible for the first kind by permission
Node is in the visible permission to carry out common recognition processing to the business datum by the common recognition node in the local links
When the visible permission of the second class, the business datum is sent to the common recognition node in the global chain, to pass through the global chain
In common recognition node common recognition processing is carried out to the business datum, wherein it is described the overall situation chain be each local links in choose to
The network that a few node is formed together.As it can be seen that determine corresponding visible permission by the business datum for treating common recognition, then base
Selection in local links or in global chain is selected to share the business datum in different visible permissions, i.e., in Internet of things node number
It, can be according to trust and data degree of privacy, selective public data, so that the business when more and network environment is various
The spread scope of data is substantially reduced, and improves data-privacy protecting effect, the block with existing realization data-privacy protection
Chain technology is compared, and there is no the risks that transaction data is arbitrarily propagated, and improves the safety of data dissemination.
In several embodiments provided herein, it should be understood that disclosed block chain node and method, it can also
To realize by another way.Block chain node embodiment described above is only schematical, for example, in attached drawing
Flow chart and block diagram show the block chain node according to multiple embodiments of the application, method and computer program product can
The architecture, function and operation being able to achieve.In this regard, each box in flowchart or block diagram can represent a mould
A part of block, program segment or code, a part of the module, section or code include one or more for realizing rule
The executable instruction of fixed logic function.It should also be noted that in some implementations as replacement, it is marked in the box
Function can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually substantially simultaneously
It executes capablely, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that frame
The combination of figure and/or each box in flow chart and the box in block diagram and or flow chart, can be as defined in executing
Function or the dedicated hardware based system of movement are realized, or can be come using a combination of dedicated hardware and computer instructions
It realizes.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Claims (11)
1. a kind of block chain is layered common recognition method, which is characterized in that applied to the node in local links, the local links are block
The network that multiple nodes in chain network are formed, which comprises
Business datum to be known together is obtained, determines the visible permission of the business datum;
When the visible permission is the visible permission of the first kind, the common recognition section that the business datum is sent in the local links
Point, to carry out common recognition processing to the business datum by the common recognition node in the local links, wherein the first kind is visible
Permission shows that the business datum needs carry out common recognition processing in the local links;
In visible permission permission visible for the second class, the business datum is sent to the common recognition node in global chain,
To carry out common recognition processing to the business datum by the common recognition node in the global chain, wherein the overall situation chain is each
The network that at least one node chosen in local links is formed together.
2. the method according to claim 1, wherein being incited somebody to action in visible permission permission visible for the second class
The business datum is sent to the common recognition node in the global chain, with by the common recognition node in the overall situation chain to the industry
Business data carry out common recognition processing, comprising:
In visible permission permission visible for the second class, then the common recognition node in the local links is first passed through to the business
After data carry out common recognition processing, then common recognition processing carried out to the business datum by the common recognition node in the global chain.
3. determining the industry the method according to claim 1, wherein described obtain business datum to be known together
Before the visible permission for data of being engaged in, further includes:
Other nodes that will be given from the common recognition node broadcasts selected in the local links in the local links, so that other described sections
Whether point is to agreeing to that providing common recognition service by the common recognition node that selects votes;
When the visible permission is the visible permission of the first kind, the common recognition section that the business datum is sent in the local links
Point, to carry out common recognition processing to the business datum by the common recognition node in the local links, comprising:
It is the visible permission of the first kind in the visible permission and passes through message receiving the common recognition that other described nodes are sent
When, the business datum is sent to the common recognition node in the local links, to pass through the common recognition node pair in the local links
The business datum carries out common recognition processing.
4. the method according to claim 1, wherein the local links are the difference or data according to application scenarios
The different networks that multiple nodes in the block chain network are divided and are formed of degree of privacy.
5. a kind of block chain network system, which is characterized in that the block chain network system includes multiple nodes, will be the multiple
Node, which divide, forms multiple networks, and each network is a local links, and the node in each local links is complete for business datum
It is complete visible and there is the visible permission of the first kind, it is invisible for business datum between different local links, from each local links point
The network that at least one node is formed together is not selected is used as global chain;It is the visible power of the first kind in the visible permission of business datum
In limited time, common recognition processing is carried out to the business datum by the common recognition node in the local links, in the visible power of business datum
When being limited to the visible permission of the second class, common recognition processing is carried out to the business datum by the common recognition node in the global chain.
6. a kind of block chain node, which is characterized in that the block chain node includes:
Data acquisition module determines the visible permission of the business datum for obtaining business datum to be known together;
Local links' common recognition processing module, in visible permission permission visible for the first kind, the business datum to be sent out
The common recognition node in the local links is given, to know together by the common recognition node in the local links to the business datum
Processing, wherein the visible permission of the first kind shows that the business datum needs carry out common recognition processing in the local links;
Global chain common recognition processing module, in visible permission permission visible for the second class, the business datum to be sent out
The common recognition node in global chain is given, to carry out at common recognition by the common recognition node in the global chain to the business datum
Reason, wherein the overall situation chain is the network that at least one node chosen in each local links is formed together.
7. block chain node according to claim 6, which is characterized in that the overall situation chain common recognition processing module is specific to use
In in visible permission permission visible for the second class, then the common recognition node in the local links is first passed through to the business number
Common recognition processing is carried out to the business datum after carrying out common recognition processing, then through the common recognition node in the global chain.
8. block chain node according to claim 6, which is characterized in that the block chain node further include:
Know together node selection module, for by from the common recognition node broadcasts selected in the local links give the local links in its
His node, so that whether other described nodes are to agreeing to that providing common recognition service by the common recognition node selected votes;
The local links know together processing module, for the visible permission be the visible permission of the first kind and receiving it is described
When the common recognition that other nodes are sent passes through message, the business datum is sent to the common recognition node in the local links, with logical
The common recognition node crossed in the local links carries out common recognition processing to the business datum.
9. block chain node according to claim 6, which is characterized in that the local links are the difference according to application scenarios
Or the different networks that multiple nodes in the block chain network are divided and are formed of data-privacy degree.
10. a kind of electronic equipment, which is characterized in that including processor and memory, the memory is stored with computer can
Instruction is read, when the computer-readable instruction fetch is executed by the processor, operation side as described in claim 1-4 is any
Step in method.
11. a kind of readable storage medium storing program for executing, is stored thereon with computer program, which is characterized in that the computer program is processed
Operation such as the step in any the method for claim 1-4 when device executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811336181.XA CN109462587B (en) | 2018-11-09 | 2018-11-09 | Block chain layered consensus method, block chain network system and block chain node |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811336181.XA CN109462587B (en) | 2018-11-09 | 2018-11-09 | Block chain layered consensus method, block chain network system and block chain node |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109462587A true CN109462587A (en) | 2019-03-12 |
CN109462587B CN109462587B (en) | 2020-03-27 |
Family
ID=65610041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811336181.XA Active CN109462587B (en) | 2018-11-09 | 2018-11-09 | Block chain layered consensus method, block chain network system and block chain node |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109462587B (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110012100A (en) * | 2019-04-09 | 2019-07-12 | 杭州秘猿科技有限公司 | A kind of the block chain common recognition method, apparatus and electronic equipment of bandwidth optimization |
CN110047581A (en) * | 2019-03-26 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of donated organs matching process, apparatus and system based on block chain |
CN110147684A (en) * | 2019-05-24 | 2019-08-20 | 众安信息技术服务有限公司 | For realizing the method and apparatus of block chain data-privacy protection |
CN110188563A (en) * | 2019-06-02 | 2019-08-30 | 四川虹微技术有限公司 | A kind of trust data update method and device |
CN110266686A (en) * | 2019-06-20 | 2019-09-20 | 深圳前海微众银行股份有限公司 | Data sharing method, device, equipment and computer readable storage medium |
CN110474986A (en) * | 2019-08-20 | 2019-11-19 | 深圳前海微众银行股份有限公司 | A kind of common recognition method, apparatus and system based on block catenary system |
CN110491491A (en) * | 2019-07-19 | 2019-11-22 | 平安科技(深圳)有限公司 | Department's consumption statistics method and device, electronic equipment and non-transient storage media |
CN110602694A (en) * | 2019-09-16 | 2019-12-20 | 广州大学 | User privacy protection crowd sensing system based on block chain |
CN110730225A (en) * | 2019-09-30 | 2020-01-24 | 北京中电拓方科技股份有限公司 | Data processing method of Internet of things based on block chain, Internet of things and storage medium |
CN110750595A (en) * | 2019-10-16 | 2020-02-04 | 西安交通大学 | Double-layer Internet of things architecture based on credit degree-block chain |
CN111080452A (en) * | 2019-12-17 | 2020-04-28 | 电子科技大学 | Hierarchical transaction method suitable for energy source block chain |
CN111371905A (en) * | 2020-03-27 | 2020-07-03 | 中国人民解放军国防科技大学 | Block chain layered consensus proving system structure and method based on cloud computing |
CN111447087A (en) * | 2020-03-23 | 2020-07-24 | 北京众享比特科技有限公司 | Block chain configuration method for dynamic networking |
CN111464631A (en) * | 2020-03-31 | 2020-07-28 | 成都质数斯达克科技有限公司 | Service consensus method and device in alliance block chain |
CN111464633A (en) * | 2020-03-31 | 2020-07-28 | 成都质数斯达克科技有限公司 | Consensus method and system for transaction information of block chain |
CN111522563A (en) * | 2020-04-20 | 2020-08-11 | 中国工商银行股份有限公司 | Block chain-based terminal upgrade protection system and method |
CN111654380A (en) * | 2020-06-19 | 2020-09-11 | 清华大学 | Self-organizing consensus method and system based on scene node selection mechanism |
CN111667367A (en) * | 2020-05-22 | 2020-09-15 | 安庆师范大学 | Block chain link point equipment and block chain network system thereof |
CN112417460A (en) * | 2020-11-24 | 2021-02-26 | 陈敏 | Payment data processing method based on big data and block chain and cloud server |
CN112511350A (en) * | 2020-12-01 | 2021-03-16 | 浙商银行股份有限公司 | Alliance chain multi-level consensus method, alliance chain multi-level consensus equipment and storage medium |
CN112600874A (en) * | 2020-11-24 | 2021-04-02 | 成都质数斯达克科技有限公司 | Node joining method and device, electronic equipment and readable storage medium |
CN113052610A (en) * | 2021-04-22 | 2021-06-29 | 支付宝(杭州)信息技术有限公司 | Data processing method and device based on block chain |
CN113746908A (en) * | 2021-08-19 | 2021-12-03 | 卓尔智联(武汉)研究院有限公司 | Data processing method and system, electronic device and computer storage medium |
CN114465730A (en) * | 2022-01-10 | 2022-05-10 | 浙商银行股份有限公司 | Internet of things equipment mutual authentication method and device based on block chain technology |
CN116226908A (en) * | 2022-12-27 | 2023-06-06 | 北京市大数据中心 | Data security emergency management analysis method and system based on big data |
CN116319072A (en) * | 2023-05-11 | 2023-06-23 | 西华大学 | Authentication and hierarchical access control integrated method based on blockchain technology |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101246466A (en) * | 2007-11-29 | 2008-08-20 | 华为技术有限公司 | Management method and device for sharing internal memory in multi-core system |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN107358420A (en) * | 2017-06-09 | 2017-11-17 | 北京博晨技术有限公司 | Method for realizing the block catenary system of focus account and realizing focus account |
CN107528886A (en) * | 2017-07-25 | 2017-12-29 | 中国科学院计算技术研究所 | Block chain the whole network method for splitting and system |
CN107766540A (en) * | 2017-10-31 | 2018-03-06 | 上海分布信息科技有限公司 | A kind of block chain network of subregion and its method for realizing partitioned storage |
CN107766542A (en) * | 2017-10-30 | 2018-03-06 | 上海分布信息科技有限公司 | A kind of block chain network of subregion and its method for realizing subregion inquiry |
CN107807984A (en) * | 2017-10-31 | 2018-03-16 | 上海分布信息科技有限公司 | A kind of block chain network of subregion and its method for realizing subregion common recognition |
CN108023729A (en) * | 2017-10-13 | 2018-05-11 | 中国银联股份有限公司 | Block chain network and its method of commerce |
US10084600B1 (en) * | 2018-04-16 | 2018-09-25 | Xage Security, Inc. | Decentralized information protection for confidentiality and tamper-proofing on distributed database |
US10084826B1 (en) * | 2018-05-14 | 2018-09-25 | Xage Security, Inc. | Protocol agnostic security by using out-of-band health check |
US10102265B1 (en) * | 2017-04-12 | 2018-10-16 | Vijay K. Madisetti | Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing |
-
2018
- 2018-11-09 CN CN201811336181.XA patent/CN109462587B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101246466A (en) * | 2007-11-29 | 2008-08-20 | 华为技术有限公司 | Management method and device for sharing internal memory in multi-core system |
US10102265B1 (en) * | 2017-04-12 | 2018-10-16 | Vijay K. Madisetti | Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing |
CN107222482A (en) * | 2017-06-01 | 2017-09-29 | 黑龙江卓亚科技有限公司 | A kind of data management system and method based on compound block chain network |
CN107358420A (en) * | 2017-06-09 | 2017-11-17 | 北京博晨技术有限公司 | Method for realizing the block catenary system of focus account and realizing focus account |
CN107528886A (en) * | 2017-07-25 | 2017-12-29 | 中国科学院计算技术研究所 | Block chain the whole network method for splitting and system |
CN108023729A (en) * | 2017-10-13 | 2018-05-11 | 中国银联股份有限公司 | Block chain network and its method of commerce |
CN107766542A (en) * | 2017-10-30 | 2018-03-06 | 上海分布信息科技有限公司 | A kind of block chain network of subregion and its method for realizing subregion inquiry |
CN107766540A (en) * | 2017-10-31 | 2018-03-06 | 上海分布信息科技有限公司 | A kind of block chain network of subregion and its method for realizing partitioned storage |
CN107807984A (en) * | 2017-10-31 | 2018-03-16 | 上海分布信息科技有限公司 | A kind of block chain network of subregion and its method for realizing subregion common recognition |
US10084600B1 (en) * | 2018-04-16 | 2018-09-25 | Xage Security, Inc. | Decentralized information protection for confidentiality and tamper-proofing on distributed database |
US10084826B1 (en) * | 2018-05-14 | 2018-09-25 | Xage Security, Inc. | Protocol agnostic security by using out-of-band health check |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110047581A (en) * | 2019-03-26 | 2019-07-23 | 阿里巴巴集团控股有限公司 | A kind of donated organs matching process, apparatus and system based on block chain |
CN110012100A (en) * | 2019-04-09 | 2019-07-12 | 杭州秘猿科技有限公司 | A kind of the block chain common recognition method, apparatus and electronic equipment of bandwidth optimization |
CN110147684B (en) * | 2019-05-24 | 2023-07-25 | 众安信息技术服务有限公司 | Method and device for realizing privacy protection of blockchain data |
CN110147684A (en) * | 2019-05-24 | 2019-08-20 | 众安信息技术服务有限公司 | For realizing the method and apparatus of block chain data-privacy protection |
CN110188563A (en) * | 2019-06-02 | 2019-08-30 | 四川虹微技术有限公司 | A kind of trust data update method and device |
CN110188563B (en) * | 2019-06-02 | 2021-04-13 | 四川虹微技术有限公司 | Trust data updating method and device |
CN110266686A (en) * | 2019-06-20 | 2019-09-20 | 深圳前海微众银行股份有限公司 | Data sharing method, device, equipment and computer readable storage medium |
CN110266686B (en) * | 2019-06-20 | 2021-06-15 | 深圳前海微众银行股份有限公司 | Data sharing method, device, equipment and computer readable storage medium |
CN110491491A (en) * | 2019-07-19 | 2019-11-22 | 平安科技(深圳)有限公司 | Department's consumption statistics method and device, electronic equipment and non-transient storage media |
CN110474986A (en) * | 2019-08-20 | 2019-11-19 | 深圳前海微众银行股份有限公司 | A kind of common recognition method, apparatus and system based on block catenary system |
CN110602694A (en) * | 2019-09-16 | 2019-12-20 | 广州大学 | User privacy protection crowd sensing system based on block chain |
CN110730225A (en) * | 2019-09-30 | 2020-01-24 | 北京中电拓方科技股份有限公司 | Data processing method of Internet of things based on block chain, Internet of things and storage medium |
CN110750595A (en) * | 2019-10-16 | 2020-02-04 | 西安交通大学 | Double-layer Internet of things architecture based on credit degree-block chain |
CN111080452B (en) * | 2019-12-17 | 2023-12-29 | 电子科技大学 | Hierarchical transaction method suitable for energy block chain |
CN111080452A (en) * | 2019-12-17 | 2020-04-28 | 电子科技大学 | Hierarchical transaction method suitable for energy source block chain |
CN111447087A (en) * | 2020-03-23 | 2020-07-24 | 北京众享比特科技有限公司 | Block chain configuration method for dynamic networking |
CN111447087B (en) * | 2020-03-23 | 2023-04-07 | 北京众享比特科技有限公司 | Block chain configuration method for dynamic networking |
CN111371905B (en) * | 2020-03-27 | 2023-08-01 | 中国人民解放军国防科技大学 | Block chain layering consensus proving system and method based on cloud computing |
CN111371905A (en) * | 2020-03-27 | 2020-07-03 | 中国人民解放军国防科技大学 | Block chain layered consensus proving system structure and method based on cloud computing |
CN111464631B (en) * | 2020-03-31 | 2023-03-28 | 成都质数斯达克科技有限公司 | Service consensus method and device in alliance block chain |
CN111464631A (en) * | 2020-03-31 | 2020-07-28 | 成都质数斯达克科技有限公司 | Service consensus method and device in alliance block chain |
CN111464633A (en) * | 2020-03-31 | 2020-07-28 | 成都质数斯达克科技有限公司 | Consensus method and system for transaction information of block chain |
CN111522563B (en) * | 2020-04-20 | 2023-09-19 | 中国工商银行股份有限公司 | Terminal upgrading protection system and method based on block chain |
CN111522563A (en) * | 2020-04-20 | 2020-08-11 | 中国工商银行股份有限公司 | Block chain-based terminal upgrade protection system and method |
CN111667367A (en) * | 2020-05-22 | 2020-09-15 | 安庆师范大学 | Block chain link point equipment and block chain network system thereof |
CN111667367B (en) * | 2020-05-22 | 2023-10-31 | 安庆师范大学 | Block chain node equipment and block chain network system thereof |
CN111654380A (en) * | 2020-06-19 | 2020-09-11 | 清华大学 | Self-organizing consensus method and system based on scene node selection mechanism |
CN111654380B (en) * | 2020-06-19 | 2021-05-07 | 清华大学 | Self-organizing consensus method and system based on scene node selection mechanism |
CN112600874A (en) * | 2020-11-24 | 2021-04-02 | 成都质数斯达克科技有限公司 | Node joining method and device, electronic equipment and readable storage medium |
CN112417460A (en) * | 2020-11-24 | 2021-02-26 | 陈敏 | Payment data processing method based on big data and block chain and cloud server |
CN112511350A (en) * | 2020-12-01 | 2021-03-16 | 浙商银行股份有限公司 | Alliance chain multi-level consensus method, alliance chain multi-level consensus equipment and storage medium |
CN113052610A (en) * | 2021-04-22 | 2021-06-29 | 支付宝(杭州)信息技术有限公司 | Data processing method and device based on block chain |
CN113746908A (en) * | 2021-08-19 | 2021-12-03 | 卓尔智联(武汉)研究院有限公司 | Data processing method and system, electronic device and computer storage medium |
CN114465730A (en) * | 2022-01-10 | 2022-05-10 | 浙商银行股份有限公司 | Internet of things equipment mutual authentication method and device based on block chain technology |
CN116226908A (en) * | 2022-12-27 | 2023-06-06 | 北京市大数据中心 | Data security emergency management analysis method and system based on big data |
CN116226908B (en) * | 2022-12-27 | 2024-03-29 | 北京市大数据中心 | Data security emergency management analysis method and system based on big data |
CN116319072A (en) * | 2023-05-11 | 2023-06-23 | 西华大学 | Authentication and hierarchical access control integrated method based on blockchain technology |
CN116319072B (en) * | 2023-05-11 | 2023-07-21 | 西华大学 | Authentication and hierarchical access control integrated method based on blockchain technology |
Also Published As
Publication number | Publication date |
---|---|
CN109462587B (en) | 2020-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109462587A (en) | Block chain is layered common recognition method, block chain network system and block chain node | |
CN109302415B (en) | A kind of authentication method, block chain node and storage medium | |
Maroufi et al. | On the convergence of blockchain and internet of things (iot) technologies | |
Baza et al. | B-ride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain | |
Ferrag et al. | Blockchain technologies for the internet of things: Research issues and challenges | |
Moin et al. | Securing IoTs in distributed blockchain: Analysis, requirements and open issues | |
Cui et al. | Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment | |
Jesus et al. | A survey of how to use blockchain to secure internet of things and the stalker attack | |
Samaniego et al. | Zero-trust hierarchical management in IoT | |
US20190279210A1 (en) | Infinitely scalable cryptocurrency system with fast, secure verification | |
Pradhan et al. | A flexible permission ascription (FPA)-based blockchain framework for peer-to-peer energy trading with performance evaluation | |
US11902448B2 (en) | Hybrid blockchain architecture with computing pool | |
CN101193103B (en) | A method and system for allocating and validating identity identifier | |
Hamdaoui et al. | IoTShare: A blockchain-enabled IoT resource sharing on-demand protocol for smart city situation-awareness applications | |
CN112132682A (en) | Electric power transaction method, device and system based on block chain technology | |
Wu et al. | Toward blockchain-powered trusted collaborative services for edge-centric networks | |
CN109450685A (en) | A kind of common recognition method and node based on local links' node off-line | |
Miraz et al. | Integration of blockchain and IoT: an enhanced security perspective | |
Xue et al. | STBC: A novel blockchain-based spectrum trading solution | |
He et al. | A novel cryptocurrency wallet management scheme based on decentralized multi-constrained derangement | |
CN110599144B (en) | Network access method and device for blockchain nodes | |
CN112101940A (en) | Random verifiable sample selection system implemented with block chains | |
CN116595094A (en) | Federal learning incentive method, device, equipment and storage medium based on block chain | |
Tong et al. | A blockchain-driven data exchange model in multi-domain iot with controllability and parallelity | |
Dorri et al. | Vericom: A Verification and Communication architecture for IoT-based blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |