CN109508991A - A kind of edge collaboration method based on block chain - Google Patents

A kind of edge collaboration method based on block chain Download PDF

Info

Publication number
CN109508991A
CN109508991A CN201811201798.0A CN201811201798A CN109508991A CN 109508991 A CN109508991 A CN 109508991A CN 201811201798 A CN201811201798 A CN 201811201798A CN 109508991 A CN109508991 A CN 109508991A
Authority
CN
China
Prior art keywords
block
edge
module
block chain
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811201798.0A
Other languages
Chinese (zh)
Inventor
王堃
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yuanshi Science And Technology Co Ltd
Original Assignee
Shenzhen Yuanshi Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yuanshi Science And Technology Co Ltd filed Critical Shenzhen Yuanshi Science And Technology Co Ltd
Priority to CN201811201798.0A priority Critical patent/CN109508991A/en
Publication of CN109508991A publication Critical patent/CN109508991A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to a kind of edge collaboration methods based on block chain, comprising the following steps: edge application module receives the instruction of application program, generates request signal according to instruction and is transmitted to block chain module;Request signal is converted to transaction by the block chain module, and transaction is broadcasted to entire edge network;Unload module positions effective block in block chain, and the effective block in block chain is updated to cache module;Effective block in the block chain module calls cache module according to verifying model and is verified transaction, is verified;Realize edge cooperation.Compared with the prior art, the quantity of block is kept low by Unload module of the invention;Unload module can reduce the storage resource of block chain occupancy, this makes edge device carry more edge applications, that is, be finally reached efficient and green target.

Description

A kind of edge collaboration method based on block chain
Technical field
The present invention relates to field of cloud computer technology, in particular to a kind of edge collaboration method based on block chain.
Background technique
With the continuous development of cloud computing technology, the quantity of service that can be disposed in cloud is also being continuously increased, this can not Result in the delay of user service time with avoiding.And the appearance of edge calculations can effectively alleviate this problem, because it It can be by effectively reducing the time in network edge deployment services (such as mobile phone, monitoring camera and internet of things sensors) Delay, and current status is more and more users gradually by large-scale edge device and the data for belonging to different interests relative It surrounds.
However, these are deployed in the reason of equipment at edge is because of the environment being in, can not always cooperate tacit agreement, In some cases, when a participant, which has shared its business data, to read for other people, even individual participants therefrom obtain Benefit can also deny that they have read these data.When a participant opens the access authority of other people write-ins, Mou Xiecan The business datum may maliciously be distorted in the process with person, final these problems cause in rim space each equipment it Between can not carry out tacit agreement cooperation.
In some research work before, industry to how to solve the problems, such as equipment room distrust done some tune It grinds.Hussain et al. suggests before executing data manipulation, should carry out worthiness verification by believable third party.But it is this Operation not only will increase time delay, and third party can also be made to become to be easier to be attacked.In addition to this, Kantert et al. A kind of method is had investigated, to calculate credit scoring as according to selecting a more reliable participant.But this credit is commented Rim space can only be submitted to as a kind of suggestion by dividing, and still can not accomplish to evade malice participant completely.For this purpose, Stanciu Et al. suggest for block chain being deployed in cooperation edge to handle the shared problem of big data.Block chain is one and has held containing all The disclosed account book of row transaction.Each the block containing some transaction belongs to global block chain, and each participant deposits There is a copy, therefore the person of being not engaged in can deny the friendship for oneself to be submitted in relation to edge application data flow on block chain Easily.In addition, block chain can reach common understanding on entire trading order, if two clash, which is lost at once It abandons.Although the non repudiation of block chain and can not tamper be hopeful to solve this problem, there are still following challenges:
First, edge device is isomery in terms of computing resource.Therefore, the limited edge device of some computing resources can not prop up Hold the complex operations in block chain.
Second, the storage resource that edge device has is extremely limited, this meeting is so that account book of entirely classifying in memory block chain Resource become more difficult.
Summary of the invention
The object of the present invention is to provide a kind of edge collaboration method based on block chain, the technical problem to be solved is that: The limited edge device of computing resource can not support the complex operations in block chain;So that account book of entirely classifying in memory block chain Resource become more difficult.
The technical scheme to solve the above technical problems is that a kind of edge collaboration method based on block chain, packet Include following steps:
Edge application module receives the instruction of application program, generates request signal according to instruction and is transmitted to block chain module;
Request signal is converted to transaction by the block chain module, and transaction is broadcasted to entire edge network;Unload module exists Effective block is positioned in block chain, and the effective block in block chain is updated to cache module;
Effective block in the block chain module calls cache module according to verifying model and is verified transaction, verifies Pass through;Realize edge cooperation.
Further, further comprising the steps of: operating right is assigned other in edge network by the edge application module Edge device, the local data of the accessible memory module of other edge devices.
Further, further comprising the steps of: the cache module storage edge application module, block chain module and unloading mould Block operates the local data of generation recently;The edge application module is also inquired other edge devices and is remembered to the operation of local data Record.
Further, the edge application module can also be read out, be written and construct transaction in block chain module.
Further, the Unload module positions effective block in block chain specifically includes the following steps: in detection block Transaction then determine that the block is invalid block when the transaction in block is invalid transaction;Invalid block is sent to benefit Beneficial relative carries out cloud backup;Invalid block will be deleted from edge device again;
When the transaction in block has certain effective transaction, then the block is determined for effective block, Unload module positioning carries The effective block for imitating transaction, is updated in cache module.
The beneficial effects of the present invention are: the quantity of block is kept low by Unload module;Unload module can subtract The storage resource that few block chain occupies, this makes edge device carry more edge applications, that is, is finally reached efficient and green Target.
Detailed description of the invention
Fig. 1 is a kind of frame diagram of the edge cooperation based on block chain of the present invention;
Fig. 2 is effective block of the present invention and invalid block diagram.
Specific embodiment
The principle and features of the present invention will be described below with reference to the accompanying drawings, and the given examples are served only to explain the present invention, and It is non-to be used to limit the scope of the invention.
As depicted in figs. 1 and 2, a kind of edge collaboration method based on block chain, comprising the following steps:
Edge application module receives the instruction of application program, generates request signal according to instruction and is transmitted to block chain module;
Request signal is converted to transaction by the block chain module, and transaction is broadcasted to entire edge network;Unload module exists Effective block is positioned in block chain, and the effective block in block chain is updated to cache module;
Effective block in the block chain module calls cache module according to verifying model and is verified transaction, verifies Pass through;Realize edge cooperation.
Wherein, rim space is mainly by groups such as edge infrastructure, base station, Edge Server and edge internet of things equipment At.Each rim space, which can be linked to, provides the network of service by different Internet Service Providers (ISP).This patent will Block chain is deployed in rim space, and each block is made to include multiple in the high amount of traffic from edge application Transaction log.This patent illustrates the green block chain frame in edge network, which is divided into four layers.
Further comprising the steps of in above-described embodiment: the edge application module assigns operating right in edge network Other edge devices, the local data of the accessible memory module of other edge devices.
It is further comprising the steps of in above-described embodiment: cache module storage edge application module, block chain module and Unload module operates the local data of generation recently;The edge application module also inquires other edge devices to local data Operation note.
In above-described embodiment, the edge application module can also be read out, is written and construct in block chain module Transaction.
In above-described embodiment, the Unload module positions effective block in block chain specifically includes the following steps: detection Transaction in block then determines that the block is invalid block when the transaction in block is invalid transaction;Invalid block is sent out It gives stakeholder and carries out cloud backup;Invalid block will be deleted from edge device again;
When the transaction in block has certain effective transaction, then the block is determined for effective block, Unload module positioning carries The effective block for imitating transaction, is updated in cache module.
Unload module periodic operation, and be always kept low the quantity of block;For edge device, unload The storage resource of block chain occupancy can be reduced by carrying module, this makes edge device carry more edge applications, that is, is finally reached Efficient and green target.
Green cooperation common recognition mechanism
Firstly, block chain is a kind of distributed data structure, each participant can retain a complete copy.Transaction record Assets transfer, is the important component in block chain.These pass through entire block chain by the transaction that different participants generate Network is verified, and is packaged into a block, then executes common recognition mechanism to keep the consistency of block, and final one has Effect block can be added in block chain.
A. the classification of block chain and its common recognition mechanism
Developer and user have extensive common recognition in the classification of block chain, i.e. block chain is divided into publicly-owned chain or privately owned (alliance) chain Two types, the fundamental difference between publicly-owned chain and privately owned chain embody both ways.First, if anyone may be added to In block chain network, then the block chain can be publicly-owned chain or alliance's chain.Second, if each participant can participate in area The operation of block chain, for example, competition mining block or proposal transaction, then the block chain is considered as publicly-owned chain.This is because publicly-owned Chain is not only opening, and compete, the participant in publicly-owned chain network does not trust each other, on the other hand, privately owned (alliance) Participant in chain is determined with the mechanism of white list.
Difference between two kinds of chains results in the generation of different common recognition agreements.It Proof-of-Work(PoW) is any participation Person provides the chance for excavating block, and immense success is achieved in bit coin, it is still maximum publicly-owned chain in the world at present. PoW require participate in competition mining block participant provide work prove, this be proved to be one kind be easy to verify but it is very scabrous Difficult math question, that is, a large amount of computing resource can be consumed by solving these problems.In most cases, PoW has following form:
Find n
s.t.SHA256(SHA256(h.n)) < target (1)
Wherein " " is character string concatenation operator, and h indicates the content in newest block.That is target target is smaller, adopts Miner makees more difficult.Based on this, Proof-of-Stake(PoS) concept be suggested and promote as the substitution of PoW, master Want thought be participant should show their asset share compete mining, it is therefore desirable to computing resource be considerably less than PoW. In practice, Practical Byzantine Fault Tolerant(PBFT) and its variant be widely used in publicly-owned chain, When especially participant's quantity is known and constant, error resilience performance reaches as high as the 1/3 of participant.
As mentioned previously, in the environment of edge calculations cooperation, each edge device is the participant of network, and It may require to execute the operation of block chain.In addition, adapt to user demand edge device quantity be it is unfixed, as us It mentions above, limited with storage resource due to calculating, the edge cooperation based on block chain promotes people to seek green solution Certainly scheme.On this basis, and by the inspiration of PoS and PoW, we have proposed Proof-of-Collaboration(PoC) Concept.
B. cooperate proof mechanism
In the mechanism, edge calculations equipment provides the permission that itself obtains cooperation to the proof that contributes of cooperation, without It is to solve meaningless difficult math question.Specifically, green PoC common recognition Mechanism Design is as follows:
1) cooperate credit: in our design, edge cooperate with a kind of entitled Collaboration Credit(CC) it is new Based on assets, the assets and the ETH(GAS in the BTC and ether mill in bit coin) are slightly similar.This means that must use CC data flow (cooperating) between edge application is paid in proposition mechanism.This is referred to as Transaction Cost F, and F is by such as Lower method determines:
(2)
WhereinIt is predefined throughput threshold,Indicate the average throughput of whole network during nearest 100 blocks, N indicates the quantity of edge device in network.It is obtained according to formula (2), which will be selected by recent network throughput It encourages cooperation or reduces load.In addition, the quantity of edge device is bigger, the F in frame is lower.In the frame, CC can pass through Two methods obtain.Firstly, can reward adder a certain number of CC by successfully adding new block to block chain.Secondly, block Proponent obtains CC from the transaction that block carries.
2) cooperation proves: in institute's proposition mechanism, proposing that the mode of block is related with persistence P, persistence P is defined as from upper Time since secondary CC change, we define following three core rules to guarantee the greenization of block chain:
Regular 1(dynamic difficulty).Digging mine in PoC is different from formula (1), and the excacation in PoC is influenced by dynamic difficulty, Each participant is different, and form is as follows:
Find n
s.t.SHA256(SHA256(h.n)) < CC × P × target (3)
Regular 2(victor initialization).Block adder must pay when constructing new block to oneself.Construct new block Operation spends the CC of adder and returns same amount of CC, that is, pays the P for changing adder, but adder will not be lost CC.In addition, new block CC × P × 0.001% to outside adder amount paid is used as reward.According to the definition of P, when successfully by block When being added to block chain, the P of block adder will be arranged to 0.
Regular 3(partial competition), the P of block adder must be positioned at [K, R], and K can be calculated by following equation:
(4)
R=3K in formula (4), and in formulaHigher, competition will be fiercer.
What this three rule provided is ensured of various:
For each edge device, the expectation of required computing resource is far below the expectation in PoW.The expectation of calculating needed for PoW It is as follows:
(5)
However it is as follows according to the desired value of 1, POC of rule:
(6)
It is constrained by regular 2, if the victor only in competition could remove its P. edge device and fail competition proposition prevention, Retain its P.This makes it have advantage in next round competition.However, the failure node in PoW but wastes all calculating Work.
For entire edge network, regular 3 specified block proponents should wait K to rejoin competition to propose next piece. This makes some edge device in network attempt while excavate, and reduces the computing resource of whole network K/n.And All nodes in PoW are all competing always.In addition, the full node competition in PoW is likely to more than one node and proposes effectively Block, i.e. bifurcated.Bifurcated wastes a large amount of computing resource.Due to all edge devices in PoC and non-concurrent competition, Bifurcated seldom occurs.
Transaction unloading
In traditional block chain scene, history block is stored in each node.With the continuous operation of boundary chain region chain, The size of these blocks becomes increasing, exhausts the storage resource of edge device at last.In addition, if new participant intends to test Newly-generated transaction is demonstrate,proved, then should download these blocks before block chain network is added.In peripheral surroundings, this down operation meeting A large amount of Internet resources are occupied, this makes edge cooperation efficiency low.In this trifle, we probe into the organizer of transaction first Formula.Then, proposed transaction filtration theory is described in detail.
A. action organisation structure
In block chain, each transaction quotes one or more previous transaction to prove its validity.It is quoted between transaction Structure is as shown in Figure 2.The reference in input field of trading belongs to one or more outputs previously traded, and indicates them in institute Belong to the output serial number in transaction.In block chain, the node for executing transaction validation is known as complete node.Complete node needs more than ten Whether a step is effective to verify affairs.And wherein most basic idea is the assets checked for paying newly-generated transaction. Therefore, for each input in the affairs verified, complete node will check that the output of reference whether there is.If do not deposited Transaction will be rejected.In addition, complete node can also protect block chain to go wrong from dual branch, (i.e. same assets cannot Be used multiple times) influence, lemma 1 formalized dual payment problem.
The dual expenditure of lemma 1(): if the output that an input reference has been spent, the transaction comprising the input are Invalid, i.e., dual cost.
These verification steps inspire us, and block chain network can only retain its block that can be cited of trading, this has The storage and network crisis of marginal block chain are solved conducive to us.Based on the studies above, it is proposed that a kind of new transaction unloading Module, the storage resource for reducing block chain based on invalid transaction filter algorithm occupy, we will illustrate skill in following subsections Art details.
B. it trades filtration theory
As indicated earlier, the output effectively traded can be quoted by the latter.Method based on action organisation, we obtain following fixed Reason:
Theorem 1(trades in vain): if the output of a transaction is all quoted by subsequent affairs, the transaction is for newly handing over Easy verifying is useless.
Prove: according to lemma 1, the output of transaction cited in subsequent transaction cannot be quoted further, otherwise will be occurred double Branch goes wrong again.In addition, if New Transaction refers to several effective historical tradings, complete node does not need verifying history and hands over Easy validity, because historical trading is by effective transaction verification earlier.
After completing to the filtering traded in vain, transaction Unload module positioning carries the block effectively traded, and effectively hands over It is easily marked in Fig. 2 with solid square, the block effectively traded is marked in Fig. 2 with solid oval, they are updated to caching Layer;Invalid transaction is marked in Fig. 2 with dashed lined box, and invalid block, with dotted line oval marks, will be sent to benefit in Fig. 2 The cloud of beneficial relative backs up.Then, these blocks will be deleted from edge device.Unload module periodic operation, and always by block Quantity be kept low.For edge device, Unload module can reduce the storage resource of block chain occupancy, this So that equipment carries more edge applications, that is, it is finally reached efficient and green target.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (5)

1. a kind of edge collaboration method based on block chain, it is characterised in that: the following steps are included:
Edge application module receives the instruction of application program, generates request signal according to instruction and is transmitted to block chain module;
Request signal is converted to transaction by the block chain module, and transaction is broadcasted to entire edge network;Unload module exists Effective block is positioned in block chain, and the effective block in block chain is updated to cache module;
Effective block in the block chain module calls cache module according to verifying model and is verified transaction, verifies Pass through;Realize edge cooperation.
2. a kind of edge collaboration method based on block chain according to claim 1, it is characterised in that: further include following step Rapid: operating right is assigned other edge devices in edge network by the edge application module, other edge devices can visit Ask the local data of memory module.
3. a kind of edge collaboration method based on block chain according to claim 2, it is characterised in that: further include following step Rapid: the cache module storage edge application module, block chain module and Unload module operate the local data of generation recently;Institute It states edge application module and also inquires operation note of other edge devices to local data.
4. a kind of edge collaboration method based on block chain according to claim 1, it is characterised in that: the edge application Module can also be read out, be written and construct transaction in block chain module.
5. a kind of edge collaboration method based on block chain according to claim 1, it is characterised in that: the Unload module Effective block is positioned in block chain specifically includes the following steps: the transaction in block is detected, when the transaction in block is nothing Effect transaction then determines that the block is invalid block;Invalid block is sent to stakeholder and carries out cloud backup;It again will be invalid Block will be deleted from edge device;
When the transaction in block has certain effective transaction, then the block is determined for effective block, Unload module positioning carries The effective block for imitating transaction, is updated in cache module.
CN201811201798.0A 2018-10-16 2018-10-16 A kind of edge collaboration method based on block chain Pending CN109508991A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811201798.0A CN109508991A (en) 2018-10-16 2018-10-16 A kind of edge collaboration method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811201798.0A CN109508991A (en) 2018-10-16 2018-10-16 A kind of edge collaboration method based on block chain

Publications (1)

Publication Number Publication Date
CN109508991A true CN109508991A (en) 2019-03-22

Family

ID=65746635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811201798.0A Pending CN109508991A (en) 2018-10-16 2018-10-16 A kind of edge collaboration method based on block chain

Country Status (1)

Country Link
CN (1) CN109508991A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351381A (en) * 2019-07-18 2019-10-18 湖南大学 A kind of Distributed data share method that Internet of Things based on block chain is credible
CN110365707A (en) * 2019-07-30 2019-10-22 广州致链科技有限公司 Edge calculations gateway and its implementation towards block chain Internet of things system
CN110851531A (en) * 2019-11-08 2020-02-28 咪咕文化科技有限公司 Cooperative edge computing method, block chain and cooperative edge computing system
CN111260076A (en) * 2020-01-13 2020-06-09 天津大学 Block chain-based edge node training method, block chain and storage medium
CN111539750A (en) * 2020-04-27 2020-08-14 中山大学 Commodity traceability system based on block chain and big data technology
CN111866123A (en) * 2020-07-17 2020-10-30 海南大学 Data storage method and device based on block chain
CN112738090A (en) * 2020-12-29 2021-04-30 重庆邮电大学 Data integrity detection method based on green computing consensus mechanism block chain in edge computing
CN113010922A (en) * 2021-02-28 2021-06-22 昆明理工大学 Tamper-proof energy industry internet multi-edge chain data sharing method
CN113641664A (en) * 2021-07-13 2021-11-12 华中科技大学 Lightweight data storage device and method suitable for schema block chain

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609430A (en) * 2008-06-19 2009-12-23 威刚科技股份有限公司 Memory Storage Space Management Method
US20140258490A1 (en) * 2013-03-11 2014-09-11 Samsung Electronics Co., Ltd. Communication method of administration node, requesting node, and normal node for deleting invalid content using content revocation list in content centric network
CN106603698A (en) * 2016-12-28 2017-04-26 北京果仁宝科技有限公司 Block chain consensus method based on DPOS and nodes
CN106971302A (en) * 2017-04-17 2017-07-21 北京工商大学 A kind of threedimensional model based on block chain technology is really weighed and method of commerce
CN107360238A (en) * 2017-07-25 2017-11-17 光载无限(北京)科技有限公司 Intelligent contract gateway based on block chain CPOW common recognition algorithms
CN107819749A (en) * 2017-10-26 2018-03-20 平安科技(深圳)有限公司 Block catenary system and transaction data processing method based on ether mill
CN108134706A (en) * 2018-01-02 2018-06-08 中国工商银行股份有限公司 Block chain high-availability system mostly living, computer equipment and method
CN108494830A (en) * 2018-02-27 2018-09-04 浙江辉宏地理信息有限公司 A kind of Internet of Things using block chain
CN108616596A (en) * 2018-05-09 2018-10-02 南京邮电大学 It is adaptively known together method based on the block chain that dynamic authorization and network environment perceive

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101609430A (en) * 2008-06-19 2009-12-23 威刚科技股份有限公司 Memory Storage Space Management Method
US20140258490A1 (en) * 2013-03-11 2014-09-11 Samsung Electronics Co., Ltd. Communication method of administration node, requesting node, and normal node for deleting invalid content using content revocation list in content centric network
CN106603698A (en) * 2016-12-28 2017-04-26 北京果仁宝科技有限公司 Block chain consensus method based on DPOS and nodes
CN106971302A (en) * 2017-04-17 2017-07-21 北京工商大学 A kind of threedimensional model based on block chain technology is really weighed and method of commerce
CN107360238A (en) * 2017-07-25 2017-11-17 光载无限(北京)科技有限公司 Intelligent contract gateway based on block chain CPOW common recognition algorithms
CN107819749A (en) * 2017-10-26 2018-03-20 平安科技(深圳)有限公司 Block catenary system and transaction data processing method based on ether mill
CN108134706A (en) * 2018-01-02 2018-06-08 中国工商银行股份有限公司 Block chain high-availability system mostly living, computer equipment and method
CN108494830A (en) * 2018-02-27 2018-09-04 浙江辉宏地理信息有限公司 A kind of Internet of Things using block chain
CN108616596A (en) * 2018-05-09 2018-10-02 南京邮电大学 It is adaptively known together method based on the block chain that dynamic authorization and network environment perceive

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351381B (en) * 2019-07-18 2020-10-02 湖南大学 Block chain-based Internet of things trusted distributed data sharing method
CN110351381A (en) * 2019-07-18 2019-10-18 湖南大学 A kind of Distributed data share method that Internet of Things based on block chain is credible
CN110365707A (en) * 2019-07-30 2019-10-22 广州致链科技有限公司 Edge calculations gateway and its implementation towards block chain Internet of things system
CN110851531B (en) * 2019-11-08 2022-06-28 咪咕文化科技有限公司 Cooperative edge computing method, block chain and cooperative edge computing system
CN110851531A (en) * 2019-11-08 2020-02-28 咪咕文化科技有限公司 Cooperative edge computing method, block chain and cooperative edge computing system
CN111260076A (en) * 2020-01-13 2020-06-09 天津大学 Block chain-based edge node training method, block chain and storage medium
CN111539750A (en) * 2020-04-27 2020-08-14 中山大学 Commodity traceability system based on block chain and big data technology
CN111539750B (en) * 2020-04-27 2023-05-05 中山大学 Commodity traceability system based on blockchain and big data technology
CN111866123A (en) * 2020-07-17 2020-10-30 海南大学 Data storage method and device based on block chain
CN112738090A (en) * 2020-12-29 2021-04-30 重庆邮电大学 Data integrity detection method based on green computing consensus mechanism block chain in edge computing
CN113010922A (en) * 2021-02-28 2021-06-22 昆明理工大学 Tamper-proof energy industry internet multi-edge chain data sharing method
CN113010922B (en) * 2021-02-28 2022-07-01 昆明理工大学 Tamper-proof energy industry internet multi-edge chain data sharing method
CN113641664A (en) * 2021-07-13 2021-11-12 华中科技大学 Lightweight data storage device and method suitable for schema block chain

Similar Documents

Publication Publication Date Title
CN109508991A (en) A kind of edge collaboration method based on block chain
Dickerson et al. Allocation problems in ride-sharing platforms: Online matching with offline reusable resources
EP3824423B1 (en) Blockchain transaction safety using smart contracts
US20220239470A1 (en) Cross-blockchain data processing method and apparatus, device, and computer storage medium
EP4009260A1 (en) Method for secure ledger distribution and computer system using secure distributed ledger technology
CN108846659A (en) Transfer account method, device and storage medium based on block chain
CN109242685A (en) Common recognition and verification method and device based on block chain
US20210083876A1 (en) Distributed ledger appliance and methods of use
CN103378987B (en) For multiple security domains being carried out the method and system of tactical management
US11295402B2 (en) Blockchain-based property repair
Ferrer et al. A GRASP metaheuristic for humanitarian aid distribution
CN109118230A (en) Information processing method and device based on block chain
US12079879B2 (en) Computer systems and software for self-executing code and distributed database
CN110992029A (en) Block chain management system and method
Kaur et al. Blockchain consensus protocols: state-of-the-art and future directions
Biswas et al. Incorporating domain knowledge into Memetic Algorithms for solving Spatial Optimization problems
Nguyen et al. Lachesis: Scalable asynchronous BFT on DAG streams
Ma et al. Stochastic performance modeling for practical byzantine fault tolerance consensus in the blockchain
Lee et al. Blockchain-based perfect sharing project platform based on the proof of atomicity consensus algorithm
Ajmani et al. Impact of AI in Financial Technology-A Comprehensive Study and Analysis
Yuan et al. PipeEdge: A trusted pipelining collaborative edge training based on blockchain
EP3314479A1 (en) Devices and/or methods to provide a query response based on ephemeral data
CN116485527A (en) Financial credit risk analysis method and device
CN117917681A (en) Asset transfer method, device, equipment, medium and product based on multi-block chain
Dong et al. Managing participants’ behaviors: A framework to improve the process efficiency of transport public-private partnerships

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190322

WD01 Invention patent application deemed withdrawn after publication