CN109919771A - A kind of hierarchical block chain network and method of commerce applied to industry internet - Google Patents
A kind of hierarchical block chain network and method of commerce applied to industry internet Download PDFInfo
- Publication number
- CN109919771A CN109919771A CN201910203549.3A CN201910203549A CN109919771A CN 109919771 A CN109919771 A CN 109919771A CN 201910203549 A CN201910203549 A CN 201910203549A CN 109919771 A CN109919771 A CN 109919771A
- Authority
- CN
- China
- Prior art keywords
- node
- block
- central node
- new block
- limited resources
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The embodiment of the present application provides a kind of hierarchical block chain network and method of commerce applied to industry internet, hierarchical block chain network includes limited resources layer and extended resources layer, limited resources layer includes multiple limited resources nodes, multiple limited resources node is clustered into multiple clusters, and each cluster includes a central node and multiple controlled nodes for being managed by the central node.The hierarchical block chain network is respectively decided whether to retain the block received by each central node, and the consistency desired result of block is carried out by the control equipment of extended resources layer, so as to improve the problem of the calculated performance deficiency of the limited resources node layer in limited resources layer.
Description
Technical field
This application involves industry internet technical fields, in particular to a kind of layering applied to industry internet
Block chain network and method of commerce.
Background technique
Block chain technology can be solved by the verifying and common recognition mechanism of distributed node between decentralization system node
The problem of Trust Establishment, realizes decentralization, distributed Trust Establishment mechanism, to complete valence while information transmission
The transfer of value.The transaction privacy of block chain, safety, the invariance of data and auditing possibility, integrality, system transparent and appearance
Mistake so that block chain is widely used in the multiple fields in addition to encrypting currency, including Identity Management, intelligent transportation,
Supply chain management, Internet of Things, industry internet, energy internet etc..
Due to using encryption technology and being stored without intensive data, block chain passing through one have it is anonymous and can
The decentralized environment of transaction is believed to change industry internet application field.Specifically, in conjunction with block chain technology, industrial control system can
With from lower operation cost, the resource management of dispersion is benefited lower than robustness for threatening and attacking etc..But it is industrial
The inherent characteristics such as internet is controlled due to lacking center, the isomerism of equipment and node computing capability are limited, to traditional area
Block chain technology and data security protecting propose challenge, such as:
(1) resource-constrained: the resources such as bandwidth, calculating and memory of the equipment in most of industrial systems are limited, it is difficult to full
The high performance requirements of sufficient Complex Blocks chain solution.
(2) multilevel center management: current industry internet system relies on the agent communication model of classification, owns in system
Equipment all passes through central control systems or Cloud Server at different levels and is identified, verified and connected.With the scale of industry internet system
Increasing, the Cloud Server of concentration is difficult to meet the real-time, interactive demand of dispersing apparatus.
(3) data safety: the logarithms such as sensitive data of the key parameter and information system that are related in industrial production environment
It is higher according to privacy and demand for safety protection, it needs to ensure data from bottom sensing, protocol communication and information processing whole process
Security protection.
Therefore, existing block chain network is also far from meeting the needs of industrial production environment.
Summary of the invention
In view of this, the purpose of the application include provide it is a kind of applied to the hierarchical block chain network of industry internet and friendship
Easy method, at least partly to improve the above problem.
In order to achieve the above object, the embodiment of the present application adopts the following technical scheme that
In a first aspect, the embodiment of the present application provides a kind of hierarchical block chain network applied to industry internet, including by
It limits resource layer and extended resources layer, the limited resources layer includes multiple limited resources nodes, the multiple limited resources node
It is clustered into multiple clusters, each cluster includes central node and multiple controlled nodes for being managed by the central node;In described
Heart node is used for:
The transaction request that the controlled node of its control is sent is received, according in the first block chained list of the limited resources layer
The authority list prestored judges whether the controlled node has object run permission corresponding with the transaction request, and the transaction is asked
It asks including trade transactions and the first transaction hash;If the controlled node has the object run permission, from the block chain
The implementation strategy stored in current newest block is obtained in table;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash
It is identical, it is determined that the trade transactions of the transaction request instruction are received by the first block chained list, execute the trade transactions
And implementing result is saved according to the implementation strategy;
New block is generated according to the implementation strategy and the transaction request, is carried out using new block described in shared secret key pair
Sign and be sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer is used for: consistency checking is carried out to the new block, if passing through described one
Cause property verifying, then the second block chained list of the extended resources layer is updated, and to the limited resources layer it is each in
New block described in heart node broadcasts.
Second aspect, the embodiment of the present application provide a kind of method of commerce applied to industry internet, are applied to demixing zone
Block chain network, the hierarchical block chain network include limited resources layer and extended resources layer, and the limited resources layer includes multiple
Limited resources node, the multiple limited resources node are clustered into multiple clusters, and each cluster includes central node and by this
Multiple controlled nodes of central node control;The described method includes:
The central node receives the transaction request that the controlled node of its control is sent, according to the of the limited resources layer
The authority list prestored in one block chained list judges whether the controlled node has object run power corresponding with the transaction request
Limit, the transaction request include trade transactions and the first transaction hash;
If the controlled node has the object run permission, current newest block is obtained from the block chained list
The implementation strategy of middle storage;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash
It is identical, it is determined that the trade transactions of the transaction request instruction are received by the first block chained list, execute the trade transactions
And implementing result is saved according to the implementation strategy;
New block is generated according to the implementation strategy and the transaction request, is carried out using new block described in shared secret key pair
Sign and be sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer carries out consistency checking to the new block, if being tested by the consistency
Card, then be updated the second block chained list of the extended resources layer, and to each central node of the limited resources layer
Broadcast the new block.
The embodiment of the present application provides a kind of hierarchical block chain network and method of commerce applied to industry internet, demixing zone
Block chain network includes limited resources layer and extended resources layer, and limited resources layer includes multiple limited resources nodes, multiple limited
Resource node is clustered into multiple clusters, and each cluster includes a central node and managed by the central node multiple controlled
Node.The hierarchical block chain network is respectively decided whether to retain the block received by each central node, and passes through extension money
The control equipment of active layer carries out the consistency desired result of block, so as to improve the limited resources node layer in limited resources layer
The problem of calculated performance deficiency.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of framework signal of hierarchical block chain network applied to industry internet provided by the embodiments of the present application
Figure;
Fig. 2 be a kind of flow diagram of the method for commerce applied to industry internet provided by the embodiments of the present application it
One;
Fig. 3 is the two of the flow diagram of method of commerce provided by the embodiments of the present application;
Fig. 4 is the three of the flow diagram of method of commerce provided by the embodiments of the present application;
Fig. 5 is the four of the flow diagram of method of commerce provided by the embodiments of the present application.
Icon: 10- hierarchical block chain network;11- limited resources layer;12- extended resources layer;21,22- cluster.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented
The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimed
Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common
Technical staff's every other embodiment obtained without creative efforts belongs to the model of the application protection
It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
The data driven type network that industry internet is made of the Internet of Things of bottom and the Information Network on upper layer, by general
It is connecting, is being provided with comprehensive acquisition capacity to all kinds of production factors data such as equipment, software, personnel and system;Pass through cloud
Service, realizes the storage, management and calculating of mass data.According to specific criteria, such as IEC62443, industry can be interconnected
Net system is divided into scene equipment level, field control layer and management information level, can have calculating, communication, sensing and driving function
Can, and these functions are distributed in Overlay (covering) network.
Wherein, the scene equipment level includes the low-power consumption such as various kinds of sensors, data collector, controller and execution unit
Embedded platform.In detail, the equipment in the scene equipment level can be defined as with certain processing capacity and storage energy
The node of power can be referred to as class 0 equipment, belong to limited resources layer.
The field control layer may include the equipment such as gateway, central controller, data collector, for collecting from terminal device
Sensing data, and the inbound communication and outbound data of processing and terminal device layer.Equipment in the field control layer can
To be referred to as 1 class equipment, home extension resource layer.Number in order to meet the real-time requirement of application program, in the scene equipment level
According to usually being handled in the field control layer.
The management information level has maximum processing capacity and memory capacity comprising server and back end layers are responsible for letter
Breath processing, storage and visualization, homing core resource layer.
When implementing, the extended resources layer and the limited resources layer can be based on the attribute information structures of entity device
It builds.
It can be seen that demand of each layer in industry internet to resource is different, needed before disposing block chain wherein
The resource capacity of different layers is designed.
Based on this, the embodiment of the present application by limited resources layer and extended resources layer building on overlay network, and thus structure
A kind of lightweight, high-throughput hierarchical block chain network (also known as, hierarchical block chain model) is built.
Fig. 1 is please referred to, Fig. 1 is a kind of hierarchical block chain network applied to industry internet provided by the embodiments of the present application
10 configuration diagram.The hierarchical block chain network 10 is constructed based on overlay network, and the overlay network includes a variety of entities
The entirety of equipment, one of entity device or multiple entity devices composition is properly termed as a resource node, described a variety of
Entity device may include sensing equipment, acquisition equipment, execution unit, central controller, the network equipment and server etc..
When implementing, limited resources layer 11 and extended resources layer can be constructed according to the attribute information of each resource node
12, wherein include multiple limited resources nodes in limited resources layer 11.In order to ensure block chain scalability and reduction network are opened
Pin delay can press Clustering to the multiple limited resources node, obtain multiple clusters, such as can be in Fig. 1 and show
21 and 22.Wherein, each cluster is a cluster.For each cluster, cluster head (Cluster- is selected from the cluster
Head-CH node centered on) is managed corresponding block chain by the central node.Other nodes in the cluster
It can also be managed by the central node, be based on this, other nodes that the present embodiment manages acceptor center node in a cluster are about
It is set to controlled node.For example, the central node of cluster 21 is CH1, the central node of cluster 22 is CH2.
Referring to figure 2., Fig. 2 is a kind of process of method of commerce applied to industry internet provided by the embodiments of the present application
Schematic diagram, this method can be applied to hierarchical block chain network 10 shown in FIG. 1.Each step of this method is explained below
It states.
Step S21, central node receives the transaction request that the controlled node of its control is sent, according to the limited resources layer
The first block chained list in the authority list that prestores judge whether the controlled node has target behaviour corresponding with the transaction request
Make permission, the transaction request includes trade transactions and the first transaction hash (hash).
Central node described in step S21 can be the central node of any cluster.Each node in cluster can be with
All kinds of affairs for protecting this node to generate using Encryption Algorithm such as asymmetric encryption, digital signature and cryptographic Hash functions.Institute
Stating the first transaction hash can be obtained from central node handled trade transactions based on above-mentioned Encryption Algorithm.
Wherein, the limited resources layer maintenance has the first block chained list.The limited resources layer is creating the first block chain
When the original block of table, the authority list is written in the first block chained list.There is each controlled record in the authority list
The operating right of node, such as read operation permission or write operation permission etc..In implementation process, asked for the transaction received
It asks, central node can inquire whether the controlled node for sending the transaction request there is the transaction request to indicate from authority list
Operating right (that is: the described object run permission).
Step S22 is obtained from the first block chained list and is worked as if the controlled node has the object run permission
The implementation strategy stored in preceding newest block.
In the present embodiment, the institute for being stored with each resource node of limited resources layer is encrypted in the first block chained list
There is policy definition, the implementation strategy is stored in a manner of chained list.The central node can be based on the first block chained list
In the implementation strategy of current newest block storage carry out current operation.The current newest block is to be generated new
The previous block of block.
Step S23 generates the second transaction hash based on the transaction request, if the second transaction hash and described first
Transaction hash is identical, then executes the trade transactions of the transaction request instruction and save implementing result according to the implementation strategy.
Wherein, when the second transaction hash and the first transaction hash are identical, the trade transactions that the transaction request indicates are indicated
Received by the first block chained list.
Step S24 generates new block according to the implementation strategy and the transaction request, using new described in shared secret key pair
Block is signed and is sent to the control equipment of the extended resources layer.
Optionally, described the step of generating new block according to the implementation strategy and the transaction request may include following
Step:
A random period is waited, then executes the step of new block is generated according to the implementation strategy and the transaction request.
By above-mentioned design, randomness can be introduced between module generator.
The control equipment of step S25, the extended resources layer carry out consistency checking to the new block, if described consistent
Property is verified, then is updated to the second block chained list of the extended resources layer, and to each of the limited resources layer
Central node broadcasts the new block.
In the present embodiment, each central node Independent Decisiveness is to retain new block or abandon it.This may cause respectively
There are the blocks of different editions in a central node.Therefore, it is necessary to carry out consistency checking.But the consistency in the present embodiment is tested
Card is not real-time perfoming, but is carried out in certain latent period by the control equipment of extended resources layer 12, reduces and synchronizes out
Pin.
In the present embodiment, the method can with the following steps are included:
The first central node that the new block is received in the limited resources layer is used for according to the trust being locally stored
Evidence table really weighs the new block.
In the present embodiment, each central node can safeguard a trust evidence table.The credentials of each central node
There are the direct trusted node and indirect trusted node of the central node according to record in table, the direct trusted node generates at least
One block passes through the verifying of the central node, at least one block that the indirect trusted node generates passes through the central node
Any direct trusted node verifying.In other words, for central node A, if during the block that central node B is generated passed through
The verifying of heart node A, it may be considered that central node B is the direct trusted node of central node A;If central node C is generated
Block passed through the verifying of central node B, it may be considered that central node C is the indirect trusted node of central node A.
Still by taking above-mentioned central node A, B, C as an example, with direct trusted node B generate block in pass through centromere
The quantity (being about set to " number of blocks formerly verified " herein) of the block of the verifying of point A changes, really the power stage can be with
The trade transactions of different proportion are verified in the block generated to direct trusted node B.Similarly, with indirect trusted node
Reach the difference of the ratio (being about set to " reaching mutual trust rate " herein) of mutual trust in the block that C is generated with central node A,
Central node A trade transactions of different proportion in the block that the true power stage can generate indirect trusted node C are verified.
In one example, the number of blocks of direct trusted node formerly verified with need it is corresponding between verifying ratio
Relationship, and trusted node reaches mutual trust rate and needs the corresponding relationship between verifying ratio can be such as the following table 1 indirectly
It is shown.Wherein, the ratio for needing to verify ratio and referring to the trade transactions for needing to verify in new block.
Table 1
Optionally, in the present embodiment, first central node is according to the trust evidence table being locally stored to described new
The step of block is really weighed may include sub-step shown in Fig. 3.
Step S31, first central node are the direct of this node generating the second central node of the new block
In the case where trusted node, determine in the block of second central node generation through the area of the verifying of first central node
The current quantity of block.
Step S32 determines the corresponding pass that the current quantity is hit from the corresponding relationship that the trust evidence list prestores
System, determines the first ratio recorded in the corresponding relationship of the hit, and to the transaction of the first ratio described in the new block into
Row verifying.
Wherein, the current quantity can serve as the above-mentioned number of blocks formerly verified, and first ratio can fill
When the above-mentioned ratio for needing to verify corresponding with number of blocks that is formerly verifying.
Optionally, in the present embodiment, first central node is according to the trust evidence table being locally stored to described new
The step of block is really weighed may include sub-step shown in Fig. 4.
Step S41, first central node is in the feelings that second central node is the indirect trusted node of this node
Under condition, the mutual trust rate currently reached in the block of the second central node generation with first central node is determined.
Step S42 determines the correspondence that the mutual trust rate is hit from the corresponding relationship that the trust evidence list prestores
Relationship determines the second ratio recorded in the corresponding relationship of the hit, and the transaction to the second ratio described in the new block
It is verified.
Wherein, the mutual trust rate currently reached can serve as it is above-mentioned reach mutual trust rate, second ratio
Example, which can be served as, reaches that mutual trust rate is corresponding to need the ratio verified with described.
Based on description above, since the random period that each central node waits is different, each central node can
The new block generated by another central node can be received, may include the part transaction thing in trading pit in the new block
Business.Based on this, method of commerce provided in this embodiment can also include step shown in fig. 5.
Step S51, first central node detect the trading pit of this node and described when receiving the new block
It whether there is identical trade transactions in new block.
Step S52, and if it exists, then delete the identical trade transactions from the new block, and to other centromeres
Point, which is sent, waits synchronization notice.
Wherein, when other described central nodes receive the waiting synchronization notice, it will specified time is waited, to sum
It states the first central node and reaches synchronous.Wherein, the upper limit of maximum latency is most big end in the hierarchical block chain network 10
To twice of end delay duration.
Optionally, in the present embodiment, in order to protect entire block chain network from the attack of illegal malicious node, one
In a common recognition period, each cluster in hierarchical block chain network 10 can only allow to generate a new block.Wherein, described total
The maximum value for knowing the period can be defaulted as 5 minutes (that is: the 1/2 of the bit coin digging mine period).The minimum value in the common recognition period can
Twice for thinking the maximum end-to-end delay duration between the node in the hierarchical block chain network, so, it can be ensured that have foot
The enough time propagates the new block of other central nodes generation.
In particular, the neighbor node of the central node can be right in order to avoid central node prompts the waiting time insufficient always
This node is monitored in the frequency that waiting time generates new block, once the new district number of blocks for monitoring generation is more than threshold value,
Then the central node can abandon the new block that the neighbor node generates.
Optionally, in the present embodiment, the case where being excessively delayed may also occur in central node.Based on this, the present embodiment
The method of commerce of offer can with the following steps are included:
Delay duration between any two node reaches the case where preset quantity times of preset block chain billing cycle
Under, the multiple limited resources node in the limited resources layer re-starts cluster.
Wherein, the preset quantity for example can be 2.After re-starting cluster, each cluster can be chosen again
Central node.Under normal circumstances, node centered on the online node of selection long period interior holding.By designing above, by
First block chained list of limit resource layer is not influenced by equipment dynamic change.
It is worth noting that in hierarchical block chain network 10 provided in this embodiment, by data flow and business flow separation.
Therefore, in network access or monitoring class affairs data are sent by individual data packet after accessed equipment is really weighed
Give request equipment.Similarly, data are acquired or stored with class affairs, is created by requestor and directly transmits corresponding data.
In the present embodiment, central node needs to carry out it verifying and is then added to the firstth area for received new block
In block chained list.The transaction common recognition verification process for single trade transactions is described below.Wherein, the transaction common recognition is tested
Card process includes verifying, the verifying for output and the verifying for requested person for requestor.
Firstly, being directed to the verification process of requestor: judging the hash of the received new block and the block tail of previous block
Hash it is whether identical, if it is different, then returning to failure (that is: False);The signature of the new block is verified, if verifying
Do not pass through, then returns to False.
Then, for the verification process of output: determining the trade transactions successfully received in the new block by block chained list
Quantity (such as being expressed as X.output [0]) and the trade transactions quantity (such as being expressed as X.output [1]) being rejected, really
X-1.output (such as is expressed as by trade transactions quantity that block chained list successfully receives in the previous block of the fixed new block
And the trade transactions quantity (such as being expressed as X-1.output [1]) that is rejected [0]).Calculate (X.output [0]-X-
1.output [0])+value of (X.output [1]-X-1.output [1]), if obtained value is greater than 1, it is determined that there are duplicate blocks
Block is successfully received by block chained list, therefore returns to False.
Finally, being directed to the verification process of requested person: the signature of requested person is verified, if verifying does not pass through,
Return to False, the common recognition otherwise, it determines trade transactions are concluded the transaction, it may be assumed that transaction common recognition is verified.
In conclusion the embodiment of the present application provide it is a kind of applied to the hierarchical block chain network of industry internet and counterparty
Method, hierarchical block chain network include limited resources layer and extended resources layer, and limited resources layer includes multiple limited resources nodes, should
Multiple limited resources nodes are clustered into multiple clusters, and each cluster includes a central node and managed by the central node
Multiple controlled nodes.The hierarchical block chain network is respectively decided whether to retain the block received by each central node, and is led to
The control equipment of extended resources layer is crossed to carry out the consistency desired result of block, so as to improve the limited resources in limited resources layer
The problem of the calculated performance deficiency of node layer.
In addition, the embodiment of the present application reduced by a kind of time consistency algorithm because of network delay caused by blocks operation
It is asynchronous, also by it is above-mentioned based on trust evidence table distributed trust really weigh algorithm, improve the flux of block chain, reduce
New block needs the number of transaction verified, and ensures that the Session loads of public block chain are balanced.
In embodiment provided herein, it should be understood that disclosed network and method, it can also be by other
Mode realize.Embodiments described above is only schematical, for example, the flow chart and block diagram in the drawings show roots
According to the network of multiple embodiments of the application, architectural framework in the cards, function and the behaviour of method and computer program product
Make.In this regard, each box in flowchart or block diagram can represent a part of a module, section or code, institute
The a part for stating module, section or code includes one or more executable instructions for implementing the specified logical function.
It should also be noted that function marked in the box can also be to be different from attached drawing in some implementations as replacement
The sequence marked occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by
Opposite sequence executes, and this depends on the function involved.It is also noted that each box in block diagram and or flow chart,
And the combination of the box in block diagram and or flow chart, hardware can be based on the defined function of execution or the dedicated of movement
System realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
Claims (10)
1. a kind of hierarchical block chain network applied to industry internet, which is characterized in that including limited resources layer and extension money
Active layer, the limited resources layer include multiple limited resources nodes, and the multiple limited resources node is clustered into multiple clusters,
Each cluster includes central node and multiple controlled nodes for being managed by the central node;The central node is used for:
The transaction request that the controlled node of its control is sent is received, is prestored according in the first block chained list of the limited resources layer
Authority list judge whether the controlled node has object run permission corresponding with the transaction request, the transaction request packet
Include trade transactions and the first transaction hash;If the controlled node has the object run permission, from the block chained list
Obtain the implementation strategy stored in current newest block;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash phase
Together, then the trade transactions are executed and implementing result is saved according to the implementation strategy;And
New block is generated according to the implementation strategy and the transaction request, is signed using new block described in shared secret key pair
And it is sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer is used for: consistency checking is carried out to the new block, if passing through the consistency
Verifying, then be updated the second block chained list of the extended resources layer, and to each centromere of the limited resources layer
Point broadcasts the new block.
2. network according to claim 1, which is characterized in that
The first central node that the new block is received in the limited resources layer is used for according to the trust evidence being locally stored
Table really weighs the new block;
Wherein, record has the direct trusted node of the central node and trusts section indirectly in the trust evidence table of each central node
Point, at least one block that the direct trusted node generates pass through the verifying of the central node, and the indirect trusted node is raw
At the verifying that passes through any direct trusted node of the central node of at least one block.
3. network according to claim 2, which is characterized in that first central node is according to the credentials being locally stored
The concrete mode that the new block is really weighed according to table, comprising:
In the case where generating the second central node of the new block is the direct trusted node of this node, determine this in second
Pass through the current quantity of the block of the verifying of first central node in the block that heart node generates;
The corresponding relationship that the current quantity is hit is determined from the corresponding relationship that the trust evidence table prestores, and determines the hit
The first ratio recorded in corresponding relationship, and the transaction of the first ratio described in the new block is verified.
4. network according to claim 3, which is characterized in that first central node is according to the credentials being locally stored
The concrete mode that the new block is really weighed according to table, further includes:
In the case where second central node is the indirect trusted node of this node, determine that second central node generates
Block in the mutual trust rate currently reached with first central node;
The corresponding relationship that the mutual trust rate is hit is determined from the corresponding relationship that the trust evidence table prestores, and determines the hit
Corresponding relationship in the second ratio for recording, and the transaction of the second ratio described in the new block is verified.
5. network according to claim 2 or 3, which is characterized in that
First central node is also used to when receiving the new block, detect this node trading pit and the new block
In whether there is identical trade transactions;If it exists, then delete the identical trade transactions from the new block, and to its
His central node, which is sent, waits synchronization notice.
6. network described in any one of -4 according to claim 1, which is characterized in that the central node waits a random week
Phase, then execute the step of new block is generated according to the implementation strategy and the transaction request.
7. network described in any one of -4 according to claim 1, which is characterized in that
Delay duration between any two node in the hierarchical block chain network reaches preset block chain billing cycle
Preset quantity times in the case where, the multiple limited resources node in the limited resources layer re-starts cluster.
8. a kind of method of commerce applied to industry internet, which is characterized in that be applied to hierarchical block chain network, the layering
Block chain network includes limited resources layer and extended resources layer, and the limited resources layer includes multiple limited resources nodes, described
Multiple limited resources nodes are clustered into multiple clusters, and each cluster includes central node and managed by the central node multiple
Controlled node;The described method includes:
The central node receives the transaction request that the controlled node of its control is sent, according to the firstth area of the limited resources floor
The authority list prestored in block chained list judges whether the controlled node has object run permission corresponding with the transaction request, institute
Stating transaction request includes trade transactions and the first transaction hash;
If the controlled node has the object run permission, deposited from being obtained in current newest block in the block chained list
The implementation strategy of storage;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash phase
Together, then the trade transactions are executed and implementing result is saved according to the implementation strategy;
New block is generated according to the implementation strategy and the transaction request, is signed using new block described in shared secret key pair
And it is sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer carries out consistency checking to the new block, if by the consistency checking,
Then the second block chained list of the extended resources layer is updated, and is broadcasted to each central node of the limited resources layer
The new block.
9. according to the method described in claim 8, it is characterized in that, the method also includes:
The first central node that the new block is received in the limited resources layer is used for according to the trust evidence being locally stored
Table really weighs the new block;
Wherein, record has the direct trusted node of the central node and trusts section indirectly in the trust evidence table of each central node
Point, at least one block that the direct trusted node generates pass through the verifying of the central node, and the indirect trusted node is raw
At the verifying that passes through any direct trusted node of the central node of at least one block.
10. according to the method described in claim 9, it is characterized in that, first central node is according to the trust being locally stored
Evidence table really weighs the new block, comprising:
In the case where generating the second central node of the new block is the direct trusted node of this node, determine this in second
Pass through the current quantity of the block of the verifying of first central node in the block that heart node generates;From the trust evidence table
The corresponding relationship that current quantity hit is determined in the corresponding relationship prestored, determines first recorded in the corresponding relationship of the hit
Ratio, and the transaction of the first ratio described in the new block is verified;
In the case where second central node is the indirect trusted node of this node, determine that second central node generates
Block in the mutual trust rate currently reached with first central node;From the corresponding pass that the trust evidence list prestores
The corresponding relationship that mutual trust rate hit is determined in system, determines the second ratio recorded in the corresponding relationship of the hit, and right
The transaction of second ratio described in the new block is verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910203549.3A CN109919771B (en) | 2019-03-18 | 2019-03-18 | Industrial internet transaction device applying hierarchical block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910203549.3A CN109919771B (en) | 2019-03-18 | 2019-03-18 | Industrial internet transaction device applying hierarchical block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109919771A true CN109919771A (en) | 2019-06-21 |
CN109919771B CN109919771B (en) | 2020-04-10 |
Family
ID=66965327
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910203549.3A Active CN109919771B (en) | 2019-03-18 | 2019-03-18 | Industrial internet transaction device applying hierarchical block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109919771B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111031076A (en) * | 2020-03-06 | 2020-04-17 | 南京畅洋科技有限公司 | Internet of things block chain consensus method based on timing mechanism |
CN111770017A (en) * | 2020-06-22 | 2020-10-13 | 国网冀北电力有限公司电力科学研究院 | Power distribution Internet of things cluster management system and method based on trusted block chain |
CN112419060A (en) * | 2020-11-20 | 2021-02-26 | 上海树图区块链研究院 | Asset hosting system, asset management method, node, and medium |
CN112540338A (en) * | 2020-10-23 | 2021-03-23 | 国网天津市电力公司 | Intelligent electric meter verification system based on block chain technology |
CN113328935A (en) * | 2021-05-20 | 2021-08-31 | 福建思特电子有限公司 | Distributed safety tracing block chain system based on industrial internet |
US11416933B2 (en) | 2020-01-07 | 2022-08-16 | Bank Of America Corporation | Event management and validation platform using a recursive hierarchic blockchain |
WO2023051455A1 (en) * | 2021-09-28 | 2023-04-06 | 华为技术有限公司 | Method and apparatus for training trust model |
CN116074328A (en) * | 2023-03-01 | 2023-05-05 | 中国信息通信研究院 | Block transmission method, device, equipment and medium in block chain network |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100229026A1 (en) * | 2007-04-25 | 2010-09-09 | Alibaba Group Holding Limited | Method and Apparatus for Cluster Data Processing |
CN105488665A (en) * | 2015-11-25 | 2016-04-13 | 布比(北京)网络技术有限公司 | Decentralized transaction method |
CN108134706A (en) * | 2018-01-02 | 2018-06-08 | 中国工商银行股份有限公司 | Block chain high-availability system mostly living, computer equipment and method |
CN108282539A (en) * | 2018-02-06 | 2018-07-13 | 北京奇虎科技有限公司 | Decentralization storage system based on double-layer network |
CN108632386A (en) * | 2018-05-15 | 2018-10-09 | 众安信息技术服务有限公司 | A kind of block chain set of node group building method and device |
CN109040014A (en) * | 2018-06-13 | 2018-12-18 | 湖南搜云网络科技股份有限公司 | Block chain processing method and processing device, block chain node and storage medium |
CN109040026A (en) * | 2018-07-11 | 2018-12-18 | 深圳市网心科技有限公司 | A kind of authorization method of digital asset, device, equipment and medium |
CN109767220A (en) * | 2019-01-15 | 2019-05-17 | 中国联合网络通信集团有限公司 | Method of commerce based on block chain and the transaction system based on block chain |
-
2019
- 2019-03-18 CN CN201910203549.3A patent/CN109919771B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100229026A1 (en) * | 2007-04-25 | 2010-09-09 | Alibaba Group Holding Limited | Method and Apparatus for Cluster Data Processing |
CN105488665A (en) * | 2015-11-25 | 2016-04-13 | 布比(北京)网络技术有限公司 | Decentralized transaction method |
CN108134706A (en) * | 2018-01-02 | 2018-06-08 | 中国工商银行股份有限公司 | Block chain high-availability system mostly living, computer equipment and method |
CN108282539A (en) * | 2018-02-06 | 2018-07-13 | 北京奇虎科技有限公司 | Decentralization storage system based on double-layer network |
CN108632386A (en) * | 2018-05-15 | 2018-10-09 | 众安信息技术服务有限公司 | A kind of block chain set of node group building method and device |
CN109040014A (en) * | 2018-06-13 | 2018-12-18 | 湖南搜云网络科技股份有限公司 | Block chain processing method and processing device, block chain node and storage medium |
CN109040026A (en) * | 2018-07-11 | 2018-12-18 | 深圳市网心科技有限公司 | A kind of authorization method of digital asset, device, equipment and medium |
CN109767220A (en) * | 2019-01-15 | 2019-05-17 | 中国联合网络通信集团有限公司 | Method of commerce based on block chain and the transaction system based on block chain |
Non-Patent Citations (1)
Title |
---|
甘玉宁: "基于信任度和风险评估的分布式认证模型", 《中国优秀硕士学位论文全文数据库(电子期刊)》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11416933B2 (en) | 2020-01-07 | 2022-08-16 | Bank Of America Corporation | Event management and validation platform using a recursive hierarchic blockchain |
CN111031076A (en) * | 2020-03-06 | 2020-04-17 | 南京畅洋科技有限公司 | Internet of things block chain consensus method based on timing mechanism |
CN111770017A (en) * | 2020-06-22 | 2020-10-13 | 国网冀北电力有限公司电力科学研究院 | Power distribution Internet of things cluster management system and method based on trusted block chain |
CN112540338A (en) * | 2020-10-23 | 2021-03-23 | 国网天津市电力公司 | Intelligent electric meter verification system based on block chain technology |
CN112419060A (en) * | 2020-11-20 | 2021-02-26 | 上海树图区块链研究院 | Asset hosting system, asset management method, node, and medium |
CN112419060B (en) * | 2020-11-20 | 2024-03-22 | 上海树图区块链研究院 | Asset hosting system, asset management method, node and medium |
CN113328935A (en) * | 2021-05-20 | 2021-08-31 | 福建思特电子有限公司 | Distributed safety tracing block chain system based on industrial internet |
CN113328935B (en) * | 2021-05-20 | 2022-11-11 | 福建思特电子有限公司 | Distributed safety tracing block chain system based on industrial internet |
WO2023051455A1 (en) * | 2021-09-28 | 2023-04-06 | 华为技术有限公司 | Method and apparatus for training trust model |
CN116074328A (en) * | 2023-03-01 | 2023-05-05 | 中国信息通信研究院 | Block transmission method, device, equipment and medium in block chain network |
CN116074328B (en) * | 2023-03-01 | 2023-06-27 | 中国信息通信研究院 | Block transmission method, device, equipment and medium in block chain network |
Also Published As
Publication number | Publication date |
---|---|
CN109919771B (en) | 2020-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109919771A (en) | A kind of hierarchical block chain network and method of commerce applied to industry internet | |
Si et al. | IoT information sharing security mechanism based on blockchain technology | |
Liang et al. | A secure fabric blockchain-based data transmission technique for industrial Internet-of-Things | |
Li et al. | RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment | |
Jesus et al. | A survey of how to use blockchain to secure internet of things and the stalker attack | |
Maroufi et al. | On the convergence of blockchain and internet of things (iot) technologies | |
CN109302415B (en) | A kind of authentication method, block chain node and storage medium | |
Chen et al. | A survey on blockchain systems: Attacks, defenses, and privacy preservation | |
CN109462587A (en) | Block chain is layered common recognition method, block chain network system and block chain node | |
CN110032545A (en) | File memory method, system and electronic equipment based on block chain | |
Zhou et al. | DLattice: A permission-less blockchain based on DPoS-BA-DAG consensus for data tokenization | |
CN108681966A (en) | A kind of information monitoring method and device based on block chain | |
Liao et al. | Securing collaborative environment monitoring in smart cities using blockchain enabled software-defined internet of drones | |
Wang et al. | Beh-Raft-Chain: a behavior-based fast blockchain protocol for complex networks | |
CN112214544A (en) | Ubiquitous power Internet of things edge data safe storage method based on permission block chain | |
CN110620820A (en) | Ubiquitous power Internet of things intelligent management system | |
Liu et al. | The service architecture of Internet of things terminal connection based on blockchain technology | |
Lee et al. | Blockchain-based perfect sharing project platform based on the proof of atomicity consensus algorithm | |
Liu et al. | BCmaster: a compatible framework for comprehensively analyzing and monitoring blockchain systems in IoT | |
Alrehaili et al. | A comparative analysis of scalability issues within blockchain-based solutions in the internet of things | |
Rafati Niya et al. | Architectures for Blockchain‐IoT Integration | |
Singh | Blockchain and IOT integrated Smart City Architecture | |
Showkat et al. | Securing the Internet of Things Through Blockchain Approach: Security Architectures, Consensus Algorithms, Enabling Technologies, Open Issues, and Research Directions | |
Dorri et al. | Blockchain for Cyberphysical Systems | |
CN115760514A (en) | Family-based mutual-help system for aged people based on block chain and time bank |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |