CN109919771A - A kind of hierarchical block chain network and method of commerce applied to industry internet - Google Patents

A kind of hierarchical block chain network and method of commerce applied to industry internet Download PDF

Info

Publication number
CN109919771A
CN109919771A CN201910203549.3A CN201910203549A CN109919771A CN 109919771 A CN109919771 A CN 109919771A CN 201910203549 A CN201910203549 A CN 201910203549A CN 109919771 A CN109919771 A CN 109919771A
Authority
CN
China
Prior art keywords
node
block
central node
new block
limited resources
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910203549.3A
Other languages
Chinese (zh)
Other versions
CN109919771B (en
Inventor
徐雪松
陈晓红
陈荣元
杨胜杰
刘人春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910203549.3A priority Critical patent/CN109919771B/en
Publication of CN109919771A publication Critical patent/CN109919771A/en
Application granted granted Critical
Publication of CN109919771B publication Critical patent/CN109919771B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the present application provides a kind of hierarchical block chain network and method of commerce applied to industry internet, hierarchical block chain network includes limited resources layer and extended resources layer, limited resources layer includes multiple limited resources nodes, multiple limited resources node is clustered into multiple clusters, and each cluster includes a central node and multiple controlled nodes for being managed by the central node.The hierarchical block chain network is respectively decided whether to retain the block received by each central node, and the consistency desired result of block is carried out by the control equipment of extended resources layer, so as to improve the problem of the calculated performance deficiency of the limited resources node layer in limited resources layer.

Description

A kind of hierarchical block chain network and method of commerce applied to industry internet
Technical field
This application involves industry internet technical fields, in particular to a kind of layering applied to industry internet Block chain network and method of commerce.
Background technique
Block chain technology can be solved by the verifying and common recognition mechanism of distributed node between decentralization system node The problem of Trust Establishment, realizes decentralization, distributed Trust Establishment mechanism, to complete valence while information transmission The transfer of value.The transaction privacy of block chain, safety, the invariance of data and auditing possibility, integrality, system transparent and appearance Mistake so that block chain is widely used in the multiple fields in addition to encrypting currency, including Identity Management, intelligent transportation, Supply chain management, Internet of Things, industry internet, energy internet etc..
Due to using encryption technology and being stored without intensive data, block chain passing through one have it is anonymous and can The decentralized environment of transaction is believed to change industry internet application field.Specifically, in conjunction with block chain technology, industrial control system can With from lower operation cost, the resource management of dispersion is benefited lower than robustness for threatening and attacking etc..But it is industrial The inherent characteristics such as internet is controlled due to lacking center, the isomerism of equipment and node computing capability are limited, to traditional area Block chain technology and data security protecting propose challenge, such as:
(1) resource-constrained: the resources such as bandwidth, calculating and memory of the equipment in most of industrial systems are limited, it is difficult to full The high performance requirements of sufficient Complex Blocks chain solution.
(2) multilevel center management: current industry internet system relies on the agent communication model of classification, owns in system Equipment all passes through central control systems or Cloud Server at different levels and is identified, verified and connected.With the scale of industry internet system Increasing, the Cloud Server of concentration is difficult to meet the real-time, interactive demand of dispersing apparatus.
(3) data safety: the logarithms such as sensitive data of the key parameter and information system that are related in industrial production environment It is higher according to privacy and demand for safety protection, it needs to ensure data from bottom sensing, protocol communication and information processing whole process Security protection.
Therefore, existing block chain network is also far from meeting the needs of industrial production environment.
Summary of the invention
In view of this, the purpose of the application include provide it is a kind of applied to the hierarchical block chain network of industry internet and friendship Easy method, at least partly to improve the above problem.
In order to achieve the above object, the embodiment of the present application adopts the following technical scheme that
In a first aspect, the embodiment of the present application provides a kind of hierarchical block chain network applied to industry internet, including by It limits resource layer and extended resources layer, the limited resources layer includes multiple limited resources nodes, the multiple limited resources node It is clustered into multiple clusters, each cluster includes central node and multiple controlled nodes for being managed by the central node;In described Heart node is used for:
The transaction request that the controlled node of its control is sent is received, according in the first block chained list of the limited resources layer The authority list prestored judges whether the controlled node has object run permission corresponding with the transaction request, and the transaction is asked It asks including trade transactions and the first transaction hash;If the controlled node has the object run permission, from the block chain The implementation strategy stored in current newest block is obtained in table;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash It is identical, it is determined that the trade transactions of the transaction request instruction are received by the first block chained list, execute the trade transactions And implementing result is saved according to the implementation strategy;
New block is generated according to the implementation strategy and the transaction request, is carried out using new block described in shared secret key pair Sign and be sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer is used for: consistency checking is carried out to the new block, if passing through described one Cause property verifying, then the second block chained list of the extended resources layer is updated, and to the limited resources layer it is each in New block described in heart node broadcasts.
Second aspect, the embodiment of the present application provide a kind of method of commerce applied to industry internet, are applied to demixing zone Block chain network, the hierarchical block chain network include limited resources layer and extended resources layer, and the limited resources layer includes multiple Limited resources node, the multiple limited resources node are clustered into multiple clusters, and each cluster includes central node and by this Multiple controlled nodes of central node control;The described method includes:
The central node receives the transaction request that the controlled node of its control is sent, according to the of the limited resources layer The authority list prestored in one block chained list judges whether the controlled node has object run power corresponding with the transaction request Limit, the transaction request include trade transactions and the first transaction hash;
If the controlled node has the object run permission, current newest block is obtained from the block chained list The implementation strategy of middle storage;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash It is identical, it is determined that the trade transactions of the transaction request instruction are received by the first block chained list, execute the trade transactions And implementing result is saved according to the implementation strategy;
New block is generated according to the implementation strategy and the transaction request, is carried out using new block described in shared secret key pair Sign and be sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer carries out consistency checking to the new block, if being tested by the consistency Card, then be updated the second block chained list of the extended resources layer, and to each central node of the limited resources layer Broadcast the new block.
The embodiment of the present application provides a kind of hierarchical block chain network and method of commerce applied to industry internet, demixing zone Block chain network includes limited resources layer and extended resources layer, and limited resources layer includes multiple limited resources nodes, multiple limited Resource node is clustered into multiple clusters, and each cluster includes a central node and managed by the central node multiple controlled Node.The hierarchical block chain network is respectively decided whether to retain the block received by each central node, and passes through extension money The control equipment of active layer carries out the consistency desired result of block, so as to improve the limited resources node layer in limited resources layer The problem of calculated performance deficiency.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of framework signal of hierarchical block chain network applied to industry internet provided by the embodiments of the present application Figure;
Fig. 2 be a kind of flow diagram of the method for commerce applied to industry internet provided by the embodiments of the present application it One;
Fig. 3 is the two of the flow diagram of method of commerce provided by the embodiments of the present application;
Fig. 4 is the three of the flow diagram of method of commerce provided by the embodiments of the present application;
Fig. 5 is the four of the flow diagram of method of commerce provided by the embodiments of the present application.
Icon: 10- hierarchical block chain network;11- limited resources layer;12- extended resources layer;21,22- cluster.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiments herein provided in the accompanying drawings is not intended to limit below claimed Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common Technical staff's every other embodiment obtained without creative efforts belongs to the model of the application protection It encloses.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
The data driven type network that industry internet is made of the Internet of Things of bottom and the Information Network on upper layer, by general It is connecting, is being provided with comprehensive acquisition capacity to all kinds of production factors data such as equipment, software, personnel and system;Pass through cloud Service, realizes the storage, management and calculating of mass data.According to specific criteria, such as IEC62443, industry can be interconnected Net system is divided into scene equipment level, field control layer and management information level, can have calculating, communication, sensing and driving function Can, and these functions are distributed in Overlay (covering) network.
Wherein, the scene equipment level includes the low-power consumption such as various kinds of sensors, data collector, controller and execution unit Embedded platform.In detail, the equipment in the scene equipment level can be defined as with certain processing capacity and storage energy The node of power can be referred to as class 0 equipment, belong to limited resources layer.
The field control layer may include the equipment such as gateway, central controller, data collector, for collecting from terminal device Sensing data, and the inbound communication and outbound data of processing and terminal device layer.Equipment in the field control layer can To be referred to as 1 class equipment, home extension resource layer.Number in order to meet the real-time requirement of application program, in the scene equipment level According to usually being handled in the field control layer.
The management information level has maximum processing capacity and memory capacity comprising server and back end layers are responsible for letter Breath processing, storage and visualization, homing core resource layer.
When implementing, the extended resources layer and the limited resources layer can be based on the attribute information structures of entity device It builds.
It can be seen that demand of each layer in industry internet to resource is different, needed before disposing block chain wherein The resource capacity of different layers is designed.
Based on this, the embodiment of the present application by limited resources layer and extended resources layer building on overlay network, and thus structure A kind of lightweight, high-throughput hierarchical block chain network (also known as, hierarchical block chain model) is built.
Fig. 1 is please referred to, Fig. 1 is a kind of hierarchical block chain network applied to industry internet provided by the embodiments of the present application 10 configuration diagram.The hierarchical block chain network 10 is constructed based on overlay network, and the overlay network includes a variety of entities The entirety of equipment, one of entity device or multiple entity devices composition is properly termed as a resource node, described a variety of Entity device may include sensing equipment, acquisition equipment, execution unit, central controller, the network equipment and server etc..
When implementing, limited resources layer 11 and extended resources layer can be constructed according to the attribute information of each resource node 12, wherein include multiple limited resources nodes in limited resources layer 11.In order to ensure block chain scalability and reduction network are opened Pin delay can press Clustering to the multiple limited resources node, obtain multiple clusters, such as can be in Fig. 1 and show 21 and 22.Wherein, each cluster is a cluster.For each cluster, cluster head (Cluster- is selected from the cluster Head-CH node centered on) is managed corresponding block chain by the central node.Other nodes in the cluster It can also be managed by the central node, be based on this, other nodes that the present embodiment manages acceptor center node in a cluster are about It is set to controlled node.For example, the central node of cluster 21 is CH1, the central node of cluster 22 is CH2.
Referring to figure 2., Fig. 2 is a kind of process of method of commerce applied to industry internet provided by the embodiments of the present application Schematic diagram, this method can be applied to hierarchical block chain network 10 shown in FIG. 1.Each step of this method is explained below It states.
Step S21, central node receives the transaction request that the controlled node of its control is sent, according to the limited resources layer The first block chained list in the authority list that prestores judge whether the controlled node has target behaviour corresponding with the transaction request Make permission, the transaction request includes trade transactions and the first transaction hash (hash).
Central node described in step S21 can be the central node of any cluster.Each node in cluster can be with All kinds of affairs for protecting this node to generate using Encryption Algorithm such as asymmetric encryption, digital signature and cryptographic Hash functions.Institute Stating the first transaction hash can be obtained from central node handled trade transactions based on above-mentioned Encryption Algorithm.
Wherein, the limited resources layer maintenance has the first block chained list.The limited resources layer is creating the first block chain When the original block of table, the authority list is written in the first block chained list.There is each controlled record in the authority list The operating right of node, such as read operation permission or write operation permission etc..In implementation process, asked for the transaction received It asks, central node can inquire whether the controlled node for sending the transaction request there is the transaction request to indicate from authority list Operating right (that is: the described object run permission).
Step S22 is obtained from the first block chained list and is worked as if the controlled node has the object run permission The implementation strategy stored in preceding newest block.
In the present embodiment, the institute for being stored with each resource node of limited resources layer is encrypted in the first block chained list There is policy definition, the implementation strategy is stored in a manner of chained list.The central node can be based on the first block chained list In the implementation strategy of current newest block storage carry out current operation.The current newest block is to be generated new The previous block of block.
Step S23 generates the second transaction hash based on the transaction request, if the second transaction hash and described first Transaction hash is identical, then executes the trade transactions of the transaction request instruction and save implementing result according to the implementation strategy.
Wherein, when the second transaction hash and the first transaction hash are identical, the trade transactions that the transaction request indicates are indicated Received by the first block chained list.
Step S24 generates new block according to the implementation strategy and the transaction request, using new described in shared secret key pair Block is signed and is sent to the control equipment of the extended resources layer.
Optionally, described the step of generating new block according to the implementation strategy and the transaction request may include following Step:
A random period is waited, then executes the step of new block is generated according to the implementation strategy and the transaction request.
By above-mentioned design, randomness can be introduced between module generator.
The control equipment of step S25, the extended resources layer carry out consistency checking to the new block, if described consistent Property is verified, then is updated to the second block chained list of the extended resources layer, and to each of the limited resources layer Central node broadcasts the new block.
In the present embodiment, each central node Independent Decisiveness is to retain new block or abandon it.This may cause respectively There are the blocks of different editions in a central node.Therefore, it is necessary to carry out consistency checking.But the consistency in the present embodiment is tested Card is not real-time perfoming, but is carried out in certain latent period by the control equipment of extended resources layer 12, reduces and synchronizes out Pin.
In the present embodiment, the method can with the following steps are included:
The first central node that the new block is received in the limited resources layer is used for according to the trust being locally stored Evidence table really weighs the new block.
In the present embodiment, each central node can safeguard a trust evidence table.The credentials of each central node There are the direct trusted node and indirect trusted node of the central node according to record in table, the direct trusted node generates at least One block passes through the verifying of the central node, at least one block that the indirect trusted node generates passes through the central node Any direct trusted node verifying.In other words, for central node A, if during the block that central node B is generated passed through The verifying of heart node A, it may be considered that central node B is the direct trusted node of central node A;If central node C is generated Block passed through the verifying of central node B, it may be considered that central node C is the indirect trusted node of central node A.
Still by taking above-mentioned central node A, B, C as an example, with direct trusted node B generate block in pass through centromere The quantity (being about set to " number of blocks formerly verified " herein) of the block of the verifying of point A changes, really the power stage can be with The trade transactions of different proportion are verified in the block generated to direct trusted node B.Similarly, with indirect trusted node Reach the difference of the ratio (being about set to " reaching mutual trust rate " herein) of mutual trust in the block that C is generated with central node A, Central node A trade transactions of different proportion in the block that the true power stage can generate indirect trusted node C are verified.
In one example, the number of blocks of direct trusted node formerly verified with need it is corresponding between verifying ratio Relationship, and trusted node reaches mutual trust rate and needs the corresponding relationship between verifying ratio can be such as the following table 1 indirectly It is shown.Wherein, the ratio for needing to verify ratio and referring to the trade transactions for needing to verify in new block.
Table 1
Optionally, in the present embodiment, first central node is according to the trust evidence table being locally stored to described new The step of block is really weighed may include sub-step shown in Fig. 3.
Step S31, first central node are the direct of this node generating the second central node of the new block In the case where trusted node, determine in the block of second central node generation through the area of the verifying of first central node The current quantity of block.
Step S32 determines the corresponding pass that the current quantity is hit from the corresponding relationship that the trust evidence list prestores System, determines the first ratio recorded in the corresponding relationship of the hit, and to the transaction of the first ratio described in the new block into Row verifying.
Wherein, the current quantity can serve as the above-mentioned number of blocks formerly verified, and first ratio can fill When the above-mentioned ratio for needing to verify corresponding with number of blocks that is formerly verifying.
Optionally, in the present embodiment, first central node is according to the trust evidence table being locally stored to described new The step of block is really weighed may include sub-step shown in Fig. 4.
Step S41, first central node is in the feelings that second central node is the indirect trusted node of this node Under condition, the mutual trust rate currently reached in the block of the second central node generation with first central node is determined.
Step S42 determines the correspondence that the mutual trust rate is hit from the corresponding relationship that the trust evidence list prestores Relationship determines the second ratio recorded in the corresponding relationship of the hit, and the transaction to the second ratio described in the new block It is verified.
Wherein, the mutual trust rate currently reached can serve as it is above-mentioned reach mutual trust rate, second ratio Example, which can be served as, reaches that mutual trust rate is corresponding to need the ratio verified with described.
Based on description above, since the random period that each central node waits is different, each central node can The new block generated by another central node can be received, may include the part transaction thing in trading pit in the new block Business.Based on this, method of commerce provided in this embodiment can also include step shown in fig. 5.
Step S51, first central node detect the trading pit of this node and described when receiving the new block It whether there is identical trade transactions in new block.
Step S52, and if it exists, then delete the identical trade transactions from the new block, and to other centromeres Point, which is sent, waits synchronization notice.
Wherein, when other described central nodes receive the waiting synchronization notice, it will specified time is waited, to sum It states the first central node and reaches synchronous.Wherein, the upper limit of maximum latency is most big end in the hierarchical block chain network 10 To twice of end delay duration.
Optionally, in the present embodiment, in order to protect entire block chain network from the attack of illegal malicious node, one In a common recognition period, each cluster in hierarchical block chain network 10 can only allow to generate a new block.Wherein, described total The maximum value for knowing the period can be defaulted as 5 minutes (that is: the 1/2 of the bit coin digging mine period).The minimum value in the common recognition period can Twice for thinking the maximum end-to-end delay duration between the node in the hierarchical block chain network, so, it can be ensured that have foot The enough time propagates the new block of other central nodes generation.
In particular, the neighbor node of the central node can be right in order to avoid central node prompts the waiting time insufficient always This node is monitored in the frequency that waiting time generates new block, once the new district number of blocks for monitoring generation is more than threshold value, Then the central node can abandon the new block that the neighbor node generates.
Optionally, in the present embodiment, the case where being excessively delayed may also occur in central node.Based on this, the present embodiment The method of commerce of offer can with the following steps are included:
Delay duration between any two node reaches the case where preset quantity times of preset block chain billing cycle Under, the multiple limited resources node in the limited resources layer re-starts cluster.
Wherein, the preset quantity for example can be 2.After re-starting cluster, each cluster can be chosen again Central node.Under normal circumstances, node centered on the online node of selection long period interior holding.By designing above, by First block chained list of limit resource layer is not influenced by equipment dynamic change.
It is worth noting that in hierarchical block chain network 10 provided in this embodiment, by data flow and business flow separation. Therefore, in network access or monitoring class affairs data are sent by individual data packet after accessed equipment is really weighed Give request equipment.Similarly, data are acquired or stored with class affairs, is created by requestor and directly transmits corresponding data.
In the present embodiment, central node needs to carry out it verifying and is then added to the firstth area for received new block In block chained list.The transaction common recognition verification process for single trade transactions is described below.Wherein, the transaction common recognition is tested Card process includes verifying, the verifying for output and the verifying for requested person for requestor.
Firstly, being directed to the verification process of requestor: judging the hash of the received new block and the block tail of previous block Hash it is whether identical, if it is different, then returning to failure (that is: False);The signature of the new block is verified, if verifying Do not pass through, then returns to False.
Then, for the verification process of output: determining the trade transactions successfully received in the new block by block chained list Quantity (such as being expressed as X.output [0]) and the trade transactions quantity (such as being expressed as X.output [1]) being rejected, really X-1.output (such as is expressed as by trade transactions quantity that block chained list successfully receives in the previous block of the fixed new block And the trade transactions quantity (such as being expressed as X-1.output [1]) that is rejected [0]).Calculate (X.output [0]-X- 1.output [0])+value of (X.output [1]-X-1.output [1]), if obtained value is greater than 1, it is determined that there are duplicate blocks Block is successfully received by block chained list, therefore returns to False.
Finally, being directed to the verification process of requested person: the signature of requested person is verified, if verifying does not pass through, Return to False, the common recognition otherwise, it determines trade transactions are concluded the transaction, it may be assumed that transaction common recognition is verified.
In conclusion the embodiment of the present application provide it is a kind of applied to the hierarchical block chain network of industry internet and counterparty Method, hierarchical block chain network include limited resources layer and extended resources layer, and limited resources layer includes multiple limited resources nodes, should Multiple limited resources nodes are clustered into multiple clusters, and each cluster includes a central node and managed by the central node Multiple controlled nodes.The hierarchical block chain network is respectively decided whether to retain the block received by each central node, and is led to The control equipment of extended resources layer is crossed to carry out the consistency desired result of block, so as to improve the limited resources in limited resources layer The problem of the calculated performance deficiency of node layer.
In addition, the embodiment of the present application reduced by a kind of time consistency algorithm because of network delay caused by blocks operation It is asynchronous, also by it is above-mentioned based on trust evidence table distributed trust really weigh algorithm, improve the flux of block chain, reduce New block needs the number of transaction verified, and ensures that the Session loads of public block chain are balanced.
In embodiment provided herein, it should be understood that disclosed network and method, it can also be by other Mode realize.Embodiments described above is only schematical, for example, the flow chart and block diagram in the drawings show roots According to the network of multiple embodiments of the application, architectural framework in the cards, function and the behaviour of method and computer program product Make.In this regard, each box in flowchart or block diagram can represent a part of a module, section or code, institute The a part for stating module, section or code includes one or more executable instructions for implementing the specified logical function. It should also be noted that function marked in the box can also be to be different from attached drawing in some implementations as replacement The sequence marked occurs.For example, two continuous boxes can actually be basically executed in parallel, they sometimes can also be by Opposite sequence executes, and this depends on the function involved.It is also noted that each box in block diagram and or flow chart, And the combination of the box in block diagram and or flow chart, hardware can be based on the defined function of execution or the dedicated of movement System realize, or can realize using a combination of dedicated hardware and computer instructions.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of hierarchical block chain network applied to industry internet, which is characterized in that including limited resources layer and extension money Active layer, the limited resources layer include multiple limited resources nodes, and the multiple limited resources node is clustered into multiple clusters, Each cluster includes central node and multiple controlled nodes for being managed by the central node;The central node is used for:
The transaction request that the controlled node of its control is sent is received, is prestored according in the first block chained list of the limited resources layer Authority list judge whether the controlled node has object run permission corresponding with the transaction request, the transaction request packet Include trade transactions and the first transaction hash;If the controlled node has the object run permission, from the block chained list Obtain the implementation strategy stored in current newest block;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash phase Together, then the trade transactions are executed and implementing result is saved according to the implementation strategy;And
New block is generated according to the implementation strategy and the transaction request, is signed using new block described in shared secret key pair And it is sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer is used for: consistency checking is carried out to the new block, if passing through the consistency Verifying, then be updated the second block chained list of the extended resources layer, and to each centromere of the limited resources layer Point broadcasts the new block.
2. network according to claim 1, which is characterized in that
The first central node that the new block is received in the limited resources layer is used for according to the trust evidence being locally stored Table really weighs the new block;
Wherein, record has the direct trusted node of the central node and trusts section indirectly in the trust evidence table of each central node Point, at least one block that the direct trusted node generates pass through the verifying of the central node, and the indirect trusted node is raw At the verifying that passes through any direct trusted node of the central node of at least one block.
3. network according to claim 2, which is characterized in that first central node is according to the credentials being locally stored The concrete mode that the new block is really weighed according to table, comprising:
In the case where generating the second central node of the new block is the direct trusted node of this node, determine this in second Pass through the current quantity of the block of the verifying of first central node in the block that heart node generates;
The corresponding relationship that the current quantity is hit is determined from the corresponding relationship that the trust evidence table prestores, and determines the hit The first ratio recorded in corresponding relationship, and the transaction of the first ratio described in the new block is verified.
4. network according to claim 3, which is characterized in that first central node is according to the credentials being locally stored The concrete mode that the new block is really weighed according to table, further includes:
In the case where second central node is the indirect trusted node of this node, determine that second central node generates Block in the mutual trust rate currently reached with first central node;
The corresponding relationship that the mutual trust rate is hit is determined from the corresponding relationship that the trust evidence table prestores, and determines the hit Corresponding relationship in the second ratio for recording, and the transaction of the second ratio described in the new block is verified.
5. network according to claim 2 or 3, which is characterized in that
First central node is also used to when receiving the new block, detect this node trading pit and the new block In whether there is identical trade transactions;If it exists, then delete the identical trade transactions from the new block, and to its His central node, which is sent, waits synchronization notice.
6. network described in any one of -4 according to claim 1, which is characterized in that the central node waits a random week Phase, then execute the step of new block is generated according to the implementation strategy and the transaction request.
7. network described in any one of -4 according to claim 1, which is characterized in that
Delay duration between any two node in the hierarchical block chain network reaches preset block chain billing cycle Preset quantity times in the case where, the multiple limited resources node in the limited resources layer re-starts cluster.
8. a kind of method of commerce applied to industry internet, which is characterized in that be applied to hierarchical block chain network, the layering Block chain network includes limited resources layer and extended resources layer, and the limited resources layer includes multiple limited resources nodes, described Multiple limited resources nodes are clustered into multiple clusters, and each cluster includes central node and managed by the central node multiple Controlled node;The described method includes:
The central node receives the transaction request that the controlled node of its control is sent, according to the firstth area of the limited resources floor The authority list prestored in block chained list judges whether the controlled node has object run permission corresponding with the transaction request, institute Stating transaction request includes trade transactions and the first transaction hash;
If the controlled node has the object run permission, deposited from being obtained in current newest block in the block chained list The implementation strategy of storage;
The second transaction hash is generated based on the transaction request, if the second transaction hash and the first transaction hash phase Together, then the trade transactions are executed and implementing result is saved according to the implementation strategy;
New block is generated according to the implementation strategy and the transaction request, is signed using new block described in shared secret key pair And it is sent to the control equipment of the extended resources layer;
The control equipment of the extended resources layer carries out consistency checking to the new block, if by the consistency checking, Then the second block chained list of the extended resources layer is updated, and is broadcasted to each central node of the limited resources layer The new block.
9. according to the method described in claim 8, it is characterized in that, the method also includes:
The first central node that the new block is received in the limited resources layer is used for according to the trust evidence being locally stored Table really weighs the new block;
Wherein, record has the direct trusted node of the central node and trusts section indirectly in the trust evidence table of each central node Point, at least one block that the direct trusted node generates pass through the verifying of the central node, and the indirect trusted node is raw At the verifying that passes through any direct trusted node of the central node of at least one block.
10. according to the method described in claim 9, it is characterized in that, first central node is according to the trust being locally stored Evidence table really weighs the new block, comprising:
In the case where generating the second central node of the new block is the direct trusted node of this node, determine this in second Pass through the current quantity of the block of the verifying of first central node in the block that heart node generates;From the trust evidence table The corresponding relationship that current quantity hit is determined in the corresponding relationship prestored, determines first recorded in the corresponding relationship of the hit Ratio, and the transaction of the first ratio described in the new block is verified;
In the case where second central node is the indirect trusted node of this node, determine that second central node generates Block in the mutual trust rate currently reached with first central node;From the corresponding pass that the trust evidence list prestores The corresponding relationship that mutual trust rate hit is determined in system, determines the second ratio recorded in the corresponding relationship of the hit, and right The transaction of second ratio described in the new block is verified.
CN201910203549.3A 2019-03-18 2019-03-18 Industrial internet transaction device applying hierarchical block chain technology Active CN109919771B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910203549.3A CN109919771B (en) 2019-03-18 2019-03-18 Industrial internet transaction device applying hierarchical block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910203549.3A CN109919771B (en) 2019-03-18 2019-03-18 Industrial internet transaction device applying hierarchical block chain technology

Publications (2)

Publication Number Publication Date
CN109919771A true CN109919771A (en) 2019-06-21
CN109919771B CN109919771B (en) 2020-04-10

Family

ID=66965327

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910203549.3A Active CN109919771B (en) 2019-03-18 2019-03-18 Industrial internet transaction device applying hierarchical block chain technology

Country Status (1)

Country Link
CN (1) CN109919771B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111031076A (en) * 2020-03-06 2020-04-17 南京畅洋科技有限公司 Internet of things block chain consensus method based on timing mechanism
CN111770017A (en) * 2020-06-22 2020-10-13 国网冀北电力有限公司电力科学研究院 Power distribution Internet of things cluster management system and method based on trusted block chain
CN112419060A (en) * 2020-11-20 2021-02-26 上海树图区块链研究院 Asset hosting system, asset management method, node, and medium
CN112540338A (en) * 2020-10-23 2021-03-23 国网天津市电力公司 Intelligent electric meter verification system based on block chain technology
CN113328935A (en) * 2021-05-20 2021-08-31 福建思特电子有限公司 Distributed safety tracing block chain system based on industrial internet
US11416933B2 (en) 2020-01-07 2022-08-16 Bank Of America Corporation Event management and validation platform using a recursive hierarchic blockchain
WO2023051455A1 (en) * 2021-09-28 2023-04-06 华为技术有限公司 Method and apparatus for training trust model
CN116074328A (en) * 2023-03-01 2023-05-05 中国信息通信研究院 Block transmission method, device, equipment and medium in block chain network

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100229026A1 (en) * 2007-04-25 2010-09-09 Alibaba Group Holding Limited Method and Apparatus for Cluster Data Processing
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN108134706A (en) * 2018-01-02 2018-06-08 中国工商银行股份有限公司 Block chain high-availability system mostly living, computer equipment and method
CN108282539A (en) * 2018-02-06 2018-07-13 北京奇虎科技有限公司 Decentralization storage system based on double-layer network
CN108632386A (en) * 2018-05-15 2018-10-09 众安信息技术服务有限公司 A kind of block chain set of node group building method and device
CN109040014A (en) * 2018-06-13 2018-12-18 湖南搜云网络科技股份有限公司 Block chain processing method and processing device, block chain node and storage medium
CN109040026A (en) * 2018-07-11 2018-12-18 深圳市网心科技有限公司 A kind of authorization method of digital asset, device, equipment and medium
CN109767220A (en) * 2019-01-15 2019-05-17 中国联合网络通信集团有限公司 Method of commerce based on block chain and the transaction system based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100229026A1 (en) * 2007-04-25 2010-09-09 Alibaba Group Holding Limited Method and Apparatus for Cluster Data Processing
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method
CN108134706A (en) * 2018-01-02 2018-06-08 中国工商银行股份有限公司 Block chain high-availability system mostly living, computer equipment and method
CN108282539A (en) * 2018-02-06 2018-07-13 北京奇虎科技有限公司 Decentralization storage system based on double-layer network
CN108632386A (en) * 2018-05-15 2018-10-09 众安信息技术服务有限公司 A kind of block chain set of node group building method and device
CN109040014A (en) * 2018-06-13 2018-12-18 湖南搜云网络科技股份有限公司 Block chain processing method and processing device, block chain node and storage medium
CN109040026A (en) * 2018-07-11 2018-12-18 深圳市网心科技有限公司 A kind of authorization method of digital asset, device, equipment and medium
CN109767220A (en) * 2019-01-15 2019-05-17 中国联合网络通信集团有限公司 Method of commerce based on block chain and the transaction system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
甘玉宁: "基于信任度和风险评估的分布式认证模型", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11416933B2 (en) 2020-01-07 2022-08-16 Bank Of America Corporation Event management and validation platform using a recursive hierarchic blockchain
CN111031076A (en) * 2020-03-06 2020-04-17 南京畅洋科技有限公司 Internet of things block chain consensus method based on timing mechanism
CN111770017A (en) * 2020-06-22 2020-10-13 国网冀北电力有限公司电力科学研究院 Power distribution Internet of things cluster management system and method based on trusted block chain
CN112540338A (en) * 2020-10-23 2021-03-23 国网天津市电力公司 Intelligent electric meter verification system based on block chain technology
CN112419060A (en) * 2020-11-20 2021-02-26 上海树图区块链研究院 Asset hosting system, asset management method, node, and medium
CN112419060B (en) * 2020-11-20 2024-03-22 上海树图区块链研究院 Asset hosting system, asset management method, node and medium
CN113328935A (en) * 2021-05-20 2021-08-31 福建思特电子有限公司 Distributed safety tracing block chain system based on industrial internet
CN113328935B (en) * 2021-05-20 2022-11-11 福建思特电子有限公司 Distributed safety tracing block chain system based on industrial internet
WO2023051455A1 (en) * 2021-09-28 2023-04-06 华为技术有限公司 Method and apparatus for training trust model
CN116074328A (en) * 2023-03-01 2023-05-05 中国信息通信研究院 Block transmission method, device, equipment and medium in block chain network
CN116074328B (en) * 2023-03-01 2023-06-27 中国信息通信研究院 Block transmission method, device, equipment and medium in block chain network

Also Published As

Publication number Publication date
CN109919771B (en) 2020-04-10

Similar Documents

Publication Publication Date Title
CN109919771A (en) A kind of hierarchical block chain network and method of commerce applied to industry internet
Si et al. IoT information sharing security mechanism based on blockchain technology
Liang et al. A secure fabric blockchain-based data transmission technique for industrial Internet-of-Things
Li et al. RETRACTED ARTICLE: Information security model of block chain based on intrusion sensing in the IoT environment
Jesus et al. A survey of how to use blockchain to secure internet of things and the stalker attack
Maroufi et al. On the convergence of blockchain and internet of things (iot) technologies
CN109302415B (en) A kind of authentication method, block chain node and storage medium
Chen et al. A survey on blockchain systems: Attacks, defenses, and privacy preservation
CN109462587A (en) Block chain is layered common recognition method, block chain network system and block chain node
CN110032545A (en) File memory method, system and electronic equipment based on block chain
Zhou et al. DLattice: A permission-less blockchain based on DPoS-BA-DAG consensus for data tokenization
CN108681966A (en) A kind of information monitoring method and device based on block chain
Liao et al. Securing collaborative environment monitoring in smart cities using blockchain enabled software-defined internet of drones
Wang et al. Beh-Raft-Chain: a behavior-based fast blockchain protocol for complex networks
CN112214544A (en) Ubiquitous power Internet of things edge data safe storage method based on permission block chain
CN110620820A (en) Ubiquitous power Internet of things intelligent management system
Liu et al. The service architecture of Internet of things terminal connection based on blockchain technology
Lee et al. Blockchain-based perfect sharing project platform based on the proof of atomicity consensus algorithm
Liu et al. BCmaster: a compatible framework for comprehensively analyzing and monitoring blockchain systems in IoT
Alrehaili et al. A comparative analysis of scalability issues within blockchain-based solutions in the internet of things
Rafati Niya et al. Architectures for Blockchain‐IoT Integration
Singh Blockchain and IOT integrated Smart City Architecture
Showkat et al. Securing the Internet of Things Through Blockchain Approach: Security Architectures, Consensus Algorithms, Enabling Technologies, Open Issues, and Research Directions
Dorri et al. Blockchain for Cyberphysical Systems
CN115760514A (en) Family-based mutual-help system for aged people based on block chain and time bank

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant