CN110298657A - A kind of block chain common recognition method, relevant apparatus and system - Google Patents
A kind of block chain common recognition method, relevant apparatus and system Download PDFInfo
- Publication number
- CN110298657A CN110298657A CN201810233990.1A CN201810233990A CN110298657A CN 110298657 A CN110298657 A CN 110298657A CN 201810233990 A CN201810233990 A CN 201810233990A CN 110298657 A CN110298657 A CN 110298657A
- Authority
- CN
- China
- Prior art keywords
- block
- node
- target
- information
- target block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012795 verification Methods 0.000 claims abstract description 42
- 230000005540 biological transmission Effects 0.000 claims description 7
- 235000013399 edible fruits Nutrition 0.000 claims description 3
- 230000009467 reduction Effects 0.000 abstract description 5
- 238000004422 calculation algorithm Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 239000002699 waste material Substances 0.000 description 2
- 241000205585 Aquilegia canadensis Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000000547 structure data Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9024—Graphs; Linked lists
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of block chain common recognition method, relevant apparatus and systems, the vote information that first node passes through the target block of generation creation, then the target block and preposition block cryptographic Hash are sent to second node simultaneously, second node verifies the target information.Due to using target block and the cryptographic Hash of preposition block as two parts, so that in target block and do not include prefix area block cryptographic Hash, but the cryptographic Hash of preposition block is stored jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash, target block can be made to can be used during multiple authentication, the efficiency that block builds block parallel is improved, and then improves block chain effectiveness of performance;And when being verified to target block, the corresponding vote information individually stored and preposition block cryptographic Hash need to only be verified without access target block, the wasting of resources and the lower problem of efficiency in block chain common recognition are avoided due to the reduction of verification information.
Description
Technical field
The present invention relates to block chain technical fields, more particularly to a kind of block chain common recognition method, relevant apparatus and system.
Background technique
Recent years, block chain technology using more and more extensive.For narrow sense, block chain be it is a kind of sequentially in time
A kind of linked data structure that data block is combined into such a way that sequence is connected, and what is guaranteed in a manner of cryptography can not usurp
The distributed account book that can not be forged changed.Broadly, block chain technology is verified and is stored using block linked data structure
Data know together algorithm using distributed node to generate and more new data, guarantee in the way of cryptography data transmission and visit
The safety asked is programmed and distributed base that one kind of operation data is completely new using the intelligent contract of automatized script code composition
Plinth framework and calculation paradigm.
Algorithm of knowing together is the expert, scholar and technical staff in the field always in exploratory development.Public affairs common at present
Department algorithm have: proof of work (POW), equity prove (POS), act on behalf of equity prove (DPOS) and use Byzantium (PBFT)
Deng.Wherein, POW proof of work calculates the random number for meeting rule, that is, obtains by enumerating the cryptographic Hash operation of formula
It obtains this book keeping operation originally, issues the data that epicycle needs to record, stored together after other node verifications of 50% or more the whole network, it is scarce
Point is to need to compete the power of packing, and vast resources is caused to waste, and the acknowledging time of block is difficult to shorten, and efficiency is difficult to adapt to commercialization
Using needing to wait multiple confirmations and forever without lastness;POS equity proves, is a kind of upgrading common recognition mechanism of POW, i.e.,
According to the ratio of token shared by each node and time, mine disaster degree is dug in the reduction of equal proportion, so that the speed of random number is looked in quickening,
The disadvantage is that may not wish to participate in book keeping operation without participant that is specialized, possessing equity, it is easy to produce bifurcated, needs to wait multiple
Confirmation, forever without lastness, needs checkpointing mechanism to make up lastness, low efficiency;DPOS share authorisation verification mechanism, class
It is similar to board of directors's ballot, money-holder launches a certain number of nodes, acts on behalf of them and verify and keep accounts., base of the DPOS in POS
It is on plinth, the role for the people that keeps accounts is specialized, equity is first passed through to select book keeping operation people, is kept accounts in turn again between the people that then keeps accounts,
Disadvantage is: the wish of actively voting of token holder it is not strong or ballot centralization, cause a degree of centralization to cause
The wasting of resources;Equally, PBFT there is also serious forgiveness it is low, flexibility is poor, low efficiency the disadvantages of.As it can be seen that existing block chain is total
The problems such as knowledge mechanism in resource in the prevalence of waste, low efficiency is be easy to cause.
Summary of the invention
It is directed to the above problem, the present invention provides a kind of block chain common recognition method, relevant apparatus and system, solves existing
The problem of wasting of resources and low efficiency of block chain common recognition algorithm.
To achieve the goals above, the embodiment of the invention provides following technical solutions:
A kind of block chain common recognition method, is applied to first node, comprising:
Target block is generated according to information to be received;
The corresponding target information of the target block is sent to second node, wherein the target information includes described
Target block and the corresponding preposition block cryptographic Hash of the target block, the second node be cluster in addition to first node
Remaining node;
Receive the vote information of second node feedback, the vote information includes the target information and to the mesh
Mark the ballot of block;
The vote information is verified, result is verified;
Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded
On the block chain of the first node.
Preferably, further includes:
Obtain the cryptographic Hash summary info of the target block;
The cryptographic Hash summary info of the target block is characterized as the target block.
Preferably, further includes:
The verification result of the target block is sent to the second node, realizes the second node to the target
The verifying again of block.
A kind of block chain common recognition method, is applied to second node, comprising:
Receive the corresponding target information of target block that first node is sent, wherein the target information includes the mesh
Mark block and the corresponding preposition block cryptographic Hash of the target block;The first node is certain in addition to second node in cluster
One node;
The target block is effectively verified according to the target information, obtains the ballot letter of the target block
Breath, and the vote information is sent to the first node and the remaining second node in addition to the second node, it waits
The residue second node feeds back the vote information, wherein the vote information includes the target information and to the mesh
Mark the ballot of block;
After receiving the vote information of the remaining second node feedback, the vote information is verified,
It is verified result;
Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded
On the block chain of the second node.
Preferably, described that the target block is effectively verified according to the target information, obtain the target area
The vote information of block, and the vote information is sent to the first node and the residue second in addition to the second node
Node waits the remaining second node to feed back the vote information, comprising:
The target information is verified, result is verified;
Judge whether the verification result is correct, if it is, throwing the corresponding target block of the target information correct
Ticket;
The vote information of the target block is generated according to the voting results of the target block;
The vote information is sent to the first node and the remaining second node in addition to the second node, etc.
The vote information is fed back to the remaining second node.
Preferably, further includes:
Classify to the target block, the corresponding vote information of the target block of same classification is counted, is obtained
To ballot statistical result;
Judge whether the quantity of the correct ticket in the ballot statistical result is greater than the first preset threshold, if it is, sentencing
Whether the identical data of cryptographic Hash for the preposition block that the disconnected target block for throwing correct ticket is transmitted are greater than the second preset threshold;
If it is, the target block is verified as effective block, conversely, being then verified as the target block in vain
Block.
Preferably, when receiving the verification result for the target block that the first node is sent, further includes:
Ballot poll in the verification result is counted;
If the statistical magnitude of the ballot poll is greater than default statistical threshold, the corresponding target block of voting is
Effective block, conversely, the corresponding target block of the ballot is invalid block.
A kind of first node, comprising:
Generation module, for generating target block according to information to be received;
Sending module, for the corresponding target information of the target block to be sent to second node, wherein the target
Information includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the second node is to remove in cluster
Remaining node outside first node;
Receiving module, for receiving the vote information of the second node feedback, wherein the vote information includes described
Target information and ballot to the target block;
Authentication module verifies the vote information, is verified result;
Logging modle, for judging whether the verification result is effective, if it is, by the vote information and described testing
Card result is recorded on the block chain of the first node.
A kind of second node, comprising:
Module is monitored, for receiving the corresponding target information of target block of first node transmission, wherein the target letter
Breath includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the first node is in cluster except the
A certain node outside two nodes;
Vote module obtains the target for effectively being verified according to the target information to the target block
The vote information of block, and by the vote information be sent to the first node and in addition to the second node remaining the
Two nodes wait the remaining second node to feed back the vote information, wherein the vote information includes the target information
With the ballot to the target block;
Authentication module, for after receiving the vote information of the remaining second node feedback, to the ballot
Information is verified, and result is verified;
Logging modle judges whether the verification result is effective, if it is, the vote information and the verifying are tied
Fruit is recorded on the block chain of the second node.
A kind of block chain common recognition system, comprising:
First node as described above and second node described above.
Compared to the prior art, then first node of the present invention will by the vote information of the target block of generation creation
The target block and preposition block cryptographic Hash are sent to second node simultaneously, and second node verifies the target information.By
In using target block and the cryptographic Hash of preposition block as two parts, so that in target block and not including the Hash of prefix area block
Value, but the cryptographic Hash of preposition block is stored jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash,
Target block can be made to can be used during multiple authentication, improve the efficiency that block builds block parallel, and then improve
Block chain effectiveness of performance;It, only need to be to corresponding list without access target block and when being verified to target block
The vote information and preposition block cryptographic Hash solely stored is verified, since the reduction of verification information is avoided in block chain
The lower problem of the wasting of resources and efficiency in common recognition.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow diagram of block chain common recognition method provided in an embodiment of the present invention;
Fig. 2 is a kind of block chain data structure schematic diagram provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another block chain common recognition method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of first node provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of second node provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Term " first " and " second " in description and claims of this specification and above-mentioned attached drawing etc. are for area
Not different objects, rather than for describing specific sequence.Furthermore term " includes " and " having " and their any deformations,
It is intended to cover and non-exclusive includes.Such as it contains the process, method of a series of steps or units, system, product or sets
It is standby not to be set in listed step or unit, but may include the step of not listing or unit.
A kind of block chain common recognition method is provided in an embodiment of the present invention, and referring to Fig. 1, this method may include following
Step:
S11, target block is generated according to information to be received;
It include multiple nodes in a communication cluster, one block chain of corresponding record on each node, which is
Verified using block linked data structure with storing data, and generate and update using the common recognition method of distributed node
Data.
It include multiple nodes in communication cluster in embodiments of the present invention, when a certain node is there are when block to be verified,
This kind of node is corresponded into first node.The target block is used to characterize block to be verified, has recorded in target block waiting
Receive the relevant information of the block.
S12, the corresponding target information of the target block is sent to second node, wherein the target information includes
The target block and the corresponding preposition block cryptographic Hash of the target block;The second node is that first node is removed in cluster
Outer remaining node;
S13, the vote information for receiving second node feedback, wherein the vote information include the target block,
The corresponding preposition block cryptographic Hash of the target block and the ballot to the target block.
In another embodiment of the invention, further includes:
Obtain the cryptographic Hash summary info of the target block;
The cryptographic Hash summary info of the target block is characterized as the target block.
It is consumed to save network transmission bandwidth, raising network transmission efficiency, in the vote information, the target block
The summary infos such as the cryptographic Hash of the target block can be used to be replaced, to achieve the purpose that compress information.
S14, the vote information is verified, is verified result;
S15, judge whether the verification result is effective, if it is, executing S16;
S16, the vote information and the verification result are recorded on the block chain of the first node.
Optionally, further includes:
The verification result of the target block is sent to the second node, realizes the second node to the target
The verifying again of block.
Referring to fig. 2, the block chain structure is by three for the block chain data structure that some node is recorded in the embodiment of the present invention
Part forms: block, ballot structure and preceding piece of cryptographic Hash, wherein Block indicates current block and traditional block chain structure
Different is in block in the present invention and not include the cryptographic Hash of preceding block block;PreHash is indicated to previous block in Fig. 2
Cryptographic Hash record, Vote indicates to the voting records of current block.
After generating the vote information of the target block, corresponding target information can be sent to the second section by first node
Remaining node in point i.e. cluster, the target information include target block, the target block represent block information or
It represents and is currently verified the cryptographic Hash of block (target block) and the cryptographic Hash of currently stored preposition block.
Then second node votes to the target block to according to the target information, referring to Fig. 3 in the present invention
Another block chain common recognition method is additionally provided in embodiment, is applied to second node, comprising:
S21, the corresponding target information of target block that first node is sent is received, wherein the target information includes institute
State target block and the corresponding preposition block cryptographic Hash of the target block;The first node be cluster in addition to second node
A certain node;
S22, the target block is effectively verified according to the target information, obtains the ballot of the target block
Information, and the vote information is sent to the first node and the remaining second node in addition to this node, described in waiting
Remaining second node feeds back the vote information, wherein the vote information includes the target information and to the target area
The ballot of block;
S23, after receiving the vote information of the remaining second node feedback, the vote information is tested
Card, is verified result;
S24, judge whether the verification result is effective, if it is, executing S25;
S25, the vote information and the verification result are recorded on the block chain of the second node.
Therefore, the method that a kind of pair of target block is voted is additionally provided in embodiments of the present invention, may include:
Receive the target block that creation is completed;
Transaction Information in the target block is verified, if verification result is correct, the target block is thrown
Correct ticket;
The vote information of the target block is generated according to the voting results of the target block.
Since target block only has recorded corresponding transaction data, when first node receives target block created
When, since the target block is block to be verified, so second node can verify it, which may include:
It examines the signing messages of the target block, verify the signing messages traded in the target block, transaction with the presence or absence of honeysuckle etc., be somebody's turn to do
Verification process is the voting process to the target block, that is, is verified and throws correct ticket.
A kind of verification method is further comprised in another embodiment of the invention, comprising:
Classify to the target block, the corresponding vote information of the target block of same classification is counted, is obtained
To ballot statistical result;
Judge whether the quantity of the correct ticket in the ballot statistical result is greater than the first preset threshold, if it is, sentencing
Whether the identical data of cryptographic Hash for the preposition block that the disconnected target block for throwing correct ticket is transmitted are greater than the second preset threshold;
If it is, the target block is verified as effective block, conversely, being then verified as the target block in vain
Block.
Second node first classifies the target information that the first node received is sent according to target block, classifies
Whether it is mutually all standard that standard is with target block information, which can be the cryptographic Hash of the target block.If
Identical is one kind.Why carrying out classification is because multiple nodes may be respectively to different target blocks in voting process
It votes, at this point, receiving a large amount of vote information, it is that it is corresponding to need to compare vote information for which target block, and will
Ballot for the same target block is divided into one kind.So carrying out classification can be improved verification efficiency.
Statistics and more corresponding preposition block cryptographic Hash are carried out to the voting results of sorted same class block.Such as
The poll that the structure of the verifying of fruit target block throws correct ticket is greater than preset first threshold value or its ratio is greater than preset ratio value
Assuming that 50%, and the identical data of preposition block cryptographic Hash that the node for throwing correct ticket is transmitted are also greater than default second threshold
Value, first threshold and second threshold can be set to it is identical, can also the requirement according to business to safety and performance adjust
It is whole.If above-mentioned two aspect is all satisfied, the target block is considered as effective block, is otherwise considered as invalid block.
If the verification result of the target block is effective block, first node the target information is recorded described
On the block chain of first node.
First node of the present invention is by generating the vote information of the target block of creation, then by the target block and preposition
Block cryptographic Hash is sent to second node simultaneously, and second node verifies the target information.Due to by target block and before
The cryptographic Hash of block is set as two parts, so that in target block and do not include the cryptographic Hash of prefix area block, but by prefix area
The cryptographic Hash of block stores jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash, can make target area
Block can be used during multiple authentication, improve the efficiency that block builds block parallel, and then improve block chain effectiveness of performance;
It, only need to be to the corresponding vote information individually stored without access target block and when being verified to target block
It is verified with preposition block cryptographic Hash, since the reduction of verification information avoids the wasting of resources in block chain common recognition
The lower problem with efficiency.
It is corresponding, in another embodiment provided by the invention further include:
Ballot poll in the verification result is counted;
If the statistical magnitude of the ballot poll is greater than default statistical threshold, the corresponding target block of voting is
Effective block, conversely, the corresponding target block of the ballot is invalid block.
Namely obtained after result after obtaining second node and being verified target block whether be active block structure
Afterwards, which can be delivered to second node namely remaining all node by corresponding first node again.
Why select to deliver again is because the above process completes the one step completed throwing carried out to target block
Ticket.For example, 50% or more node throws correct ticket, then being considered as the target block is active block, is otherwise considered as invalid block, still
The reason of generating invalid block may be 50% or more node ballot mistake;Block itself is effective, but 50% or more node because
The reasons such as communication time-out, node failure, malicious action do not launch correct ticket.In practical applications, in order to avoid these reasons,
It needs the target block for not reaching 50% to last round of ballot to vote again, is rejected phenomenon to avoid effective block
It generates.
If verified again, counted according to the poll of the first round, is considered as ballot greater than 50% effectively, ballot
Corresponding block is then considered as effective block, and it is invalid to be otherwise considered as.The voting results are also recorded in corresponding block chain.Nothing
Effect block node, which can be broken up, sends back to block chain entrance.
Therefore, no matter voting the result shows that whether block effective, node can record block cochain.Due to block
Voting results and preposition Hash are all recorded in chain together, so can distinguish effective, invalid block and transaction in inquiry.
To include preposition piece of cryptographic Hash when block is packaged in traditional block chain common recognition algorithm, it may be assumed that on chain the last one
The cryptographic Hash of block.Block is connected in turn by the cryptographic Hash of block, forms the structure of a chain type.There are multiple sections
When putting while building block, these blocks all encapsulate same preposition piece of cryptographic Hash, and in common recognition, one and only one area
Block can finally enter chain, remaining block will be considered as invalid block in epicycle common recognition.Transaction in invalid block " will be beaten
Dissipate ", and it will be packaged into again new block in next round, to strive for entering chain in next round common recognition.
In the present invention, preposition piece of cryptographic Hash is not comprised in block, and is stored in each node.Do not having
, it is specified that the preposition cryptographic Hash that node is stored be specific format (such as sky or be particular value) when creating generation block.
In embodiments of the present invention, although the block that the namely verifying of every wheel common recognition is stored, but due to
It does not include the cryptographic Hash of preposition block in block, so the block that multiple nodes are built up can also be in the common recognition of next round
It uses, the transaction in these blocks does not need to break up builds block again again, builds the concurrent efficiency of block to greatly improve, increases
The performance of block catenary system.
The common recognition method that the embodiment of the present invention is proposed is without breaing up no adopted block, it is possible to take strategy
The repeat number traded in block is reduced, block concurrency is built with maximized raising.Such as it can be using the form of transaction grouping
Different groups of transaction is sent to the strategy that different nodes are packaged to distribute transaction etc..
A kind of first node 10 is additionally provided in embodiments of the present invention, referring to fig. 4, comprising:
Generation module 101, for generating target block according to information to be received;
Sending module 102, for the corresponding target information of the target block to be sent to second node, wherein described
Target information includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the second node is cluster
In remaining node in addition to first node;
Receiving module 103, for receiving the vote information of second node feedback, wherein the vote information includes
The target information and ballot to the target block;
Authentication module 104 verifies the vote information, is verified result.
Logging modle 105, for judging whether the verification result is effective, if it is, by the vote information and institute
Verification result is stated to be recorded on the block chain of the first node.
It is corresponding, a kind of second node 20 is additionally provided in embodiments of the present invention, referring to Fig. 5, comprising:
Module 201 is monitored, for receiving the corresponding target information of target block of first node transmission, wherein the mesh
Mark information includes the target block and the corresponding preposition block cryptographic Hash of the target block, and the first node is in cluster
A certain node in addition to second node;
Vote module 202 obtains the mesh for effectively being verified according to the target information to the target block
The vote information of block is marked, and the vote information is sent to the first node and the residue in addition to the second node
Second node waits the remaining second node to feed back the vote information, wherein the vote information includes the target letter
Breath and the ballot to the target block;
Authentication module 203, for after receiving the vote information of the remaining second node feedback, to the throwing
Ticket information is verified, and result is verified;
Logging modle 204 judges whether the verification result is effective, if it is, by the vote information and described testing
Card result is recorded on the block chain of the second node.
It in another embodiment of the invention further include a kind of block chain common recognition system, including above-mentioned first node and the
Two nodes, wherein the first node is the node for receiving target block to be verified, and second node is in the cluster except the
Remaining node outside one node.
First node of the present invention is by generating the vote information of the target block of creation, then by the target block and preposition
Block cryptographic Hash is sent to second node simultaneously, and second node verifies the target information.Due to by target block and before
The cryptographic Hash of block is set as two parts, so that in target block and do not include the cryptographic Hash of prefix area block, but by prefix area
The cryptographic Hash of block stores jointly with vote information, therefore due to not influenced by preposition block cryptographic Hash, can make target area
Block can be used during multiple authentication, improve the efficiency that block builds block parallel, and then improve block chain effectiveness of performance;
It, only need to be to the corresponding vote information individually stored without access target block and when being verified to target block
It is verified with preposition block cryptographic Hash, since the reduction of verification information avoids the wasting of resources in block chain common recognition
The lower problem with efficiency.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment
For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part
It is bright.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (10)
- A kind of method 1. block chain is known together, which is characterized in that be applied to first node, comprising:Target block is generated according to information to be received;The corresponding target information of the target block is sent to second node, wherein the target information includes the target Block and the corresponding preposition block cryptographic Hash of the target block, the second node are the residue in cluster in addition to first node Node;Receive the vote information of second node feedback, the vote information includes the target information and to the target area The ballot of block;The vote information is verified, result is verified;Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded described On the block chain of first node.
- 2. the method according to claim 1, wherein further include:Obtain the cryptographic Hash summary info of the target block;The cryptographic Hash summary info of the target block is characterized as the target block.
- 3. the method according to claim 1, wherein further include:The verification result of the target block is sent to the second node, realizes the second node to the target block Verifying again.
- A kind of method 4. block chain is known together, which is characterized in that be applied to second node, comprising:Receive the corresponding target information of target block that first node is sent, wherein the target information includes the target area Block and the corresponding preposition block cryptographic Hash of the target block;The first node is a certain section in cluster in addition to second node Point;The target block is effectively verified according to the target information, obtains the vote information of the target block, and The vote information is sent to the first node and the remaining second node in addition to the second node, is waited described surplus Remaining second node feeds back the vote information, wherein the vote information includes the target information and to the target block Ballot;After receiving the vote information of the remaining second node feedback, the vote information is verified, is obtained Verification result;Judge whether the verification result is effective, if it is, the vote information and the verification result are recorded described On the block chain of second node.
- 5. according to the method described in claim 4, it is characterized in that, it is described according to the target information to the target block into Row effectively verifying, obtains the vote information of the target block, and the vote information is sent to the first node and is removed Remaining second node other than the second node waits the remaining second node to feed back the vote information, comprising:The target information is verified, result is verified;Judge whether the verification result is correct, if it is, throwing correct ticket to the corresponding target block of the target information;The vote information of the target block is generated according to the voting results of the target block;The vote information is sent to the first node and the remaining second node in addition to the second node, waits institute It states remaining second node and feeds back the vote information.
- 6. according to the method described in claim 5, it is characterized by further comprising:Classify to the target block, the corresponding vote information of the target block of same classification is counted, is thrown Ticket statistical result;Judge whether the quantity of the correct ticket in the ballot statistical result is greater than the first preset threshold, if it is, judgement is thrown Whether the identical data of cryptographic Hash for the preposition block that the target block of correct ticket is transmitted are greater than the second preset threshold;If it is, the target block is verified as effective block, conversely, the target block is then verified as dead space Block.
- 7. according to the method described in claim 4, it is characterized in that, when the target area for receiving the first node transmission When the verification result of block, further includes:Ballot poll in the verification result is counted;If the statistical magnitude of the ballot poll is greater than default statistical threshold, the corresponding target block of voting is effective Block, conversely, the corresponding target block of the ballot is invalid block.
- 8. a kind of first node characterized by comprisingGeneration module, for generating target block according to information to be received;Sending module, for the corresponding target information of the target block to be sent to second node, wherein the target information Including the corresponding preposition block cryptographic Hash of the target block and the target block, the second node is that first is removed in cluster Remaining node outside node;Receiving module, for receiving the vote information of the second node feedback, wherein the vote information includes the target Information and ballot to the target block;Authentication module verifies the vote information, is verified result;Logging modle, for judging whether the verification result is effective, if it is, the vote information and the verifying are tied Fruit is recorded on the block chain of the first node.
- 9. a kind of second node characterized by comprisingModule is monitored, for receiving the corresponding target information of target block of first node transmission, wherein the target information packet The target block and the corresponding preposition block cryptographic Hash of the target block are included, the first node is that the second section is removed in cluster A certain node outside point;Vote module obtains the target block for effectively being verified according to the target information to the target block Vote information, and the vote information is sent to the first node and the second section of residue in addition to the second node Point waits the remaining second node to feed back the vote information, wherein the vote information includes the target information and right The ballot of the target block;Authentication module, for after receiving the vote information of the remaining second node feedback, to the vote information It is verified, is verified result;Logging modle judges whether the verification result is effective, if it is, the vote information and the verification result are remembered It records on the block chain of the second node.
- The system 10. a kind of block chain is known together characterized by comprisingFirst node as claimed in claim 8 and second node as claimed in claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810233990.1A CN110298657A (en) | 2018-03-21 | 2018-03-21 | A kind of block chain common recognition method, relevant apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810233990.1A CN110298657A (en) | 2018-03-21 | 2018-03-21 | A kind of block chain common recognition method, relevant apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110298657A true CN110298657A (en) | 2019-10-01 |
Family
ID=68025333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810233990.1A Pending CN110298657A (en) | 2018-03-21 | 2018-03-21 | A kind of block chain common recognition method, relevant apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110298657A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110796547A (en) * | 2019-10-30 | 2020-02-14 | 桂林电子科技大学 | Improved practical Byzantine fault-tolerant system based on alliance block chain |
CN110995701A (en) * | 2019-12-02 | 2020-04-10 | 远光软件股份有限公司 | Block chain consensus method, system, electronic equipment and storage medium |
CN111177262A (en) * | 2019-12-27 | 2020-05-19 | 中思博安科技(北京)有限公司 | Block chain consensus method, related device and system |
CN111211904A (en) * | 2019-12-13 | 2020-05-29 | 杭州复杂美科技有限公司 | Consensus method, device and storage medium |
CN111931220A (en) * | 2020-09-24 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Consensus processing method, device, medium and electronic equipment for block chain network |
CN113472825A (en) * | 2020-03-30 | 2021-10-01 | 中国移动通信集团设计院有限公司 | NB-IoT (NB-IoT) terminal transaction processing method and device based on block chain |
WO2023279970A1 (en) * | 2021-07-07 | 2023-01-12 | 支付宝(杭州)信息技术有限公司 | Blockchain-based data synchronization method and apparatus |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106548349A (en) * | 2016-11-02 | 2017-03-29 | 江苏通付盾科技有限公司 | Transaction Information verification method and system |
CN106650495A (en) * | 2016-12-16 | 2017-05-10 | 杭州嘉楠耘智信息科技有限公司 | File verification method and device |
CN106682907A (en) * | 2016-12-10 | 2017-05-17 | 江苏恒为信息科技有限公司 | Comparison and consensus method for block chain data |
CN106789908A (en) * | 2016-11-23 | 2017-05-31 | 江苏通付盾科技有限公司 | Block common recognition method for building up and system in block chain |
WO2017109140A1 (en) * | 2015-12-22 | 2017-06-29 | Bigchaindb Gmbh | Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction |
CN107171810A (en) * | 2017-06-27 | 2017-09-15 | 中国联合网络通信集团有限公司 | The verification method and device of block chain |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
GB201800761D0 (en) * | 2018-01-17 | 2018-02-28 | Setl Development Ltd | Interaction between blockchains |
WO2018041066A1 (en) * | 2016-08-29 | 2018-03-08 | 北京瑞卓喜投科技发展有限公司 | Data processing method, apparatus and system based on block chain technology |
-
2018
- 2018-03-21 CN CN201810233990.1A patent/CN110298657A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017109140A1 (en) * | 2015-12-22 | 2017-06-29 | Bigchaindb Gmbh | Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction |
WO2018041066A1 (en) * | 2016-08-29 | 2018-03-08 | 北京瑞卓喜投科技发展有限公司 | Data processing method, apparatus and system based on block chain technology |
CN106548349A (en) * | 2016-11-02 | 2017-03-29 | 江苏通付盾科技有限公司 | Transaction Information verification method and system |
CN106789908A (en) * | 2016-11-23 | 2017-05-31 | 江苏通付盾科技有限公司 | Block common recognition method for building up and system in block chain |
CN106682907A (en) * | 2016-12-10 | 2017-05-17 | 江苏恒为信息科技有限公司 | Comparison and consensus method for block chain data |
CN106650495A (en) * | 2016-12-16 | 2017-05-10 | 杭州嘉楠耘智信息科技有限公司 | File verification method and device |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN107171810A (en) * | 2017-06-27 | 2017-09-15 | 中国联合网络通信集团有限公司 | The verification method and device of block chain |
GB201800761D0 (en) * | 2018-01-17 | 2018-02-28 | Setl Development Ltd | Interaction between blockchains |
Non-Patent Citations (2)
Title |
---|
FRANCISCO PRIETO-CASTRILLO ET AL,: "Distributed Sequential Consensus in Networks: Analysis of Partially Connected Blockchains with Uncertainty", COMPLEXITY, pages 1 - 11 * |
闵新平等: "许可链多中心动态共识机制", 计算机学报, vol. 41, pages 1 - 16 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110796547A (en) * | 2019-10-30 | 2020-02-14 | 桂林电子科技大学 | Improved practical Byzantine fault-tolerant system based on alliance block chain |
CN110995701A (en) * | 2019-12-02 | 2020-04-10 | 远光软件股份有限公司 | Block chain consensus method, system, electronic equipment and storage medium |
CN110995701B (en) * | 2019-12-02 | 2022-11-29 | 远光软件股份有限公司 | Block chain consensus method, system, electronic equipment and storage medium |
CN111211904A (en) * | 2019-12-13 | 2020-05-29 | 杭州复杂美科技有限公司 | Consensus method, device and storage medium |
CN111177262A (en) * | 2019-12-27 | 2020-05-19 | 中思博安科技(北京)有限公司 | Block chain consensus method, related device and system |
CN113472825A (en) * | 2020-03-30 | 2021-10-01 | 中国移动通信集团设计院有限公司 | NB-IoT (NB-IoT) terminal transaction processing method and device based on block chain |
CN113472825B (en) * | 2020-03-30 | 2023-01-13 | 中国移动通信集团设计院有限公司 | NB-IoT terminal transaction processing method and device based on block chain |
CN111931220A (en) * | 2020-09-24 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Consensus processing method, device, medium and electronic equipment for block chain network |
WO2023279970A1 (en) * | 2021-07-07 | 2023-01-12 | 支付宝(杭州)信息技术有限公司 | Blockchain-based data synchronization method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110298657A (en) | A kind of block chain common recognition method, relevant apparatus and system | |
CN110784346B (en) | Reputation value-based PBFT consensus system and method | |
CN109447795B (en) | Byzantine consensus method supporting rapid achievement of final confirmation | |
CN109146484A (en) | Common recognition verification method, digging mine machine and block catenary system based on block chain | |
CN107480990A (en) | Block chain bookkeeping methods and device | |
CN113347164B (en) | Block chain-based distributed consensus system, method, device and storage medium | |
CN109242299A (en) | Distribution digs mine method, digs mine machine and block catenary system | |
CN109819022A (en) | A kind of block chain common recognition method based on credit appraisal | |
CN108717630A (en) | One kind going out block method and its realizes system | |
CN109286685A (en) | The system architecture of the more subchains of main chain adduction row of subchain can be expanded | |
CN110796547A (en) | Improved practical Byzantine fault-tolerant system based on alliance block chain | |
CN109118214A (en) | The method and apparatus for running intelligent contract | |
CN108122165A (en) | A kind of block chain common recognition method and system | |
CN108880863A (en) | A kind of smart grid equipment safety diagnostic service system based on block chain technology | |
CN107612973A (en) | Block chain structure, generation method and transaction verification method for intelligent sliding moved end | |
CN106899698A (en) | A kind of across chain mutual operation method between block chain | |
CN109255713A (en) | In a kind of block chain network in certain time period book keeping operation power acquisition methods | |
CN109087111A (en) | Common recognition verification method, digging mine machine and block catenary system based on block chain | |
CN112163856A (en) | Consensus method and system for block chain and Internet of things fusion scene | |
US20220067063A1 (en) | Apparatus and method for adaptively managing sharded blockchain network based on deep q network | |
Sun et al. | RTChain: A reputation system with transaction and consensus incentives for e-commerce blockchain | |
CN115499129A (en) | Multimode trust cross-chain consensus method, system, medium, equipment and terminal | |
CN109087105A (en) | For digging the Hash Search method of mine, digging mine machine and block catenary system | |
CN111130790A (en) | Block co-recognition method based on block chain node network | |
CN109166040A (en) | Transaction auditing method, device, equipment and storage medium based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20240906 |