CN110365695A - The block chain data interactive method and device of changeable common recognition algorithm - Google Patents
The block chain data interactive method and device of changeable common recognition algorithm Download PDFInfo
- Publication number
- CN110365695A CN110365695A CN201910669873.4A CN201910669873A CN110365695A CN 110365695 A CN110365695 A CN 110365695A CN 201910669873 A CN201910669873 A CN 201910669873A CN 110365695 A CN110365695 A CN 110365695A
- Authority
- CN
- China
- Prior art keywords
- common recognition
- data interaction
- block chain
- data
- recognition algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides the block chain data interactive method and device of a kind of changeable common recognition algorithm, different common recognition algorithms is accessed for different business scenarios, realize pluggable access, promote block catenary system common recognition efficiency, shorten the data interaction response time, the big data business for handling logic complexity for block chain provides strong support in function and performance, and convenience is provided in functional development, improves efficiency of research and development.This method solves common recognition algorithm and couples with block catenary system verifying node height, the mentality of designing for proposing pluggable common recognition algorithm, realizes system common recognition and intelligent contract decoupling, common recognition algorithm High Availabitity, expansibility, the monitoring O&M for node of knowing together are also more convenient, controllable.Solve the problems, such as that original PBFT algorithm communication cost is excessively high under privately owned chain environment, after using RAFT algorithm instead, communicates the reduction of complexity simultaneously.The average response time of block chain can be effectively reduced, reduce the CPU of server and the utilization rate of memory, save the expense of resource.
Description
Technical field
The present invention relates to data interaction technology fields, more particularly to a kind of block chain number of changeable common recognition algorithm
According to exchange method and device.
Background technique
Block chain technology as an innovative technology framework being born with bit coin, its essence be it is open and clear, can not
It distorts, retrospective distributed account book technology.In block chain technology, common recognition mechanism is a component part of wherein core, area
Block chain common recognition mechanism describes in distributed system between multiple nodes, reaches an agreement the process of result to some state each other,
Its target is the consistent block chain view of method and apparatus preservation for making all honest nodes be used to access container, however at present
The single common recognition algorithm that the block chain product of industry only supports depth embedded, as Hyperledger Fabric only supports PBFT
The single common recognition algorithm of POW is only supported in algorithm, ether mill, it is difficult to is applicable in changeable business scenario, be become restriction technical application
With the bottleneck of promoting service.
Summary of the invention
To solve the above-mentioned problems at least one, the application one aspect embodiment provide a kind of changeable common recognition algorithm
Block chain data interactive method, comprising:
According to the data interaction request being verified, one is selected in pre-stored multiple common recognition algorithms according to preset rules
A common recognition algorithm;
According to selected common recognition algorithm, the data interaction is requested to execute together with other nodes in same block chain
Common recognition operation re-executes common recognition operation if not reaching common understanding, until reach common understanding, output common recognition result;
According to the common recognition result and data interaction request, data interaction operation is executed.
In certain embodiments, the basis is verified data interaction request, according to preset rules pre-stored
A common recognition algorithm is selected in multiple common recognition algorithms, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, according to
Preset corresponding relationship selectes a common recognition algorithm, and the corresponding relationship is the application number, block chain scene type and works as
The mapping relations of preceding security of network environment rank and the type of the common recognition algorithm.
In certain embodiments, the basis is verified data interaction request, according to preset rules pre-stored
A common recognition algorithm is selected in multiple common recognition algorithms, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, generate
General safety rank;
According to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm, a common recognition is selected to calculate
Method.
In certain embodiments, the data traffic generated to data interaction is monitored, if current data flow is more than to set
When determining threshold value, the processing or stopping of delayed data interaction handle the data interaction.
In certain embodiments, further includes:
Each node in block chain is encrypted by the cryptographic protocol of two-way authentication.
In certain embodiments, further includes:
The identity for identifying the initiation user of data interaction request, verifies whether the initiation user is to have infused in block chain
The user of volume;
If being verified, request whether interactive data are that initiation user is allowed to interact in identification data interaction request
Data then allow data interaction if interactive data are allowed to.
In certain embodiments, further includes:
It checks that the access authority of user is initiated in data interaction request, passes through if checking, execute and receive the data interaction
Request.
The application other side embodiment provides a kind of block chain data interaction device of changeable common recognition algorithm, packet
It includes:
Common recognition routing module, is requested according to the data interaction being verified, multiple total what is be pre-stored according to preset rules
Know and selectes a common recognition algorithm in algorithm;
Algorithm of knowing together realizes module, according to selected common recognition algorithm, to institute together with other nodes in same block chain
It states data interaction request and executes common recognition operation, if not reaching common understanding, re-execute common recognition operation, until reaching common understanding, output is altogether
Know result;
Intelligent contract processing module executes data interaction operation according to the common recognition result and data interaction request.
In certain embodiments, it is described common recognition routing module according to data interaction request in application number, block chain scene
Type and current network environment safety select a common recognition algorithm according to preset corresponding relationship, and the corresponding relationship is
The mapping of the type of the application number, block chain scene type and current network environment security level and the common recognition algorithm
Relationship.
In certain embodiments, the common recognition routing module, comprising:
General safety rank generation unit, according to data interaction request in application number, block chain scene type and work as
Preceding security of network environment generates general safety rank;
Common recognition algorithms selection unit, according to the corresponding pass of the general safety rank and general safety rank and common recognition algorithm
System selects a common recognition algorithm.
In certain embodiments, further includes:
Current limited Control reinforces module, and the data traffic generated to data interaction is monitored, if current data flow is more than
When given threshold, the processing or stopping of delayed data interaction handle the data interaction.
In certain embodiments, further includes:
Data safety reinforces module, is encrypted by the cryptographic protocol of two-way authentication to each node in block chain.
In certain embodiments, further includes:
Module is reinforced in authentication, and the identity of the initiation user of identification data interaction request, verifying the initiation user is
No is the registered user in block chain;
Data identification module requests whether interactive data are the initiations in identification data interaction request if being verified
User is allowed to interactive data, if interactive data are allowed to, then allows data interaction.
In certain embodiments, further includes:
Access control reinforces module, checks that the access authority of user is initiated in data interaction request, passes through if checking, execute
Receive the data interaction request.
The another aspect embodiment of the application provides a kind of computer equipment, including memory, processor and is stored in storage
On device and the computer program that can run on a processor, the processor realize the step of the above method when executing described program
Suddenly.
A kind of another computer readable storage medium of aspect embodiment of the application, is stored thereon with computer program, the meter
The step of above method is realized when calculation machine program is executed by processor.
The invention has the following beneficial effects:
The present invention provides the block chain data interactive methods and device of a kind of changeable common recognition algorithm, for different industry
Business scene accesses different common recognition algorithms, realizes pluggable access, promotes block catenary system common recognition efficiency, shortens data interaction and ring
Between seasonable, the big data business for handling logic complexity for block chain provides strong support in function and performance, in functional development
Upper offer convenience improves efficiency of research and development.This method solves common recognition algorithm and couples with block catenary system verifying node height, and proposition can insert
The mentality of designing for pulling out common recognition algorithm realizes system common recognition and the decoupling of intelligent contract, common recognition algorithm High Availabitity, expansibility, altogether
The monitoring O&M for knowing node is also more convenient, controllable.Solves original PBFT algorithm communication cost mistake under privately owned chain environment simultaneously
High problem, after using RAFT algorithm instead, due to communicating the reduction of complexity.Can be effectively reduced block chain average response time,
The CPU of server and the utilization rate of memory are reduced, the expense of resource is saved.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 shows the block chain network framework realized in the embodiment of the present application.
Fig. 2 shows the process signals of the block chain data interactive method of changeable common recognition algorithm a kind of in the embodiment of the present application
Figure.
Fig. 3 shows one of the structural schematic diagram that node 2 is verified in the embodiment of the present application.
Fig. 4 shows the second structural representation that node 2 is verified in the embodiment of the present application.
Fig. 5 shows the structural schematic diagram that algorithm of knowing together in the embodiment of the present application realizes module 22.
Fig. 6 shows the structural schematic diagram of security hardening module 2345 in the embodiment of the present application.
Fig. 7 shows the specific steps that block chain network framework executes in the embodiment of the present application.
Fig. 8 shows the structural schematic diagram for being adapted to carry out the electronic equipment of the embodiment of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Block chain technology as an innovative technology framework being born with bit coin, its essence be it is open and clear, can not
It distorts, retrospective distributed account book technology.In block chain technology, common recognition mechanism is a component part of wherein core, area
Block chain common recognition mechanism describes in distributed system between multiple nodes, reaches an agreement the process of result to some state each other,
Its target is the consistent block chain view of method and apparatus preservation for making all honest nodes be used to access container, however at present
The single common recognition algorithm that the block chain product of industry only supports depth embedded, as Hyperledger Fabric only supports PBFT
The single common recognition algorithm of POW is only supported in algorithm, ether mill, it is difficult to is applicable in changeable business scenario, be become restriction technical application
With the bottleneck of promoting service.
This application provides a kind of block chain method and devices of pluggable common recognition algorithm, devise block chain bottom account book
The common store framework of common recognition algorithm plug type, including common recognition routing module and common recognition algorithm realize that module, algorithm of knowing together are real
The realization of existing module, security hardening module.Different common recognition algorithms is accessed for different business scenarios using the application, is realized
Pluggable access promotes block catenary system common recognition efficiency, shortens the data interaction response time, complicated for block chain processing logic
Big data business provides strong support in function and performance, and convenience is provided in functional development, improves efficiency of research and development.
Fig. 1 shows the block chain network framework realized in the embodiment of the present application, specifically includes: application layer services device 1,
Authenticate node 4, verifying node 2 and non-authentication node 3.
Wherein, application layer services device 1 is verified one or several in node 2 and non-authentication node 3 with block chain and is connect
And carry out two-way data transmission.It homogeneously connects and carries out between block chain verifying node 2 and each node of non-authentication node 3
Two-way data transmission.Block chain certification node 4 and each verifying node 2 and non-authentication node 3 keep connecting and carrying out double
To data transmission.
Application layer services device 1 can be the server cluster an of server or multiple servers composition, be mainly responsible for place
Manage the service logic other than block chain.In general, block chain verifying node 2 and non-authentication node 3 can provide service to application layer and connect
Mouthful.Application layer constructs request message according to specific service logic, sends to block chain and takes provided by request call block chain
Business interface continues to execute subsequent service logic after waiting block catenary system to execute data interaction and returned data interaction results.
Block chain verifying node 2 can be the server cluster an of server or multiple servers composition.Verify node 2
Request is sent to certification node 4 starting and block chain network Shi Zehui being added, obtains the certificate of registration that certification node 4 is signed and issued.
In order to guarantee anonymity and the safety of data interaction, verifying node 2 will use certification node 4 when sending data interaction request
The data interaction certificate that batch is signed and issued signs to data interaction, and close using the symmetric cryptography generated by Diffie-Hellman
Key encrypts data interaction data.In general, there are several to verify node 2 in a block chain network, each verifying
Node 2 is all responsible for receiving the data interaction request that application layer services device 1 sends (or block chain non-authentication node 3 forwards),
After data interaction request is signed and is encrypted, other verifying nodes of broadcast into block chain network.Other verifying sections
After point receives the data interaction, sign test can be carried out to data interaction.According to different scenes, verifying node can use different
Common recognition algorithm knows together to data interaction, and the data interaction reached common understanding can be performed, and data interaction request then can be slow
It deposits certain amount or is packaged write-in block after a period of time, carry out persistent storage.The structure chart of block chain verifying node 2
See Fig. 2.
Block chain non-authentication node 3 can be the server cluster an of server or multiple servers composition.Non-authentication
Node 3 is starting and block chain network Shi Zehui is added to the certification transmission request of node 4, obtains the registration that certification node 4 is signed and issued
Certificate.In order to guarantee anonymity and the safety of data interaction, non-authentication node 3 will use when sending data interaction request to be recognized
The data interaction certificate that card 4 batch of node is signed and issued signs to data interaction, and uses pair generated by Diffie-Hellman
Encryption key is claimed to encrypt data interaction data.Block chain non-authentication node 3 can receive transmitted by application layer services device 1
Data interaction request, and data interaction is packaged, using private key corresponding to data interaction certificate to data interaction number
The data interaction certificate is enclosed according to signing, and the data interaction by signature, symmetric key is reused and the data is handed over
It is mutually encrypted, the data interaction by encryption is finally transmitted to block chain verifying node 2.Block chain non-authentication node 3
Body is simultaneously not involved in common recognition, will not execute data interaction or save block data.The structure chart of block chain non-authentication node 3 is shown in figure
2。
Block chain certification node 4 can be a server or the more servers mutually backed up.Block chain authenticates node 4
Predominantly block chain verifying node 2 and block chain non-authentication node 3 provide authentication and grant a certificate service.
The block chain data interactive method for the changeable common recognition algorithm that verifying node executes is illustrated below, as shown in Fig. 2, packet
It includes:
S1: requesting according to the data interaction being verified, and selects in pre-stored multiple common recognition algorithms according to preset rules
A fixed common recognition algorithm;
S2: according to selected common recognition algorithm, the data interaction is requested together with other nodes in same block chain
Common recognition operation is executed, if not reaching common understanding, re-executes common recognition operation, until reach common understanding, output common recognition result;
S3: according to the common recognition result and data interaction request, data interaction operation is executed.
Specifically, in some embodiments, in step sl, according to data interaction request in application number, block chain scene
Type and current network environment safety select a common recognition algorithm according to preset corresponding relationship, and the corresponding relationship is
The mapping of the type of the application number, block chain scene type and current network environment security level and the common recognition algorithm
Relationship.
In other specific embodiments, step S1 is specifically included:
S11: according to data interaction request in application number, block chain scene type and current network environment safety,
Generate general safety rank;
S12: according to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm, a common recognition is selected
Algorithm.
The function and applicable scene of the different and different common recognition algorithm of its process for realizing of different common recognition algorithms
Also different, such as PBFT Byzantium algorithm has the function of Byzantine failure tolerance, can support under 3f+1 node environment f
Node failure or when doing evil, for example part of nodes is not responding to, sends error message, sends different decisions, difference to different nodes
Error node is joined together in the case of doing evil, which still can guarantee normally provide service with clustered node without quilt
Malicious node influences.But in terms of communication cost, the communication complexity of Byzantine failure tolerance algorithm is O (n2), wherein n is in network
Node number requires reaching of knowing together every time to carry out n squares node communication, thus can also spend biggish communication at
This.And the communication complexity of RAFT consistency algorithm is O (n), but be only capable of handle node failures but and can not handle node doing evil
The case where, consistency algorithm RAFT improves the efficiency of common recognition, but relax requirement to system activity therefore network compared with
For safe and reliable environment, using the available higher execution efficiency of the algorithm, and PBFT can handle Byzantium's problem, but
It is to communicate complexity as O (n2), it can handle the more insecure environment of network, it is therefore, safer for section network environment
And stabilization, similar raft algorithm should be used to obtain more preferable effectiveness of performance, and for the scene that safety is difficult to ensure, should switch makes
Guarantee the safety of system with PBFT algorithm.
Further, in some embodiments, verifying node 2 also executes:
S4: each node in block chain is encrypted by the cryptographic protocol of two-way authentication.
In a particular embodiment, between application node and block chain node, node/non-authentication node and authentication are verified
Between central node, verifying node between each other with non-authentication node it is mutual be transmitted through the cryptographic protocols such as two-way authentication
Encryption, prevents information leakage and information in transmission process from distorting.
In addition, in some embodiments, verifying node 2 also executes:
S5: the data traffic generated to data interaction is monitored, if current data flow is more than given threshold, delay
The processing of data interaction stops handling the data interaction.
In the embodiment, flow restriction initiates flow attacking mainly for prevention application end, in certain specific embodiments, leads to
Flow control and the three-level current limiting mechanism of differentiation are crossed to solve.
Differentiation flow control controlled by high sequence in low according to the user class of data interaction, priority limit
The low user of rank processed.
Three-level current limiting mechanism be then by 1) cache request data, such as the data 2 frequently inquired) reduce user gradation,
Delayed data interaction response, priority processing high ranked user data interaction 3) measures such as data interaction flow are limited to take precautions against.
Further, in some embodiments, verifying node 2 also executes:
S6: the identity of the initiation user of identification data interaction request verifies whether the initiation user is in block chain
Registered user;
S7: if being verified, request whether interactive data are that initiation user is allowed in identification data interaction request
Interactive data then allow data interaction if interactive data are allowed to.
In the embodiment, the identity for the access device for initiating data interaction request is identified, it is ensured that access side is true
It is believable, it is ensured that all operations are all that block Lian Zhong legal entity initiates, as table 1 shows the proof list of access device.
The proof list of 1 access device of table
Further, in other embodiments, verifying node 2 also executes:
S8: checking that the access authority of user is initiated in data interaction request, pass through if checking, executes the reception data and hands over
Mutually request.
In the embodiment, before data interaction request enters block chain common recognition, the reading and writing to accessing user is needed to weigh
Limit is controlled, and the legitimacy of authentication data interaction data and prevents the unauthorized operation to business datum.The equipment message of access
Data need to check the legitimacy of device id, filter invalid equipment data, and table 2 shows specifically arranging for scope check
Apply table.
2 scope check measure table of table
It is appreciated that it is specific in block chain to execute data interaction operation according to the common recognition result and data interaction request
To execute intelligent contract and returning to intelligent contract implementing result, i.e., data interaction is executed simultaneously according to the agreement recorded on intelligent contract
The result of returned data interaction.
Fig. 3 shows the specific modular structure schematic diagram of verifying node 2, and verifying node 2 is the area of changeable common recognition algorithm
Block chain data interaction device, specifically includes: common recognition routing module 21 is requested according to the data interaction being verified, according to pre-
If rule selectes a common recognition algorithm in pre-stored multiple common recognition algorithms;Algorithm of knowing together realizes module 22, according to selected
Common recognition algorithm requests the data interaction together with other nodes in same block chain to execute common recognition operation, if not reaching
Common recognition re-executes common recognition operation, until reach common understanding, output common recognition result;Intelligent contract processing module 23, according to described total
Know result and data interaction request, executes data interaction operation.
Bridge is applied and switched to common recognition routing module 21 by mainly realizing a variety of common recognition algorithms, establishes different application scenarios
With the mapping relations of common recognition algorithm.Such as application number: id is applied, block chain scene type: privately owned chain/alliance's chain, network environment:
Interior barrier/the area DMZ, algorithm of knowing together: PBFT/RAFT/RBFT/PAXOS/ALGORNAD etc. };The suitable common recognition algorithm logarithm of selection
It knows together according to interaction in the whole network node.
Algorithm of knowing together realizes that module 22 mainly according to specific algorithm flow, realizes block chain common recognition process, process of knowing together
Main includes the message sink of common recognition, and the execution known together between node, in addition the commit or rollback of result of knowing together also are wrapped
Include security hardening when common recognition algorithm changeover.
Intelligent contract processing module 23 is mainly responsible for verifying common recognition and executes as a result, executing intelligent contract with intelligent contract is returned
As a result.It is worth noting that verifying common recognition result includes the common recognition result verification to different common recognition algorithms, if the verification passes,
Then enter the execution stage of intelligent contract, if verifying does not pass through, returns to specific common recognition error information.
In a particular embodiment, as shown in figure 4, verifying node 2 further includes that communication module 25 is mainly responsible for and other nodes
Interaction sends and receives various types of message, including data interaction request, common recognition message, data interaction result etc..
In embodiment not shown in the figure, it can also include that encrypting module belongs to technical support module, be mainly responsible for number
According to interactive encryption, decryption, signature and sign test, the application and management of all kinds of certificates and key calculate the functions such as cryptographic Hash.
Continuing with as shown in connection with fig. 4, verifying node 2 further includes memory module 24, and memory module 24, which is mainly responsible for, to be verified
The data persistence of block and data intercorrelation that node generates is stored into database.
In embodiment not shown in the figure, node 2 is verified further include: configuration management module and common recognition access access mould
Block.
Configuration management module is mainly used for setting common recognition routing module and some key parameters of algorithm realization module of knowing together.
Such as the node total number of network, the request timed out time, nodes heart beat time-out time etc., it is worth noting that, it can be set by parameter
Set the common recognition algorithm that block chain network initially uses.There are three types of optional configurations, is respectively as follows: SOLO (under single cpu mode), practical
Byzantine failure tolerance PBFT algorithm and RAFT algorithm.
Common recognition access AM access module belongs to technical support module, is mainly responsible for the input for receiving application end, is a variety of differences
Common recognition algorithm unified cut-in method is provided, including calculating cryptographic Hash to the encryption of data interaction, decryption, signature and sign test
Etc. functions.
Based on identical inventive concept, in some embodiments, during the common recognition routing module is requested according to data interaction
Application number, block chain scene type and current network environment safety are calculated according to the selected common recognition of preset corresponding relationship
Method, the corresponding relationship be the application number, block chain scene type and current network environment security level with it is described total
Know the mapping relations of the type of algorithm.
Based on identical inventive concept, in some embodiments, the common recognition routing module, comprising: general safety rank is raw
At unit, according to data interaction request in application number, block chain scene type and current network environment safety, generate whole
Body security level;Common recognition algorithms selection unit, according to pair of the general safety rank and general safety rank and common recognition algorithm
It should be related to, select a common recognition algorithm.
As shown in figure 5, in a particular embodiment, common recognition algorithm realizes that module 22 specifically includes common recognition message reception module
2341, execution module 2342 of knowing together, commit module 2343 of knowing together, rollback module 2344 of knowing together.
Wherein common recognition message reception module 2341 is triggered when algorithm of knowing together receives message request, is mainly responsible for monitoring and is connect
Receive the message of common recognition algorithm interior joint intercommunication.Once receiving the communication information of other nodes initiation, common recognition is entered
Execution module 2342 carries out common recognition processing.
Execution module 2342 of knowing together is responsible for specific implementation common recognition algorithm, including the communications protocol executed between node, communication streams
Journey, and processing when receiving communication message, its process for realizing of different common recognition algorithms is different and different to be total to
Function and the applicable scene for knowing algorithm are also different, such as PBFT Byzantium algorithm has the function of Byzantine failure tolerance, can be with
When supporting f node failure under 3f+1 node environment or doing evil, for example part of nodes is not responding to, sends error message, to not
It joins together in the case of doing evil with the different decisions of node transmission, different error nodes, which still can guarantee collect
Group node normally provides service without being influenced by malicious node.But in terms of communication cost, the communication of Byzantine failure tolerance algorithm is multiple
Miscellaneous degree is O (n2), wherein n is nodes number, i.e., the node for requiring to carry out n squares time of reaching known together every time leads to
News, therefore can also spend biggish communication cost.And the communication complexity of RAFT consistency algorithm is O (n), but be only capable of handling
Node failure can not but handle the case where node is done evil, and consistency algorithm RAFT improves the efficiency of common recognition, but relax pair
The requirement of system activity is therefore in the safer reliable environment of network, using the available higher execution efficiency of the algorithm,
And PBFT can handle Byzantium's problem, but communicating complexity is O (n2), it can handle the more insecure environment of network,
Therefore, safer for section network environment and stable, common recognition execution module should use similar raft algorithm to obtain more preferable performance
Efficiency, and for the scene that safety is difficult to ensure, execution module of knowing together should switch the peace for guaranteeing system using PBFT algorithm
Entirely.
The common recognition triggering when common recognition is reached of commit module 2343 is mainly responsible for common recognition and reaches rear each verifying node submission
Common recognition is as a result, carry out the operation of persistence processing to common recognition result.
The triggering when common recognition is not reached of common recognition rollback module 2344 is mainly responsible for the common recognition knot of each verifying node
Fruit rollback, without persistence processing.
In order to improve the safety of data interaction, verifying node 2 further includes security hardening module 2345, specifically, such as Fig. 6
Shown, security hardening module 2345 may include at least one of following module:
Module 2346 is reinforced in authentication, specifically includes authentication reinforcement elements, the hair of identification data interaction request
The identity of user is played, verifies whether the initiation user is the registered user in block chain;And data identification unit, if testing
Card passes through, and requests whether interactive data are that initiation user is allowed to interactive data in identification data interaction request, if
Interactive data are allowed to, then allow data interaction.
Access control reinforces module 2347, checks that the access authority of user is initiated in data interaction request, passes through if checking,
It executes and receives the data interaction request.
Current limited Control reinforces module 2348, and the data traffic generated to data interaction is monitored, if current data flow
When more than given threshold, the processing or stopping of delayed data interaction handle the data interaction.
Data safety reinforces module 2349, is added by the cryptographic protocol of two-way authentication to each node in block chain
It is close.
Specifically, wherein authentication reinforce module 2346, to initiate data interaction request access device identity into
Row identifies, it is ensured that access side is genuine and believable, it is ensured that all operations are all that block Lian Zhong legal entity initiates, as shown in table 1.
Access control is reinforced module 2347 and is responsible for before data interaction requests to enter block chain common recognition, it is necessary to dock
The reading and writing permission of access customer is controlled, and the legitimacy of authentication data interaction data and prevents the unauthorized operation to business datum.
The equipment message data of access need to check the legitimacy of device id, filter invalid equipment data, as shown in table 2.
Current limited Control reinforces module 2348 and is mainly responsible for prevention application end initiation flow attacking, passes through the flow control of differentiation
It makes with three-level current limiting mechanism and solves.Differentiation flow control is carried out according to the user class of data interaction by high sequence in low
It is controlled, it is preferential to limit the low user of rank.Three-level current limiting mechanism is inquired by 1) cache request data, such as frequently
Data 2) reduce user gradation, delayed data interaction response, priority processing high ranked user data interaction 3) limitation data hand over
The measures such as mutual flow are taken precautions against.
Data safety, which is reinforced module 2349 and is mainly responsible for, to be ensured between application node and block chain node, verifying node/non-
Verify between node and authentication central node, verifying node between each other with non-authentication node is mutual is transmitted through
The encryption of the cryptographic protocols such as two-way authentication, prevents information leakage and information in transmission process from distorting.
Illustrate the specific steps that above-mentioned block chain network framework executes below.As shown in fig. 7, steps are as follows:
Step S101: verifying node 2, non-authentication node 3, certification node 4 are respectively on configuration management module, setting common recognition road
Some key parameters that module 22 is realized by module 21 and common recognition algorithm, such as the node total number of network, request timed out time, node
Heartbeat timeout time etc. is to be calculated with Byzantine failure tolerance PBFT by the common recognition algorithm that parameter setting block chain network initially uses
Method.
Step S102: application layer services device 1 sends data interaction request to non-authentication node 3.
Step S103: the communication module 25 of block chain non-authentication node 3 receives the request, checks the legitimacy of data interaction
And it is assembled into data interaction.
Step S104: the encrypting module of block chain non-authentication node 3 will use private key corresponding to data interaction certificate,
It signs to data interaction, and forwards data interaction request to verifying node 2 all in verifying node cluster.
Step S105: the communication module 25 that block chain verifies node 2 receives the request, calls current limliting to reinforce module 2348 and examines
Current data interaction flow is looked into, if current data interaction flow is more than the threshold value of some setting, delayed data interaction is rung
It should or refuse to handle the data interaction, otherwise continue to handle in next step.
Step S106: block chain verifying node 2 calls authentication to reinforce module 2346 and checks current data interaction hair
The identity information of side is played, if access device does not include that block chain is recognized in the registration of block catenary system or data interaction content
Card node 4 is issued to the legal TLS certificate of equipment, then refuses to handle the data interaction, otherwise then continues in next step
Reason.
Step S107: block chain verifying node 2 calls access control to reinforce module 2347 and checks current data interaction hair
The access authority of side is played, if data interaction initiates user not to operating rights such as read/write/deployment of the intelligence contract,
Refusal handles the data interaction, otherwise then continues to handle in next step.
Step S108: block chain verify node 2 call common recognition routing module 21, according to data interaction request in application
Id, block chain scene type are privately owned chain or alliance's chain, and the network environment where node deployment is interior barrier or the area DMZ, are selected
Common recognition algorithm such as PBFT/RAFT/RBFT/PAXOS/ALGORNAD etc., select suitable common recognition algorithm to data interaction complete
Net node is known together.It is worth noting that application layer services device is initiated every data and is handed over the variation of service application scene
The common recognition algorithm mutually used can not be identical, such as the first stroke data interaction is the scene in privately owned chain, can select raft etc.
The lower consistency algorithm of safety, behind with federation node addition, second data interaction can select PBFT etc. suitable
The higher common recognition algorithm of safety for alliance's chain.
Step S109: block chain verifies node 2 and calls common recognition access AM access module, starts the access and execution of common recognition algorithm
Common recognition algorithm is monitored according to different common recognition algorithms and received to preceding preparation wherein common recognition message reception module 2341 can be called
The message of interior joint intercommunication.
Step S110: block chain verifies node 2 and common recognition execution module 2342 is called to execute common recognition algorithm, including verifying node
Between the communications protocol that executes, communication flow, and processing when receiving communication message, different common recognition algorithms its realize
Process is different.
Step S111: after having executed common recognition algorithm, all verifying nodes verified in node cluster should reach an agreement knot
Fruit executes common recognition commit module 2343 if all nodes are reached common understanding, and each verifying node submits common recognition as a result, right
Result of knowing together carries out the operation of persistence processing;If all nodes are not reached common understanding, common recognition rollback module is executed
2344, the common recognition result rollback to each verifying node, without persistence processing.
Step S112: block chain verifies node 2 and total intelligent contract processing module 23 is called to verify common recognition as a result, if verifying
Pass through, then execute intelligent contract, if verifying does not pass through, returns to specific common recognition error information.
Step S113: block chain verifying node 2 calls memory module 24 that data interaction information and intelligent contract are executed knot
Block is written in fruit, and the relevant data persistence that data exchange process is generated is stored into database.
It is appreciated that the present invention provides the block chain data interactive methods and device of changeable common recognition algorithm.The device
It is had the following effects that with method and advantage:
1, different common recognition algorithms is accessed for different business scenarios using the patented technology, realizes pluggable access,
Block catenary system common recognition efficiency is promoted, shortens the data interaction response time, the big data business of logic complexity is handled for block chain
It is provided strong support in function and performance, convenience is provided in functional development, improve efficiency of research and development.
2, it solves common recognition algorithm to couple with block catenary system verifying node height, proposes that the design of pluggable common recognition algorithm is thought
Road, the system that realizes is known together and intelligent contract decouples, the monitoring O&M of common recognition algorithm High Availabitity, expansibility, common recognition node
It is more convenient, controllable.
3, solve the problems, such as that original PBFT algorithm communication cost is excessively high under privately owned chain environment, after using RAFT algorithm instead, due to
Communicate the reduction of complexity.The utilization of the average response time of block chain, the CPU and memory that reduce server can be effectively reduced
Rate saves the expense of resource.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is set
It is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant,
Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
In any equipment combination.
Computer equipment specifically includes memory, processor and storage on a memory simultaneously in a typical example
The computer program that can be run on a processor is realized when the processor executes described program and is held as described above by client
Capable method, alternatively, the processor realizes the method executed as described above by server when executing described program.
Below with reference to Fig. 8, it illustrates the structural representations for the computer equipment 600 for being suitable for being used to realize the embodiment of the present application
Figure.
As shown in figure 8, computer equipment 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in
Program in memory (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603
And execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various program sum numbers
According to.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to
Bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;
And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as because
The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon
Computer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description
Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readable
Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this
In the embodiment of sample, which can be downloaded and installed from network by communications portion 609, and/or from removable
Medium 611 is unloaded to be mounted.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (16)
1. a kind of block chain data interactive method of changeable common recognition algorithm characterized by comprising
According to the data interaction request being verified, one is selected in pre-stored multiple common recognition algorithms according to preset rules altogether
Know algorithm;
According to selected common recognition algorithm, common recognition is executed to data interaction request together with other nodes in same block chain
Operation re-executes common recognition operation if not reaching common understanding, until reach common understanding, output common recognition result;
According to the common recognition result and data interaction request, data interaction operation is executed.
2. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that described
According to the data interaction request being verified, a common recognition is selected in pre-stored multiple common recognition algorithms according to preset rules and is calculated
Method, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, according to default
Corresponding relationship select a common recognition algorithm, the corresponding relationship be the application number, block chain scene type and current net
The mapping relations of network environmental safety rank and the type of the common recognition algorithm.
3. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that described
According to the data interaction request being verified, a common recognition is selected in pre-stored multiple common recognition algorithms according to preset rules and is calculated
Method, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, generate whole
Security level;
According to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm, a common recognition algorithm is selected.
4. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap
It includes:
The data traffic generated to data interaction is monitored, if current data flow is more than given threshold, delayed data is handed over
Mutual processing stops handling the data interaction.
5. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap
It includes:
Each node in block chain is encrypted by the cryptographic protocol of two-way authentication.
6. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap
It includes:
The identity for identifying the initiation user of data interaction request, verifies whether the initiation user is registered in block chain
User;
If being verified, request whether interactive data are that initiation user is allowed to interactive number in identification data interaction request
According to if interactive data are allowed to, then allowing data interaction.
7. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap
It includes:
It checks that the access authority of user is initiated in data interaction request, passes through if checking, execute and receive the data interaction request.
8. a kind of block chain data interaction device of changeable common recognition algorithm characterized by comprising
Routing module of knowing together is calculated according to preset rules in pre-stored multiple common recognitions according to the data interaction request being verified
A common recognition algorithm is selected in method;
Algorithm of knowing together realizes module, according to selected common recognition algorithm, to the number together with other nodes in same block chain
Common recognition operation is executed according to interaction request, if not reaching common understanding, re-executes common recognition operation, until reach common understanding, output common recognition knot
Fruit;
Intelligent contract processing module executes data interaction operation according to the common recognition result and data interaction request.
9. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that described total
Know routing module according to data interaction request in application number, block chain scene type and current network environment safety, press
According to preset corresponding relationship select a common recognition algorithm, the corresponding relationship be the application number, block chain scene type and
The mapping relations of the type of current network environment security level and the common recognition algorithm.
10. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that described
Common recognition routing module, comprising:
General safety rank generation unit, according to data interaction request in application number, block chain scene type and current net
Network environmental safety generates general safety rank;
It knows together algorithms selection unit, according to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm,
One common recognition algorithm of selection.
11. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap
It includes:
Current limited Control reinforces module, and the data traffic generated to data interaction is monitored, if current data flow is more than setting
When threshold value, the processing or stopping of delayed data interaction handle the data interaction.
12. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap
It includes:
Data safety reinforces module, is encrypted by the cryptographic protocol of two-way authentication to each node in block chain.
13. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap
It includes:
Module is reinforced in authentication, the identity of the initiation user of identification data interaction request, verify the initiation user whether be
The registered user in block chain;
Data identification module requests whether interactive data are initiation users in identification data interaction request if being verified
Interactive data are allowed to, if interactive data are allowed to, then allow data interaction.
14. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap
It includes:
Access control reinforces module, checks that the access authority of user is initiated in data interaction request, passes through if checking, execute reception
The data interaction request.
15. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes the described in any item methods of claim 1 to 7 when executing described program
The step of.
16. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
The step of claim 1 to 7 described in any item methods are realized when processor executes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910669873.4A CN110365695A (en) | 2019-07-24 | 2019-07-24 | The block chain data interactive method and device of changeable common recognition algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910669873.4A CN110365695A (en) | 2019-07-24 | 2019-07-24 | The block chain data interactive method and device of changeable common recognition algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110365695A true CN110365695A (en) | 2019-10-22 |
Family
ID=68220181
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910669873.4A Pending CN110365695A (en) | 2019-07-24 | 2019-07-24 | The block chain data interactive method and device of changeable common recognition algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110365695A (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111461887A (en) * | 2020-04-01 | 2020-07-28 | 杭州溪塔科技有限公司 | Block chain consensus processing method and device and electronic equipment |
CN111585985A (en) * | 2020-04-24 | 2020-08-25 | 广东职业技术学院 | Business identity recognition and authentication method and system based on block chain |
CN111737350A (en) * | 2020-06-19 | 2020-10-02 | 清华大学 | Consensus mechanism selection method and device based on distributed system |
CN111866086A (en) * | 2020-06-28 | 2020-10-30 | 青岛万民科技有限公司 | Block chain control method and system based on cloud edge |
CN111861469A (en) * | 2020-07-27 | 2020-10-30 | 北京金山云网络技术有限公司 | Processing method and device for consensus mechanism in block chain and electronic equipment |
CN111988202A (en) * | 2020-09-03 | 2020-11-24 | 深圳壹账通智能科技有限公司 | Node switching method, device and storage medium |
CN112068900A (en) * | 2020-09-09 | 2020-12-11 | 上海万向区块链股份公司 | Hot plug switching system for BFT consensus algorithm |
CN112187913A (en) * | 2020-09-24 | 2021-01-05 | 普华云创科技(北京)有限公司 | Method and system for realizing consensus based on intelligent contract |
CN112446050A (en) * | 2021-02-01 | 2021-03-05 | 腾讯科技(深圳)有限公司 | Business data processing method and device applied to block chain system |
CN112486518A (en) * | 2020-12-01 | 2021-03-12 | 北京微芯区块链与边缘计算研究院 | Consensus algorithm assembling method and device |
CN112564960A (en) * | 2020-12-01 | 2021-03-26 | 浙商银行股份有限公司 | Elastic adjustment consensus method and device based on block link point centrality |
CN112804351A (en) * | 2021-03-05 | 2021-05-14 | 中国工商银行股份有限公司 | Flow control method, device, node, medium and product of block chain system |
CN112907082A (en) * | 2021-02-23 | 2021-06-04 | 上海腾天节能技术有限公司 | Block chain consensus algorithm evaluation optimization method |
CN112910950A (en) * | 2021-01-13 | 2021-06-04 | 杭州趣链科技有限公司 | Uplink method and device for data to be uplink and block link point equipment |
CN113177080A (en) * | 2021-05-14 | 2021-07-27 | 北京邮电大学 | Block chain consensus engine system and block chain consensus processing flow method |
CN113438204A (en) * | 2021-05-06 | 2021-09-24 | 中国地质大学(武汉) | Multi-node cooperative identification response method based on block chain |
CN113572140A (en) * | 2021-07-15 | 2021-10-29 | 国网上海市电力公司 | Distribution network fault isolation instruction transmission method and equipment based on variable consensus mechanism |
CN113783947A (en) * | 2021-08-26 | 2021-12-10 | 浙商银行股份有限公司 | Adaptive block link point fault tolerance improving method, equipment and storage medium |
WO2022027530A1 (en) * | 2020-08-05 | 2022-02-10 | 西安电子科技大学 | Blockchain-based high-performance tamper-proof database construction method |
CN114090306A (en) * | 2022-01-21 | 2022-02-25 | 安徽中科晶格技术有限公司 | Pluggable block chain layered consensus method, system, device and storage medium |
CN114296831A (en) * | 2021-12-30 | 2022-04-08 | 迅鳐成都科技有限公司 | Dynamic loading method, device and system for block chain consensus algorithm and storage medium |
CN114499880A (en) * | 2022-01-20 | 2022-05-13 | 中国联合重型燃气轮机技术有限公司 | Method and device for transmitting operation and maintenance data of gas turbine |
CN115276999A (en) * | 2022-06-10 | 2022-11-01 | 大连理工大学 | Self-adaptive switching efficient fault-tolerant consensus method based on trust model |
CN116055308A (en) * | 2023-02-10 | 2023-05-02 | 青岛闪收付信息技术有限公司 | Bottom layer blockchain network deployment method and device of supply chain financial platform |
CN117336296A (en) * | 2023-12-01 | 2024-01-02 | 太极计算机股份有限公司 | Intelligent selection method for cluster consensus |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107360248A (en) * | 2017-07-31 | 2017-11-17 | 众安信息技术服务有限公司 | For configuring the method and apparatus locally known together and computer-readable recording medium |
CN107450981A (en) * | 2017-05-31 | 2017-12-08 | 阿里巴巴集团控股有限公司 | A kind of block chain common recognition method and apparatus |
US20180113752A1 (en) * | 2016-10-20 | 2018-04-26 | International Business Machines Corporation | Inter-ledger messaging in a blockchain |
CN108848125A (en) * | 2018-05-22 | 2018-11-20 | 北京京东尚科信息技术有限公司 | The method and apparatus and storage medium of common recognition service are provided in block chain |
CN109698753A (en) * | 2018-12-17 | 2019-04-30 | 成都四方伟业软件股份有限公司 | Cochain common recognition algorithmic match method and device based on block chain |
-
2019
- 2019-07-24 CN CN201910669873.4A patent/CN110365695A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180113752A1 (en) * | 2016-10-20 | 2018-04-26 | International Business Machines Corporation | Inter-ledger messaging in a blockchain |
CN107450981A (en) * | 2017-05-31 | 2017-12-08 | 阿里巴巴集团控股有限公司 | A kind of block chain common recognition method and apparatus |
CN107360248A (en) * | 2017-07-31 | 2017-11-17 | 众安信息技术服务有限公司 | For configuring the method and apparatus locally known together and computer-readable recording medium |
CN108848125A (en) * | 2018-05-22 | 2018-11-20 | 北京京东尚科信息技术有限公司 | The method and apparatus and storage medium of common recognition service are provided in block chain |
CN109698753A (en) * | 2018-12-17 | 2019-04-30 | 成都四方伟业软件股份有限公司 | Cochain common recognition algorithmic match method and device based on block chain |
Non-Patent Citations (1)
Title |
---|
吴大器等: "《2016年上海国际金融中心建设蓝皮书》", 31 December 2016, pages: 187 * |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111461887A (en) * | 2020-04-01 | 2020-07-28 | 杭州溪塔科技有限公司 | Block chain consensus processing method and device and electronic equipment |
CN111585985A (en) * | 2020-04-24 | 2020-08-25 | 广东职业技术学院 | Business identity recognition and authentication method and system based on block chain |
CN111585985B (en) * | 2020-04-24 | 2022-07-12 | 广东职业技术学院 | Business identity recognition and authentication method and system based on block chain |
CN111737350A (en) * | 2020-06-19 | 2020-10-02 | 清华大学 | Consensus mechanism selection method and device based on distributed system |
CN111866086A (en) * | 2020-06-28 | 2020-10-30 | 青岛万民科技有限公司 | Block chain control method and system based on cloud edge |
CN111866086B (en) * | 2020-06-28 | 2022-04-22 | 青岛万民科技有限公司 | Block chain control method and system based on cloud edge |
CN111861469A (en) * | 2020-07-27 | 2020-10-30 | 北京金山云网络技术有限公司 | Processing method and device for consensus mechanism in block chain and electronic equipment |
WO2022027530A1 (en) * | 2020-08-05 | 2022-02-10 | 西安电子科技大学 | Blockchain-based high-performance tamper-proof database construction method |
CN111988202A (en) * | 2020-09-03 | 2020-11-24 | 深圳壹账通智能科技有限公司 | Node switching method, device and storage medium |
CN111988202B (en) * | 2020-09-03 | 2022-05-03 | 深圳壹账通智能科技有限公司 | Node switching method, device and storage medium |
CN112068900A (en) * | 2020-09-09 | 2020-12-11 | 上海万向区块链股份公司 | Hot plug switching system for BFT consensus algorithm |
CN112187913A (en) * | 2020-09-24 | 2021-01-05 | 普华云创科技(北京)有限公司 | Method and system for realizing consensus based on intelligent contract |
CN112486518A (en) * | 2020-12-01 | 2021-03-12 | 北京微芯区块链与边缘计算研究院 | Consensus algorithm assembling method and device |
CN112564960A (en) * | 2020-12-01 | 2021-03-26 | 浙商银行股份有限公司 | Elastic adjustment consensus method and device based on block link point centrality |
CN112486518B (en) * | 2020-12-01 | 2024-03-12 | 北京微芯区块链与边缘计算研究院 | Consensus algorithm assembling method and device |
CN112910950A (en) * | 2021-01-13 | 2021-06-04 | 杭州趣链科技有限公司 | Uplink method and device for data to be uplink and block link point equipment |
CN112446050A (en) * | 2021-02-01 | 2021-03-05 | 腾讯科技(深圳)有限公司 | Business data processing method and device applied to block chain system |
CN112907082A (en) * | 2021-02-23 | 2021-06-04 | 上海腾天节能技术有限公司 | Block chain consensus algorithm evaluation optimization method |
CN112907082B (en) * | 2021-02-23 | 2024-04-09 | 上海腾天节能技术有限公司 | Block chain consensus algorithm evaluation optimization method |
CN112804351A (en) * | 2021-03-05 | 2021-05-14 | 中国工商银行股份有限公司 | Flow control method, device, node, medium and product of block chain system |
CN113438204B (en) * | 2021-05-06 | 2022-09-23 | 中国地质大学(武汉) | Multi-node cooperative identification response method based on block chain |
CN113438204A (en) * | 2021-05-06 | 2021-09-24 | 中国地质大学(武汉) | Multi-node cooperative identification response method based on block chain |
CN113177080A (en) * | 2021-05-14 | 2021-07-27 | 北京邮电大学 | Block chain consensus engine system and block chain consensus processing flow method |
CN113572140A (en) * | 2021-07-15 | 2021-10-29 | 国网上海市电力公司 | Distribution network fault isolation instruction transmission method and equipment based on variable consensus mechanism |
CN113572140B (en) * | 2021-07-15 | 2024-04-12 | 国网上海市电力公司 | Distribution network fault isolation instruction transmission method and equipment based on variable consensus mechanism |
CN113783947A (en) * | 2021-08-26 | 2021-12-10 | 浙商银行股份有限公司 | Adaptive block link point fault tolerance improving method, equipment and storage medium |
CN113783947B (en) * | 2021-08-26 | 2024-05-31 | 浙商银行股份有限公司 | Adaptive block chain link point fault tolerance lifting method, device and storage medium |
CN114296831A (en) * | 2021-12-30 | 2022-04-08 | 迅鳐成都科技有限公司 | Dynamic loading method, device and system for block chain consensus algorithm and storage medium |
CN114499880A (en) * | 2022-01-20 | 2022-05-13 | 中国联合重型燃气轮机技术有限公司 | Method and device for transmitting operation and maintenance data of gas turbine |
CN114090306B (en) * | 2022-01-21 | 2022-04-19 | 安徽中科晶格技术有限公司 | Pluggable block chain layered consensus method, system, device and storage medium |
CN114090306A (en) * | 2022-01-21 | 2022-02-25 | 安徽中科晶格技术有限公司 | Pluggable block chain layered consensus method, system, device and storage medium |
CN115276999A (en) * | 2022-06-10 | 2022-11-01 | 大连理工大学 | Self-adaptive switching efficient fault-tolerant consensus method based on trust model |
CN115276999B (en) * | 2022-06-10 | 2024-03-22 | 大连理工大学 | Self-adaptive switching efficient fault-tolerant consensus method based on trust model |
CN116055308B (en) * | 2023-02-10 | 2024-01-05 | 青岛闪收付信息技术有限公司 | Bottom layer blockchain network deployment method and device of supply chain financial platform |
CN116055308A (en) * | 2023-02-10 | 2023-05-02 | 青岛闪收付信息技术有限公司 | Bottom layer blockchain network deployment method and device of supply chain financial platform |
CN117336296B (en) * | 2023-12-01 | 2024-03-26 | 太极计算机股份有限公司 | Intelligent selection method for cluster consensus |
CN117336296A (en) * | 2023-12-01 | 2024-01-02 | 太极计算机股份有限公司 | Intelligent selection method for cluster consensus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110365695A (en) | The block chain data interactive method and device of changeable common recognition algorithm | |
CN113438289B (en) | Block chain data processing method and device based on cloud computing | |
EP3859647B1 (en) | Blockchain transaction generation method and device | |
EP3494685B1 (en) | Token based network service among iot applications | |
CN110992027B (en) | Efficient transaction method and device for realizing privacy protection in block chain | |
US11128437B1 (en) | Distributed ledger for peer-to-peer cloud resource sharing | |
CN109635585A (en) | Method, agent node and the medium of Transaction Information are inquired in block chain network | |
CN111541724B (en) | Block chain all-in-one machine and automatic node adding method and device thereof | |
EP3937458B1 (en) | Blockchain integrated stations and automatic node adding methods and apparatuses | |
CN110336833A (en) | Image content common recognition method, server based on block chain | |
US20170041308A1 (en) | Dynamic identity switching | |
EP3961456B1 (en) | Data authorization information acquisition methods, apparatuses, and devices | |
US20040260946A1 (en) | User not present | |
CN106559389A (en) | A kind of Service Source issue, call method, device, system and cloud service platform | |
CN115987696B (en) | Zero trust security gateway implementation method and device based on block chain structure | |
WO2021035141A1 (en) | Blockchain network control system and methods | |
TWI812366B (en) | A data sharing method, device, equipment and storage medium | |
CN107453872A (en) | A kind of unified safety authentication method and system based on Mesos container cloud platforms | |
CN107846676A (en) | Safety communicating method and system based on network section security architecture | |
EP3070906A1 (en) | Multifaceted assertion directory system | |
CN109802927B (en) | Security service providing method and device | |
CN113704723B (en) | Block chain-based digital identity verification method and device and storage medium | |
Kandil et al. | Mobile agents' authentication using a proposed light Kerberos system | |
US11336438B2 (en) | Remote approval and execution of restricted operations | |
Dunnett et al. | A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191022 |