CN110365695A - The block chain data interactive method and device of changeable common recognition algorithm - Google Patents

The block chain data interactive method and device of changeable common recognition algorithm Download PDF

Info

Publication number
CN110365695A
CN110365695A CN201910669873.4A CN201910669873A CN110365695A CN 110365695 A CN110365695 A CN 110365695A CN 201910669873 A CN201910669873 A CN 201910669873A CN 110365695 A CN110365695 A CN 110365695A
Authority
CN
China
Prior art keywords
common recognition
data interaction
block chain
data
recognition algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910669873.4A
Other languages
Chinese (zh)
Inventor
赖春晖
苏恒
彭顺求
万涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910669873.4A priority Critical patent/CN110365695A/en
Publication of CN110365695A publication Critical patent/CN110365695A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides the block chain data interactive method and device of a kind of changeable common recognition algorithm, different common recognition algorithms is accessed for different business scenarios, realize pluggable access, promote block catenary system common recognition efficiency, shorten the data interaction response time, the big data business for handling logic complexity for block chain provides strong support in function and performance, and convenience is provided in functional development, improves efficiency of research and development.This method solves common recognition algorithm and couples with block catenary system verifying node height, the mentality of designing for proposing pluggable common recognition algorithm, realizes system common recognition and intelligent contract decoupling, common recognition algorithm High Availabitity, expansibility, the monitoring O&M for node of knowing together are also more convenient, controllable.Solve the problems, such as that original PBFT algorithm communication cost is excessively high under privately owned chain environment, after using RAFT algorithm instead, communicates the reduction of complexity simultaneously.The average response time of block chain can be effectively reduced, reduce the CPU of server and the utilization rate of memory, save the expense of resource.

Description

The block chain data interactive method and device of changeable common recognition algorithm
Technical field
The present invention relates to data interaction technology fields, more particularly to a kind of block chain number of changeable common recognition algorithm According to exchange method and device.
Background technique
Block chain technology as an innovative technology framework being born with bit coin, its essence be it is open and clear, can not It distorts, retrospective distributed account book technology.In block chain technology, common recognition mechanism is a component part of wherein core, area Block chain common recognition mechanism describes in distributed system between multiple nodes, reaches an agreement the process of result to some state each other, Its target is the consistent block chain view of method and apparatus preservation for making all honest nodes be used to access container, however at present The single common recognition algorithm that the block chain product of industry only supports depth embedded, as Hyperledger Fabric only supports PBFT The single common recognition algorithm of POW is only supported in algorithm, ether mill, it is difficult to is applicable in changeable business scenario, be become restriction technical application With the bottleneck of promoting service.
Summary of the invention
To solve the above-mentioned problems at least one, the application one aspect embodiment provide a kind of changeable common recognition algorithm Block chain data interactive method, comprising:
According to the data interaction request being verified, one is selected in pre-stored multiple common recognition algorithms according to preset rules A common recognition algorithm;
According to selected common recognition algorithm, the data interaction is requested to execute together with other nodes in same block chain Common recognition operation re-executes common recognition operation if not reaching common understanding, until reach common understanding, output common recognition result;
According to the common recognition result and data interaction request, data interaction operation is executed.
In certain embodiments, the basis is verified data interaction request, according to preset rules pre-stored A common recognition algorithm is selected in multiple common recognition algorithms, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, according to Preset corresponding relationship selectes a common recognition algorithm, and the corresponding relationship is the application number, block chain scene type and works as The mapping relations of preceding security of network environment rank and the type of the common recognition algorithm.
In certain embodiments, the basis is verified data interaction request, according to preset rules pre-stored A common recognition algorithm is selected in multiple common recognition algorithms, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, generate General safety rank;
According to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm, a common recognition is selected to calculate Method.
In certain embodiments, the data traffic generated to data interaction is monitored, if current data flow is more than to set When determining threshold value, the processing or stopping of delayed data interaction handle the data interaction.
In certain embodiments, further includes:
Each node in block chain is encrypted by the cryptographic protocol of two-way authentication.
In certain embodiments, further includes:
The identity for identifying the initiation user of data interaction request, verifies whether the initiation user is to have infused in block chain The user of volume;
If being verified, request whether interactive data are that initiation user is allowed to interact in identification data interaction request Data then allow data interaction if interactive data are allowed to.
In certain embodiments, further includes:
It checks that the access authority of user is initiated in data interaction request, passes through if checking, execute and receive the data interaction Request.
The application other side embodiment provides a kind of block chain data interaction device of changeable common recognition algorithm, packet It includes:
Common recognition routing module, is requested according to the data interaction being verified, multiple total what is be pre-stored according to preset rules Know and selectes a common recognition algorithm in algorithm;
Algorithm of knowing together realizes module, according to selected common recognition algorithm, to institute together with other nodes in same block chain It states data interaction request and executes common recognition operation, if not reaching common understanding, re-execute common recognition operation, until reaching common understanding, output is altogether Know result;
Intelligent contract processing module executes data interaction operation according to the common recognition result and data interaction request.
In certain embodiments, it is described common recognition routing module according to data interaction request in application number, block chain scene Type and current network environment safety select a common recognition algorithm according to preset corresponding relationship, and the corresponding relationship is The mapping of the type of the application number, block chain scene type and current network environment security level and the common recognition algorithm Relationship.
In certain embodiments, the common recognition routing module, comprising:
General safety rank generation unit, according to data interaction request in application number, block chain scene type and work as Preceding security of network environment generates general safety rank;
Common recognition algorithms selection unit, according to the corresponding pass of the general safety rank and general safety rank and common recognition algorithm System selects a common recognition algorithm.
In certain embodiments, further includes:
Current limited Control reinforces module, and the data traffic generated to data interaction is monitored, if current data flow is more than When given threshold, the processing or stopping of delayed data interaction handle the data interaction.
In certain embodiments, further includes:
Data safety reinforces module, is encrypted by the cryptographic protocol of two-way authentication to each node in block chain.
In certain embodiments, further includes:
Module is reinforced in authentication, and the identity of the initiation user of identification data interaction request, verifying the initiation user is No is the registered user in block chain;
Data identification module requests whether interactive data are the initiations in identification data interaction request if being verified User is allowed to interactive data, if interactive data are allowed to, then allows data interaction.
In certain embodiments, further includes:
Access control reinforces module, checks that the access authority of user is initiated in data interaction request, passes through if checking, execute Receive the data interaction request.
The another aspect embodiment of the application provides a kind of computer equipment, including memory, processor and is stored in storage On device and the computer program that can run on a processor, the processor realize the step of the above method when executing described program Suddenly.
A kind of another computer readable storage medium of aspect embodiment of the application, is stored thereon with computer program, the meter The step of above method is realized when calculation machine program is executed by processor.
The invention has the following beneficial effects:
The present invention provides the block chain data interactive methods and device of a kind of changeable common recognition algorithm, for different industry Business scene accesses different common recognition algorithms, realizes pluggable access, promotes block catenary system common recognition efficiency, shortens data interaction and ring Between seasonable, the big data business for handling logic complexity for block chain provides strong support in function and performance, in functional development Upper offer convenience improves efficiency of research and development.This method solves common recognition algorithm and couples with block catenary system verifying node height, and proposition can insert The mentality of designing for pulling out common recognition algorithm realizes system common recognition and the decoupling of intelligent contract, common recognition algorithm High Availabitity, expansibility, altogether The monitoring O&M for knowing node is also more convenient, controllable.Solves original PBFT algorithm communication cost mistake under privately owned chain environment simultaneously High problem, after using RAFT algorithm instead, due to communicating the reduction of complexity.Can be effectively reduced block chain average response time, The CPU of server and the utilization rate of memory are reduced, the expense of resource is saved.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 shows the block chain network framework realized in the embodiment of the present application.
Fig. 2 shows the process signals of the block chain data interactive method of changeable common recognition algorithm a kind of in the embodiment of the present application Figure.
Fig. 3 shows one of the structural schematic diagram that node 2 is verified in the embodiment of the present application.
Fig. 4 shows the second structural representation that node 2 is verified in the embodiment of the present application.
Fig. 5 shows the structural schematic diagram that algorithm of knowing together in the embodiment of the present application realizes module 22.
Fig. 6 shows the structural schematic diagram of security hardening module 2345 in the embodiment of the present application.
Fig. 7 shows the specific steps that block chain network framework executes in the embodiment of the present application.
Fig. 8 shows the structural schematic diagram for being adapted to carry out the electronic equipment of the embodiment of the present application.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Block chain technology as an innovative technology framework being born with bit coin, its essence be it is open and clear, can not It distorts, retrospective distributed account book technology.In block chain technology, common recognition mechanism is a component part of wherein core, area Block chain common recognition mechanism describes in distributed system between multiple nodes, reaches an agreement the process of result to some state each other, Its target is the consistent block chain view of method and apparatus preservation for making all honest nodes be used to access container, however at present The single common recognition algorithm that the block chain product of industry only supports depth embedded, as Hyperledger Fabric only supports PBFT The single common recognition algorithm of POW is only supported in algorithm, ether mill, it is difficult to is applicable in changeable business scenario, be become restriction technical application With the bottleneck of promoting service.
This application provides a kind of block chain method and devices of pluggable common recognition algorithm, devise block chain bottom account book The common store framework of common recognition algorithm plug type, including common recognition routing module and common recognition algorithm realize that module, algorithm of knowing together are real The realization of existing module, security hardening module.Different common recognition algorithms is accessed for different business scenarios using the application, is realized Pluggable access promotes block catenary system common recognition efficiency, shortens the data interaction response time, complicated for block chain processing logic Big data business provides strong support in function and performance, and convenience is provided in functional development, improves efficiency of research and development.
Fig. 1 shows the block chain network framework realized in the embodiment of the present application, specifically includes: application layer services device 1, Authenticate node 4, verifying node 2 and non-authentication node 3.
Wherein, application layer services device 1 is verified one or several in node 2 and non-authentication node 3 with block chain and is connect And carry out two-way data transmission.It homogeneously connects and carries out between block chain verifying node 2 and each node of non-authentication node 3 Two-way data transmission.Block chain certification node 4 and each verifying node 2 and non-authentication node 3 keep connecting and carrying out double To data transmission.
Application layer services device 1 can be the server cluster an of server or multiple servers composition, be mainly responsible for place Manage the service logic other than block chain.In general, block chain verifying node 2 and non-authentication node 3 can provide service to application layer and connect Mouthful.Application layer constructs request message according to specific service logic, sends to block chain and takes provided by request call block chain Business interface continues to execute subsequent service logic after waiting block catenary system to execute data interaction and returned data interaction results.
Block chain verifying node 2 can be the server cluster an of server or multiple servers composition.Verify node 2 Request is sent to certification node 4 starting and block chain network Shi Zehui being added, obtains the certificate of registration that certification node 4 is signed and issued. In order to guarantee anonymity and the safety of data interaction, verifying node 2 will use certification node 4 when sending data interaction request The data interaction certificate that batch is signed and issued signs to data interaction, and close using the symmetric cryptography generated by Diffie-Hellman Key encrypts data interaction data.In general, there are several to verify node 2 in a block chain network, each verifying Node 2 is all responsible for receiving the data interaction request that application layer services device 1 sends (or block chain non-authentication node 3 forwards), After data interaction request is signed and is encrypted, other verifying nodes of broadcast into block chain network.Other verifying sections After point receives the data interaction, sign test can be carried out to data interaction.According to different scenes, verifying node can use different Common recognition algorithm knows together to data interaction, and the data interaction reached common understanding can be performed, and data interaction request then can be slow It deposits certain amount or is packaged write-in block after a period of time, carry out persistent storage.The structure chart of block chain verifying node 2 See Fig. 2.
Block chain non-authentication node 3 can be the server cluster an of server or multiple servers composition.Non-authentication Node 3 is starting and block chain network Shi Zehui is added to the certification transmission request of node 4, obtains the registration that certification node 4 is signed and issued Certificate.In order to guarantee anonymity and the safety of data interaction, non-authentication node 3 will use when sending data interaction request to be recognized The data interaction certificate that card 4 batch of node is signed and issued signs to data interaction, and uses pair generated by Diffie-Hellman Encryption key is claimed to encrypt data interaction data.Block chain non-authentication node 3 can receive transmitted by application layer services device 1 Data interaction request, and data interaction is packaged, using private key corresponding to data interaction certificate to data interaction number The data interaction certificate is enclosed according to signing, and the data interaction by signature, symmetric key is reused and the data is handed over It is mutually encrypted, the data interaction by encryption is finally transmitted to block chain verifying node 2.Block chain non-authentication node 3 Body is simultaneously not involved in common recognition, will not execute data interaction or save block data.The structure chart of block chain non-authentication node 3 is shown in figure 2。
Block chain certification node 4 can be a server or the more servers mutually backed up.Block chain authenticates node 4 Predominantly block chain verifying node 2 and block chain non-authentication node 3 provide authentication and grant a certificate service.
The block chain data interactive method for the changeable common recognition algorithm that verifying node executes is illustrated below, as shown in Fig. 2, packet It includes:
S1: requesting according to the data interaction being verified, and selects in pre-stored multiple common recognition algorithms according to preset rules A fixed common recognition algorithm;
S2: according to selected common recognition algorithm, the data interaction is requested together with other nodes in same block chain Common recognition operation is executed, if not reaching common understanding, re-executes common recognition operation, until reach common understanding, output common recognition result;
S3: according to the common recognition result and data interaction request, data interaction operation is executed.
Specifically, in some embodiments, in step sl, according to data interaction request in application number, block chain scene Type and current network environment safety select a common recognition algorithm according to preset corresponding relationship, and the corresponding relationship is The mapping of the type of the application number, block chain scene type and current network environment security level and the common recognition algorithm Relationship.
In other specific embodiments, step S1 is specifically included:
S11: according to data interaction request in application number, block chain scene type and current network environment safety, Generate general safety rank;
S12: according to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm, a common recognition is selected Algorithm.
The function and applicable scene of the different and different common recognition algorithm of its process for realizing of different common recognition algorithms Also different, such as PBFT Byzantium algorithm has the function of Byzantine failure tolerance, can support under 3f+1 node environment f Node failure or when doing evil, for example part of nodes is not responding to, sends error message, sends different decisions, difference to different nodes Error node is joined together in the case of doing evil, which still can guarantee normally provide service with clustered node without quilt Malicious node influences.But in terms of communication cost, the communication complexity of Byzantine failure tolerance algorithm is O (n2), wherein n is in network Node number requires reaching of knowing together every time to carry out n squares node communication, thus can also spend biggish communication at This.And the communication complexity of RAFT consistency algorithm is O (n), but be only capable of handle node failures but and can not handle node doing evil The case where, consistency algorithm RAFT improves the efficiency of common recognition, but relax requirement to system activity therefore network compared with For safe and reliable environment, using the available higher execution efficiency of the algorithm, and PBFT can handle Byzantium's problem, but It is to communicate complexity as O (n2), it can handle the more insecure environment of network, it is therefore, safer for section network environment And stabilization, similar raft algorithm should be used to obtain more preferable effectiveness of performance, and for the scene that safety is difficult to ensure, should switch makes Guarantee the safety of system with PBFT algorithm.
Further, in some embodiments, verifying node 2 also executes:
S4: each node in block chain is encrypted by the cryptographic protocol of two-way authentication.
In a particular embodiment, between application node and block chain node, node/non-authentication node and authentication are verified Between central node, verifying node between each other with non-authentication node it is mutual be transmitted through the cryptographic protocols such as two-way authentication Encryption, prevents information leakage and information in transmission process from distorting.
In addition, in some embodiments, verifying node 2 also executes:
S5: the data traffic generated to data interaction is monitored, if current data flow is more than given threshold, delay The processing of data interaction stops handling the data interaction.
In the embodiment, flow restriction initiates flow attacking mainly for prevention application end, in certain specific embodiments, leads to Flow control and the three-level current limiting mechanism of differentiation are crossed to solve.
Differentiation flow control controlled by high sequence in low according to the user class of data interaction, priority limit The low user of rank processed.
Three-level current limiting mechanism be then by 1) cache request data, such as the data 2 frequently inquired) reduce user gradation, Delayed data interaction response, priority processing high ranked user data interaction 3) measures such as data interaction flow are limited to take precautions against.
Further, in some embodiments, verifying node 2 also executes:
S6: the identity of the initiation user of identification data interaction request verifies whether the initiation user is in block chain Registered user;
S7: if being verified, request whether interactive data are that initiation user is allowed in identification data interaction request Interactive data then allow data interaction if interactive data are allowed to.
In the embodiment, the identity for the access device for initiating data interaction request is identified, it is ensured that access side is true It is believable, it is ensured that all operations are all that block Lian Zhong legal entity initiates, as table 1 shows the proof list of access device.
The proof list of 1 access device of table
Further, in other embodiments, verifying node 2 also executes:
S8: checking that the access authority of user is initiated in data interaction request, pass through if checking, executes the reception data and hands over Mutually request.
In the embodiment, before data interaction request enters block chain common recognition, the reading and writing to accessing user is needed to weigh Limit is controlled, and the legitimacy of authentication data interaction data and prevents the unauthorized operation to business datum.The equipment message of access Data need to check the legitimacy of device id, filter invalid equipment data, and table 2 shows specifically arranging for scope check Apply table.
2 scope check measure table of table
It is appreciated that it is specific in block chain to execute data interaction operation according to the common recognition result and data interaction request To execute intelligent contract and returning to intelligent contract implementing result, i.e., data interaction is executed simultaneously according to the agreement recorded on intelligent contract The result of returned data interaction.
Fig. 3 shows the specific modular structure schematic diagram of verifying node 2, and verifying node 2 is the area of changeable common recognition algorithm Block chain data interaction device, specifically includes: common recognition routing module 21 is requested according to the data interaction being verified, according to pre- If rule selectes a common recognition algorithm in pre-stored multiple common recognition algorithms;Algorithm of knowing together realizes module 22, according to selected Common recognition algorithm requests the data interaction together with other nodes in same block chain to execute common recognition operation, if not reaching Common recognition re-executes common recognition operation, until reach common understanding, output common recognition result;Intelligent contract processing module 23, according to described total Know result and data interaction request, executes data interaction operation.
Bridge is applied and switched to common recognition routing module 21 by mainly realizing a variety of common recognition algorithms, establishes different application scenarios With the mapping relations of common recognition algorithm.Such as application number: id is applied, block chain scene type: privately owned chain/alliance's chain, network environment: Interior barrier/the area DMZ, algorithm of knowing together: PBFT/RAFT/RBFT/PAXOS/ALGORNAD etc. };The suitable common recognition algorithm logarithm of selection It knows together according to interaction in the whole network node.
Algorithm of knowing together realizes that module 22 mainly according to specific algorithm flow, realizes block chain common recognition process, process of knowing together Main includes the message sink of common recognition, and the execution known together between node, in addition the commit or rollback of result of knowing together also are wrapped Include security hardening when common recognition algorithm changeover.
Intelligent contract processing module 23 is mainly responsible for verifying common recognition and executes as a result, executing intelligent contract with intelligent contract is returned As a result.It is worth noting that verifying common recognition result includes the common recognition result verification to different common recognition algorithms, if the verification passes, Then enter the execution stage of intelligent contract, if verifying does not pass through, returns to specific common recognition error information.
In a particular embodiment, as shown in figure 4, verifying node 2 further includes that communication module 25 is mainly responsible for and other nodes Interaction sends and receives various types of message, including data interaction request, common recognition message, data interaction result etc..
In embodiment not shown in the figure, it can also include that encrypting module belongs to technical support module, be mainly responsible for number According to interactive encryption, decryption, signature and sign test, the application and management of all kinds of certificates and key calculate the functions such as cryptographic Hash.
Continuing with as shown in connection with fig. 4, verifying node 2 further includes memory module 24, and memory module 24, which is mainly responsible for, to be verified The data persistence of block and data intercorrelation that node generates is stored into database.
In embodiment not shown in the figure, node 2 is verified further include: configuration management module and common recognition access access mould Block.
Configuration management module is mainly used for setting common recognition routing module and some key parameters of algorithm realization module of knowing together. Such as the node total number of network, the request timed out time, nodes heart beat time-out time etc., it is worth noting that, it can be set by parameter Set the common recognition algorithm that block chain network initially uses.There are three types of optional configurations, is respectively as follows: SOLO (under single cpu mode), practical Byzantine failure tolerance PBFT algorithm and RAFT algorithm.
Common recognition access AM access module belongs to technical support module, is mainly responsible for the input for receiving application end, is a variety of differences Common recognition algorithm unified cut-in method is provided, including calculating cryptographic Hash to the encryption of data interaction, decryption, signature and sign test Etc. functions.
Based on identical inventive concept, in some embodiments, during the common recognition routing module is requested according to data interaction Application number, block chain scene type and current network environment safety are calculated according to the selected common recognition of preset corresponding relationship Method, the corresponding relationship be the application number, block chain scene type and current network environment security level with it is described total Know the mapping relations of the type of algorithm.
Based on identical inventive concept, in some embodiments, the common recognition routing module, comprising: general safety rank is raw At unit, according to data interaction request in application number, block chain scene type and current network environment safety, generate whole Body security level;Common recognition algorithms selection unit, according to pair of the general safety rank and general safety rank and common recognition algorithm It should be related to, select a common recognition algorithm.
As shown in figure 5, in a particular embodiment, common recognition algorithm realizes that module 22 specifically includes common recognition message reception module 2341, execution module 2342 of knowing together, commit module 2343 of knowing together, rollback module 2344 of knowing together.
Wherein common recognition message reception module 2341 is triggered when algorithm of knowing together receives message request, is mainly responsible for monitoring and is connect Receive the message of common recognition algorithm interior joint intercommunication.Once receiving the communication information of other nodes initiation, common recognition is entered Execution module 2342 carries out common recognition processing.
Execution module 2342 of knowing together is responsible for specific implementation common recognition algorithm, including the communications protocol executed between node, communication streams Journey, and processing when receiving communication message, its process for realizing of different common recognition algorithms is different and different to be total to Function and the applicable scene for knowing algorithm are also different, such as PBFT Byzantium algorithm has the function of Byzantine failure tolerance, can be with When supporting f node failure under 3f+1 node environment or doing evil, for example part of nodes is not responding to, sends error message, to not It joins together in the case of doing evil with the different decisions of node transmission, different error nodes, which still can guarantee collect Group node normally provides service without being influenced by malicious node.But in terms of communication cost, the communication of Byzantine failure tolerance algorithm is multiple Miscellaneous degree is O (n2), wherein n is nodes number, i.e., the node for requiring to carry out n squares time of reaching known together every time leads to News, therefore can also spend biggish communication cost.And the communication complexity of RAFT consistency algorithm is O (n), but be only capable of handling Node failure can not but handle the case where node is done evil, and consistency algorithm RAFT improves the efficiency of common recognition, but relax pair The requirement of system activity is therefore in the safer reliable environment of network, using the available higher execution efficiency of the algorithm, And PBFT can handle Byzantium's problem, but communicating complexity is O (n2), it can handle the more insecure environment of network, Therefore, safer for section network environment and stable, common recognition execution module should use similar raft algorithm to obtain more preferable performance Efficiency, and for the scene that safety is difficult to ensure, execution module of knowing together should switch the peace for guaranteeing system using PBFT algorithm Entirely.
The common recognition triggering when common recognition is reached of commit module 2343 is mainly responsible for common recognition and reaches rear each verifying node submission Common recognition is as a result, carry out the operation of persistence processing to common recognition result.
The triggering when common recognition is not reached of common recognition rollback module 2344 is mainly responsible for the common recognition knot of each verifying node Fruit rollback, without persistence processing.
In order to improve the safety of data interaction, verifying node 2 further includes security hardening module 2345, specifically, such as Fig. 6 Shown, security hardening module 2345 may include at least one of following module:
Module 2346 is reinforced in authentication, specifically includes authentication reinforcement elements, the hair of identification data interaction request The identity of user is played, verifies whether the initiation user is the registered user in block chain;And data identification unit, if testing Card passes through, and requests whether interactive data are that initiation user is allowed to interactive data in identification data interaction request, if Interactive data are allowed to, then allow data interaction.
Access control reinforces module 2347, checks that the access authority of user is initiated in data interaction request, passes through if checking, It executes and receives the data interaction request.
Current limited Control reinforces module 2348, and the data traffic generated to data interaction is monitored, if current data flow When more than given threshold, the processing or stopping of delayed data interaction handle the data interaction.
Data safety reinforces module 2349, is added by the cryptographic protocol of two-way authentication to each node in block chain It is close.
Specifically, wherein authentication reinforce module 2346, to initiate data interaction request access device identity into Row identifies, it is ensured that access side is genuine and believable, it is ensured that all operations are all that block Lian Zhong legal entity initiates, as shown in table 1.
Access control is reinforced module 2347 and is responsible for before data interaction requests to enter block chain common recognition, it is necessary to dock The reading and writing permission of access customer is controlled, and the legitimacy of authentication data interaction data and prevents the unauthorized operation to business datum. The equipment message data of access need to check the legitimacy of device id, filter invalid equipment data, as shown in table 2.
Current limited Control reinforces module 2348 and is mainly responsible for prevention application end initiation flow attacking, passes through the flow control of differentiation It makes with three-level current limiting mechanism and solves.Differentiation flow control is carried out according to the user class of data interaction by high sequence in low It is controlled, it is preferential to limit the low user of rank.Three-level current limiting mechanism is inquired by 1) cache request data, such as frequently Data 2) reduce user gradation, delayed data interaction response, priority processing high ranked user data interaction 3) limitation data hand over The measures such as mutual flow are taken precautions against.
Data safety, which is reinforced module 2349 and is mainly responsible for, to be ensured between application node and block chain node, verifying node/non- Verify between node and authentication central node, verifying node between each other with non-authentication node is mutual is transmitted through The encryption of the cryptographic protocols such as two-way authentication, prevents information leakage and information in transmission process from distorting.
Illustrate the specific steps that above-mentioned block chain network framework executes below.As shown in fig. 7, steps are as follows:
Step S101: verifying node 2, non-authentication node 3, certification node 4 are respectively on configuration management module, setting common recognition road Some key parameters that module 22 is realized by module 21 and common recognition algorithm, such as the node total number of network, request timed out time, node Heartbeat timeout time etc. is to be calculated with Byzantine failure tolerance PBFT by the common recognition algorithm that parameter setting block chain network initially uses Method.
Step S102: application layer services device 1 sends data interaction request to non-authentication node 3.
Step S103: the communication module 25 of block chain non-authentication node 3 receives the request, checks the legitimacy of data interaction And it is assembled into data interaction.
Step S104: the encrypting module of block chain non-authentication node 3 will use private key corresponding to data interaction certificate, It signs to data interaction, and forwards data interaction request to verifying node 2 all in verifying node cluster.
Step S105: the communication module 25 that block chain verifies node 2 receives the request, calls current limliting to reinforce module 2348 and examines Current data interaction flow is looked into, if current data interaction flow is more than the threshold value of some setting, delayed data interaction is rung It should or refuse to handle the data interaction, otherwise continue to handle in next step.
Step S106: block chain verifying node 2 calls authentication to reinforce module 2346 and checks current data interaction hair The identity information of side is played, if access device does not include that block chain is recognized in the registration of block catenary system or data interaction content Card node 4 is issued to the legal TLS certificate of equipment, then refuses to handle the data interaction, otherwise then continues in next step Reason.
Step S107: block chain verifying node 2 calls access control to reinforce module 2347 and checks current data interaction hair The access authority of side is played, if data interaction initiates user not to operating rights such as read/write/deployment of the intelligence contract, Refusal handles the data interaction, otherwise then continues to handle in next step.
Step S108: block chain verify node 2 call common recognition routing module 21, according to data interaction request in application Id, block chain scene type are privately owned chain or alliance's chain, and the network environment where node deployment is interior barrier or the area DMZ, are selected Common recognition algorithm such as PBFT/RAFT/RBFT/PAXOS/ALGORNAD etc., select suitable common recognition algorithm to data interaction complete Net node is known together.It is worth noting that application layer services device is initiated every data and is handed over the variation of service application scene The common recognition algorithm mutually used can not be identical, such as the first stroke data interaction is the scene in privately owned chain, can select raft etc. The lower consistency algorithm of safety, behind with federation node addition, second data interaction can select PBFT etc. suitable The higher common recognition algorithm of safety for alliance's chain.
Step S109: block chain verifies node 2 and calls common recognition access AM access module, starts the access and execution of common recognition algorithm Common recognition algorithm is monitored according to different common recognition algorithms and received to preceding preparation wherein common recognition message reception module 2341 can be called The message of interior joint intercommunication.
Step S110: block chain verifies node 2 and common recognition execution module 2342 is called to execute common recognition algorithm, including verifying node Between the communications protocol that executes, communication flow, and processing when receiving communication message, different common recognition algorithms its realize Process is different.
Step S111: after having executed common recognition algorithm, all verifying nodes verified in node cluster should reach an agreement knot Fruit executes common recognition commit module 2343 if all nodes are reached common understanding, and each verifying node submits common recognition as a result, right Result of knowing together carries out the operation of persistence processing;If all nodes are not reached common understanding, common recognition rollback module is executed 2344, the common recognition result rollback to each verifying node, without persistence processing.
Step S112: block chain verifies node 2 and total intelligent contract processing module 23 is called to verify common recognition as a result, if verifying Pass through, then execute intelligent contract, if verifying does not pass through, returns to specific common recognition error information.
Step S113: block chain verifying node 2 calls memory module 24 that data interaction information and intelligent contract are executed knot Block is written in fruit, and the relevant data persistence that data exchange process is generated is stored into database.
It is appreciated that the present invention provides the block chain data interactive methods and device of changeable common recognition algorithm.The device It is had the following effects that with method and advantage:
1, different common recognition algorithms is accessed for different business scenarios using the patented technology, realizes pluggable access, Block catenary system common recognition efficiency is promoted, shortens the data interaction response time, the big data business of logic complexity is handled for block chain It is provided strong support in function and performance, convenience is provided in functional development, improve efficiency of research and development.
2, it solves common recognition algorithm to couple with block catenary system verifying node height, proposes that the design of pluggable common recognition algorithm is thought Road, the system that realizes is known together and intelligent contract decouples, the monitoring O&M of common recognition algorithm High Availabitity, expansibility, common recognition node It is more convenient, controllable.
3, solve the problems, such as that original PBFT algorithm communication cost is excessively high under privately owned chain environment, after using RAFT algorithm instead, due to Communicate the reduction of complexity.The utilization of the average response time of block chain, the CPU and memory that reduce server can be effectively reduced Rate saves the expense of resource.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer equipment, specifically, computer is set It is standby for example can for personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, Media player, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment In any equipment combination.
Computer equipment specifically includes memory, processor and storage on a memory simultaneously in a typical example The computer program that can be run on a processor is realized when the processor executes described program and is held as described above by client Capable method, alternatively, the processor realizes the method executed as described above by server when executing described program.
Below with reference to Fig. 8, it illustrates the structural representations for the computer equipment 600 for being suitable for being used to realize the embodiment of the present application Figure.
As shown in figure 8, computer equipment 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in Program in memory (ROM) 602 is loaded into random access storage device (RAM) from storage section 608) program in 603 And execute various work appropriate and processing.In RAM603, also it is stored with system 600 and operates required various program sum numbers According to.CPU601, ROM602 and RAM603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to Bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And including such as LAN card, the communications portion 609 of the network interface card of modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 606 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted as needed such as storage section 608.
Particularly, according to an embodiment of the invention, may be implemented as computer above with reference to the process of flow chart description Software program.For example, the embodiment of the present invention includes a kind of computer program product comprising be tangibly embodied in machine readable Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this In the embodiment of sample, which can be downloaded and installed from network by communications portion 609, and/or from removable Medium 611 is unloaded to be mounted.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (16)

1. a kind of block chain data interactive method of changeable common recognition algorithm characterized by comprising
According to the data interaction request being verified, one is selected in pre-stored multiple common recognition algorithms according to preset rules altogether Know algorithm;
According to selected common recognition algorithm, common recognition is executed to data interaction request together with other nodes in same block chain Operation re-executes common recognition operation if not reaching common understanding, until reach common understanding, output common recognition result;
According to the common recognition result and data interaction request, data interaction operation is executed.
2. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that described According to the data interaction request being verified, a common recognition is selected in pre-stored multiple common recognition algorithms according to preset rules and is calculated Method, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, according to default Corresponding relationship select a common recognition algorithm, the corresponding relationship be the application number, block chain scene type and current net The mapping relations of network environmental safety rank and the type of the common recognition algorithm.
3. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that described According to the data interaction request being verified, a common recognition is selected in pre-stored multiple common recognition algorithms according to preset rules and is calculated Method, comprising:
According to data interaction request in application number, block chain scene type and current network environment safety, generate whole Security level;
According to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm, a common recognition algorithm is selected.
4. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap It includes:
The data traffic generated to data interaction is monitored, if current data flow is more than given threshold, delayed data is handed over Mutual processing stops handling the data interaction.
5. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap It includes:
Each node in block chain is encrypted by the cryptographic protocol of two-way authentication.
6. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap It includes:
The identity for identifying the initiation user of data interaction request, verifies whether the initiation user is registered in block chain User;
If being verified, request whether interactive data are that initiation user is allowed to interactive number in identification data interaction request According to if interactive data are allowed to, then allowing data interaction.
7. the block chain data interactive method of changeable common recognition algorithm according to claim 1, which is characterized in that also wrap It includes:
It checks that the access authority of user is initiated in data interaction request, passes through if checking, execute and receive the data interaction request.
8. a kind of block chain data interaction device of changeable common recognition algorithm characterized by comprising
Routing module of knowing together is calculated according to preset rules in pre-stored multiple common recognitions according to the data interaction request being verified A common recognition algorithm is selected in method;
Algorithm of knowing together realizes module, according to selected common recognition algorithm, to the number together with other nodes in same block chain Common recognition operation is executed according to interaction request, if not reaching common understanding, re-executes common recognition operation, until reach common understanding, output common recognition knot Fruit;
Intelligent contract processing module executes data interaction operation according to the common recognition result and data interaction request.
9. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that described total Know routing module according to data interaction request in application number, block chain scene type and current network environment safety, press According to preset corresponding relationship select a common recognition algorithm, the corresponding relationship be the application number, block chain scene type and The mapping relations of the type of current network environment security level and the common recognition algorithm.
10. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that described Common recognition routing module, comprising:
General safety rank generation unit, according to data interaction request in application number, block chain scene type and current net Network environmental safety generates general safety rank;
It knows together algorithms selection unit, according to the corresponding relationship of the general safety rank and general safety rank and common recognition algorithm, One common recognition algorithm of selection.
11. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap It includes:
Current limited Control reinforces module, and the data traffic generated to data interaction is monitored, if current data flow is more than setting When threshold value, the processing or stopping of delayed data interaction handle the data interaction.
12. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap It includes:
Data safety reinforces module, is encrypted by the cryptographic protocol of two-way authentication to each node in block chain.
13. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap It includes:
Module is reinforced in authentication, the identity of the initiation user of identification data interaction request, verify the initiation user whether be The registered user in block chain;
Data identification module requests whether interactive data are initiation users in identification data interaction request if being verified Interactive data are allowed to, if interactive data are allowed to, then allow data interaction.
14. the block chain data interaction device of changeable common recognition algorithm according to claim 8, which is characterized in that also wrap It includes:
Access control reinforces module, checks that the access authority of user is initiated in data interaction request, passes through if checking, execute reception The data interaction request.
15. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes the described in any item methods of claim 1 to 7 when executing described program The step of.
16. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of claim 1 to 7 described in any item methods are realized when processor executes.
CN201910669873.4A 2019-07-24 2019-07-24 The block chain data interactive method and device of changeable common recognition algorithm Pending CN110365695A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910669873.4A CN110365695A (en) 2019-07-24 2019-07-24 The block chain data interactive method and device of changeable common recognition algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910669873.4A CN110365695A (en) 2019-07-24 2019-07-24 The block chain data interactive method and device of changeable common recognition algorithm

Publications (1)

Publication Number Publication Date
CN110365695A true CN110365695A (en) 2019-10-22

Family

ID=68220181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910669873.4A Pending CN110365695A (en) 2019-07-24 2019-07-24 The block chain data interactive method and device of changeable common recognition algorithm

Country Status (1)

Country Link
CN (1) CN110365695A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111461887A (en) * 2020-04-01 2020-07-28 杭州溪塔科技有限公司 Block chain consensus processing method and device and electronic equipment
CN111585985A (en) * 2020-04-24 2020-08-25 广东职业技术学院 Business identity recognition and authentication method and system based on block chain
CN111737350A (en) * 2020-06-19 2020-10-02 清华大学 Consensus mechanism selection method and device based on distributed system
CN111866086A (en) * 2020-06-28 2020-10-30 青岛万民科技有限公司 Block chain control method and system based on cloud edge
CN111861469A (en) * 2020-07-27 2020-10-30 北京金山云网络技术有限公司 Processing method and device for consensus mechanism in block chain and electronic equipment
CN111988202A (en) * 2020-09-03 2020-11-24 深圳壹账通智能科技有限公司 Node switching method, device and storage medium
CN112068900A (en) * 2020-09-09 2020-12-11 上海万向区块链股份公司 Hot plug switching system for BFT consensus algorithm
CN112187913A (en) * 2020-09-24 2021-01-05 普华云创科技(北京)有限公司 Method and system for realizing consensus based on intelligent contract
CN112446050A (en) * 2021-02-01 2021-03-05 腾讯科技(深圳)有限公司 Business data processing method and device applied to block chain system
CN112486518A (en) * 2020-12-01 2021-03-12 北京微芯区块链与边缘计算研究院 Consensus algorithm assembling method and device
CN112564960A (en) * 2020-12-01 2021-03-26 浙商银行股份有限公司 Elastic adjustment consensus method and device based on block link point centrality
CN112804351A (en) * 2021-03-05 2021-05-14 中国工商银行股份有限公司 Flow control method, device, node, medium and product of block chain system
CN112907082A (en) * 2021-02-23 2021-06-04 上海腾天节能技术有限公司 Block chain consensus algorithm evaluation optimization method
CN112910950A (en) * 2021-01-13 2021-06-04 杭州趣链科技有限公司 Uplink method and device for data to be uplink and block link point equipment
CN113177080A (en) * 2021-05-14 2021-07-27 北京邮电大学 Block chain consensus engine system and block chain consensus processing flow method
CN113438204A (en) * 2021-05-06 2021-09-24 中国地质大学(武汉) Multi-node cooperative identification response method based on block chain
CN113572140A (en) * 2021-07-15 2021-10-29 国网上海市电力公司 Distribution network fault isolation instruction transmission method and equipment based on variable consensus mechanism
CN113783947A (en) * 2021-08-26 2021-12-10 浙商银行股份有限公司 Adaptive block link point fault tolerance improving method, equipment and storage medium
WO2022027530A1 (en) * 2020-08-05 2022-02-10 西安电子科技大学 Blockchain-based high-performance tamper-proof database construction method
CN114090306A (en) * 2022-01-21 2022-02-25 安徽中科晶格技术有限公司 Pluggable block chain layered consensus method, system, device and storage medium
CN114296831A (en) * 2021-12-30 2022-04-08 迅鳐成都科技有限公司 Dynamic loading method, device and system for block chain consensus algorithm and storage medium
CN114499880A (en) * 2022-01-20 2022-05-13 中国联合重型燃气轮机技术有限公司 Method and device for transmitting operation and maintenance data of gas turbine
CN115276999A (en) * 2022-06-10 2022-11-01 大连理工大学 Self-adaptive switching efficient fault-tolerant consensus method based on trust model
CN116055308A (en) * 2023-02-10 2023-05-02 青岛闪收付信息技术有限公司 Bottom layer blockchain network deployment method and device of supply chain financial platform
CN117336296A (en) * 2023-12-01 2024-01-02 太极计算机股份有限公司 Intelligent selection method for cluster consensus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107360248A (en) * 2017-07-31 2017-11-17 众安信息技术服务有限公司 For configuring the method and apparatus locally known together and computer-readable recording medium
CN107450981A (en) * 2017-05-31 2017-12-08 阿里巴巴集团控股有限公司 A kind of block chain common recognition method and apparatus
US20180113752A1 (en) * 2016-10-20 2018-04-26 International Business Machines Corporation Inter-ledger messaging in a blockchain
CN108848125A (en) * 2018-05-22 2018-11-20 北京京东尚科信息技术有限公司 The method and apparatus and storage medium of common recognition service are provided in block chain
CN109698753A (en) * 2018-12-17 2019-04-30 成都四方伟业软件股份有限公司 Cochain common recognition algorithmic match method and device based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180113752A1 (en) * 2016-10-20 2018-04-26 International Business Machines Corporation Inter-ledger messaging in a blockchain
CN107450981A (en) * 2017-05-31 2017-12-08 阿里巴巴集团控股有限公司 A kind of block chain common recognition method and apparatus
CN107360248A (en) * 2017-07-31 2017-11-17 众安信息技术服务有限公司 For configuring the method and apparatus locally known together and computer-readable recording medium
CN108848125A (en) * 2018-05-22 2018-11-20 北京京东尚科信息技术有限公司 The method and apparatus and storage medium of common recognition service are provided in block chain
CN109698753A (en) * 2018-12-17 2019-04-30 成都四方伟业软件股份有限公司 Cochain common recognition algorithmic match method and device based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴大器等: "《2016年上海国际金融中心建设蓝皮书》", 31 December 2016, pages: 187 *

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111461887A (en) * 2020-04-01 2020-07-28 杭州溪塔科技有限公司 Block chain consensus processing method and device and electronic equipment
CN111585985A (en) * 2020-04-24 2020-08-25 广东职业技术学院 Business identity recognition and authentication method and system based on block chain
CN111585985B (en) * 2020-04-24 2022-07-12 广东职业技术学院 Business identity recognition and authentication method and system based on block chain
CN111737350A (en) * 2020-06-19 2020-10-02 清华大学 Consensus mechanism selection method and device based on distributed system
CN111866086A (en) * 2020-06-28 2020-10-30 青岛万民科技有限公司 Block chain control method and system based on cloud edge
CN111866086B (en) * 2020-06-28 2022-04-22 青岛万民科技有限公司 Block chain control method and system based on cloud edge
CN111861469A (en) * 2020-07-27 2020-10-30 北京金山云网络技术有限公司 Processing method and device for consensus mechanism in block chain and electronic equipment
WO2022027530A1 (en) * 2020-08-05 2022-02-10 西安电子科技大学 Blockchain-based high-performance tamper-proof database construction method
CN111988202A (en) * 2020-09-03 2020-11-24 深圳壹账通智能科技有限公司 Node switching method, device and storage medium
CN111988202B (en) * 2020-09-03 2022-05-03 深圳壹账通智能科技有限公司 Node switching method, device and storage medium
CN112068900A (en) * 2020-09-09 2020-12-11 上海万向区块链股份公司 Hot plug switching system for BFT consensus algorithm
CN112187913A (en) * 2020-09-24 2021-01-05 普华云创科技(北京)有限公司 Method and system for realizing consensus based on intelligent contract
CN112486518A (en) * 2020-12-01 2021-03-12 北京微芯区块链与边缘计算研究院 Consensus algorithm assembling method and device
CN112564960A (en) * 2020-12-01 2021-03-26 浙商银行股份有限公司 Elastic adjustment consensus method and device based on block link point centrality
CN112486518B (en) * 2020-12-01 2024-03-12 北京微芯区块链与边缘计算研究院 Consensus algorithm assembling method and device
CN112910950A (en) * 2021-01-13 2021-06-04 杭州趣链科技有限公司 Uplink method and device for data to be uplink and block link point equipment
CN112446050A (en) * 2021-02-01 2021-03-05 腾讯科技(深圳)有限公司 Business data processing method and device applied to block chain system
CN112907082A (en) * 2021-02-23 2021-06-04 上海腾天节能技术有限公司 Block chain consensus algorithm evaluation optimization method
CN112907082B (en) * 2021-02-23 2024-04-09 上海腾天节能技术有限公司 Block chain consensus algorithm evaluation optimization method
CN112804351A (en) * 2021-03-05 2021-05-14 中国工商银行股份有限公司 Flow control method, device, node, medium and product of block chain system
CN113438204B (en) * 2021-05-06 2022-09-23 中国地质大学(武汉) Multi-node cooperative identification response method based on block chain
CN113438204A (en) * 2021-05-06 2021-09-24 中国地质大学(武汉) Multi-node cooperative identification response method based on block chain
CN113177080A (en) * 2021-05-14 2021-07-27 北京邮电大学 Block chain consensus engine system and block chain consensus processing flow method
CN113572140A (en) * 2021-07-15 2021-10-29 国网上海市电力公司 Distribution network fault isolation instruction transmission method and equipment based on variable consensus mechanism
CN113572140B (en) * 2021-07-15 2024-04-12 国网上海市电力公司 Distribution network fault isolation instruction transmission method and equipment based on variable consensus mechanism
CN113783947A (en) * 2021-08-26 2021-12-10 浙商银行股份有限公司 Adaptive block link point fault tolerance improving method, equipment and storage medium
CN113783947B (en) * 2021-08-26 2024-05-31 浙商银行股份有限公司 Adaptive block chain link point fault tolerance lifting method, device and storage medium
CN114296831A (en) * 2021-12-30 2022-04-08 迅鳐成都科技有限公司 Dynamic loading method, device and system for block chain consensus algorithm and storage medium
CN114499880A (en) * 2022-01-20 2022-05-13 中国联合重型燃气轮机技术有限公司 Method and device for transmitting operation and maintenance data of gas turbine
CN114090306B (en) * 2022-01-21 2022-04-19 安徽中科晶格技术有限公司 Pluggable block chain layered consensus method, system, device and storage medium
CN114090306A (en) * 2022-01-21 2022-02-25 安徽中科晶格技术有限公司 Pluggable block chain layered consensus method, system, device and storage medium
CN115276999A (en) * 2022-06-10 2022-11-01 大连理工大学 Self-adaptive switching efficient fault-tolerant consensus method based on trust model
CN115276999B (en) * 2022-06-10 2024-03-22 大连理工大学 Self-adaptive switching efficient fault-tolerant consensus method based on trust model
CN116055308B (en) * 2023-02-10 2024-01-05 青岛闪收付信息技术有限公司 Bottom layer blockchain network deployment method and device of supply chain financial platform
CN116055308A (en) * 2023-02-10 2023-05-02 青岛闪收付信息技术有限公司 Bottom layer blockchain network deployment method and device of supply chain financial platform
CN117336296B (en) * 2023-12-01 2024-03-26 太极计算机股份有限公司 Intelligent selection method for cluster consensus
CN117336296A (en) * 2023-12-01 2024-01-02 太极计算机股份有限公司 Intelligent selection method for cluster consensus

Similar Documents

Publication Publication Date Title
CN110365695A (en) The block chain data interactive method and device of changeable common recognition algorithm
CN113438289B (en) Block chain data processing method and device based on cloud computing
EP3859647B1 (en) Blockchain transaction generation method and device
EP3494685B1 (en) Token based network service among iot applications
CN110992027B (en) Efficient transaction method and device for realizing privacy protection in block chain
US11128437B1 (en) Distributed ledger for peer-to-peer cloud resource sharing
CN109635585A (en) Method, agent node and the medium of Transaction Information are inquired in block chain network
CN111541724B (en) Block chain all-in-one machine and automatic node adding method and device thereof
EP3937458B1 (en) Blockchain integrated stations and automatic node adding methods and apparatuses
CN110336833A (en) Image content common recognition method, server based on block chain
US20170041308A1 (en) Dynamic identity switching
EP3961456B1 (en) Data authorization information acquisition methods, apparatuses, and devices
US20040260946A1 (en) User not present
CN106559389A (en) A kind of Service Source issue, call method, device, system and cloud service platform
CN115987696B (en) Zero trust security gateway implementation method and device based on block chain structure
WO2021035141A1 (en) Blockchain network control system and methods
TWI812366B (en) A data sharing method, device, equipment and storage medium
CN107453872A (en) A kind of unified safety authentication method and system based on Mesos container cloud platforms
CN107846676A (en) Safety communicating method and system based on network section security architecture
EP3070906A1 (en) Multifaceted assertion directory system
CN109802927B (en) Security service providing method and device
CN113704723B (en) Block chain-based digital identity verification method and device and storage medium
Kandil et al. Mobile agents' authentication using a proposed light Kerberos system
US11336438B2 (en) Remote approval and execution of restricted operations
Dunnett et al. A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191022