CN110445852A - Logical card distribution method, equipment and storage medium - Google Patents

Logical card distribution method, equipment and storage medium Download PDF

Info

Publication number
CN110445852A
CN110445852A CN201910687808.4A CN201910687808A CN110445852A CN 110445852 A CN110445852 A CN 110445852A CN 201910687808 A CN201910687808 A CN 201910687808A CN 110445852 A CN110445852 A CN 110445852A
Authority
CN
China
Prior art keywords
node
block
public information
drop
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910687808.4A
Other languages
Chinese (zh)
Other versions
CN110445852B (en
Inventor
李邦柱
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201910687808.4A priority Critical patent/CN110445852B/en
Publication of CN110445852A publication Critical patent/CN110445852A/en
Application granted granted Critical
Publication of CN110445852B publication Critical patent/CN110445852B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The present invention provides the logical card distribution method of one kind, equipment and storage medium, this method comprises: sending the first solicited message for obtaining public information to each block chain node according to the node scan rule of pre-configuration, the public information that each block chain node is generated and returned is received and stored;Wherein, public information includes the address of corresponding node;Go out several drop target nodes according to the air-drop Rules Filtering of each public information, pre-configuration;It generates the air-drop for providing several logical cards to each drop target node to trade, and respectively drops transaction to each block chain node broadcasts.The present invention enhances the robustness of public chain by motivating user to dispose public chain node to the method for disposing the logical card of public chain node granting.

Description

Logical card distribution method, equipment and storage medium
Technical field
This application involves block chain technical fields, and in particular to the logical card distribution method of one kind, equipment and storage medium.
Background technique
For public chain, node is more, and the operation and maintenance of public chain are more stable;Public chain link is disposed for excitation more users Point, public chain operator usually periodically provide logical card to the public key address of user;Current public affairs chain operator is as follows using generalling use The logical card of method granting: receiving the public key address that user terminal is actively submitted, and plays coin to the public key address batch being collected into.
Above-mentioned mechanism not can guarantee the operation and maintenance that the corresponding user terminal in public key address is really used as node to participate in public chain.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, it is intended to provide a kind of logical card of public chain node of excitation user deployment Distribution method, equipment and storage medium.
In a first aspect, the present invention provides a kind of logical card distribution method, comprising:
The first solicited message for obtaining public information is sent to each block chain node according to the node scan rule of pre-configuration, Receive and store the public information that each block chain node is generated and returned;Wherein, public information includes the address of corresponding node;
Go out several drop target nodes according to the air-drop Rules Filtering of each public information, pre-configuration;
It generates the air-drop for providing several logical cards to each drop target node to trade, and is respectively dropped to each block chain node broadcasts Transaction.
Second aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention The logical card distribution method that embodiment provides.
The third aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count Calculation machine executes the logical card distribution method that each embodiment provides according to the present invention.
Logical card distribution method, equipment and the storage medium that many embodiments of the present invention provide pass through the node according to pre-configuration Scanning rule sends the first solicited message for obtaining public information to each block chain node, and it is raw to receive and store each block chain node At and return public information;Wherein, public information includes the address of corresponding node;According to each public information, the sky of pre-configuration It throws Rules Filtering and goes out several drop target nodes;The air-drop for providing several logical cards to each drop target node is generated to trade, and to The method that each block chain node broadcasts respectively drop transaction, excitation user dispose public chain node, enhance the robustness of public chain.
Logical card distribution method, equipment and the storage medium that some embodiments of the invention provide are further by having returned to public affairs The checking solicited message of the first block of fourth node request of information is opened, for the first of fourth node the first block of return Block data;Wherein, the first block height of the first block has synchronized block height no more than fourth node;Verify Section four Whether point returns the first block data of correct first block: it is no, then not to the method for the logical card of fourth node granting, into one The public chain node of step excitation user's deployment correctly participates in the construction and maintenance of public chain, enhances the robustness of public chain.
Logical card distribution method, equipment and the storage medium that some embodiments of the invention provide are further by when the first block Data are identical as the second block data, have synchronized block height and provided the positively related method of quantity of logical card, have further motivated The public chain node of user's deployment correctly participates in the construction and maintenance of public chain, enhances the robustness of public chain.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is a kind of flow chart for logical card distribution method that one embodiment of the invention provides.
Fig. 2 is the flow chart of step S12 in a kind of preferred embodiment of method shown in Fig. 1.
Fig. 3 is the flow chart of step S14 in a kind of preferred embodiment of method shown in Fig. 1.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
Fig. 5 is the flow chart of step S14 in a kind of preferred embodiment of method shown in Fig. 4.
Fig. 6 is the flow chart of step S18 in a kind of preferred embodiment of method shown in Fig. 4.
Fig. 7 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is a kind of flow chart for logical card distribution method that one embodiment of the invention provides.As shown in Figure 1, in this implementation In example, the present invention provides a kind of logical card distribution method, comprising:
S12: the first request for obtaining public information is sent to each block chain node according to the node scan rule of pre-configuration Information receives and stores the public information that each block chain node is generated and returned;Wherein, public information includes the ground of corresponding node Location;
S14: several drop target nodes are gone out according to the air-drop Rules Filtering of each public information, pre-configuration;
S16: it generates the air-drop that several logical cards are provided to each drop target node and trades, and is each to each block chain node broadcasts Air-drop transaction.
Specifically, using public information as the address of corresponding node;The node scan rule of pre-configuration is that daily zero hour is opened Begin scanning, and only run-down;The air-drop rule of pre-configuration is and right for using all nodes scanned as drop target node For the logical card quantity of each drop target node granting is consistent;Assuming that being currently zero hour on January 1st, 2000;
In step s 12, lead to card issue server to be sent according to the node scan rule of pre-configuration to each block chain node The first solicited message for obtaining public information, receives and stores the public information that each block chain node is generated and returned;Due to pre- The node scan rule of configuration starts to scan for daily zero hour, and only run-down, therefore logical card issue server is according to each Block chain node sends the first solicited message for obtaining address, receives and stores the corresponding section that each block chain node is generated and returned The address of point;
In step S14, logical card issue server goes out several skies according to the air-drop Rules Filtering of each public information, pre-configuration Throw destination node;Since the air-drop rule of pre-configuration is drops all nodes scanned, and to each drop target The logical card quantity of node granting is consistent, therefore logical card issue server screens each node of the address of the corresponding node scanned For drop target node;
In step s 16, lead to card issue server to generate to the logical card consistent air-drop of quantity of each drop target node granting Transaction, and transaction is respectively dropped to each block chain node broadcasts.
Above-described embodiment is using public information as the address of corresponding node;The node scan rule of pre-configuration is daily zero hour Start to scan, and only run-down;The air-drop rule of pre-configuration for using all nodes scanned as drop target node, and Logical card distribution method provided by the invention is done for consistent to the logical card quantity of each drop target node granting exemplary Elaboration.
In more embodiments, the public key information that public information can be configured to corresponding node according to actual needs can be realized Identical technical effect.
In more embodiments, the node scan rule of pre-configuration can configure different scanning weeks according to actual needs Phase, for example, once scan round process always after scanning, or several durations being configured to after terminating scanning are laggard Row scanning (such as being scanned after terminating 2 hours after scanning) is, it can be achieved that identical technical effect.
In more embodiments, the air-drop rule of pre-configuration can also be configured to scan all according to actual needs Several nodes in node are as drop target node, such as randomly select from all nodes scanned 50% node and make To drop node;The air-drop rule of pre-configuration can also be configured to send for different drop target nodes according to actual needs Logical card quantity it is different, such as obtain drop target node synchronize block elevation information, configuration synchronized block height and The quantity for providing logical card is positively correlated, it can be achieved that identical technical effect.
For above-described embodiment by motivating user to dispose public chain node to the method for disposing the logical card of public chain node granting, enhancing is public The robustness of chain.
Fig. 2 is the flow chart of step S12 in a kind of preferred embodiment of method shown in Fig. 1.As shown in Fig. 2, excellent one It selects in embodiment, step S12 includes:
S122: it is sent according to the node scan rule of pre-configuration to each first node for being connected and obtains public information and the First solicited message of the IP address list for each second node that one node is connected, so that each first node generates disclosure respectively Information and IP address list simultaneously return;
S124: public information and IP address list that each first node is generated and returned are received;
S126: judge whether that the third section of not sent first solicited message is arrived in scanning according to each received IP address list Point: being, then sends the first solicited message to third node, so that third node generates public information and IP address list and returns It returns;Circulation current procedures are until be judged as NO.
Specifically, it is assumed that each section that the first node that logical card issue server is connected only has node A, node A to be connected Point is node B, node C, node D, and each node that node B is connected is node A and node C, and each node that node C is connected is Node A and node B, the node that node D is connected are node A;
The public information of node A is addr (A), the IP address list of each second node that node A is connected be IP_B, IP_C,IP_D;
The public information of node B is addr (B), the IP address list of each second node that node B is connected be IP_A, IP_C;
The public information of node C is addr (C), the IP address list of each second node that node C is connected be IP_A, IP_B;
The public information of node D is addr (D), and the IP address list for each second node that node D is connected is IP_A;
In step S122, leads to card issue server according to the node scan rule of pre-configuration and send acquisition public affairs to node A It opens information and the first solicited message of the IP address list of each second node that node A is connected, node A generates public information Addr (A) and IP address list IP_B, IP_C, IP_D are simultaneously returned;
In step S124, addr (A) and IP address list that logical card issue server receiving node A is generated and returned IP_B,IP_C,IP_D;
In step S126, logical card issue server is according to received IP address list IP_B, IP_C, IP_D judgement of institute The third node of not sent first solicited message is arrived in no scanning:
Since the node that logical card issue server is connected is node A, leads to card issue server and locally only have IP_A, receive To IP address list in IP address be IP_B, IP_C, IP_D, therefore scan arrive not sent first solicited message node (node B, node C, node D);Logical card issue server sends the first solicited message to node B, node C, node D, and node B is raw At and return to public information addr (B) and IP address list IP_A, IP_C, node C generate and return public information addr (C) and IP address list IP_A, IP_B, node D are generated and are returned to public information addr (D) and IP address list IP_A;
Due to logical card issue server local existing IP_A, IP_B, IP_C, IP_D, in the IP address list received IP address is IP_A, IP_B, IP_C, IP_D, therefore does not scan the node of not sent first solicited message, and circulation terminates.
In more embodiments, if the IP address list and open letter of the node that logical card issue server storage is connected Breath, the above method are configurable to:
It is sent according to the node scan rule of pre-configuration to each first node connected and obtains what first node was connected First solicited message of the IP address list for each second node that the public information and first node of each second node are connected, with It generates the public information of each second node connected respectively for each first node and IP address list and returns;
Receive public information and IP address list that each first node is generated and returned;
Judge whether scanning to not sent first solicited message according to each received public information or IP address list Third node: being, then the first solicited message is sent to third node, so that third node generates public information and IP address respectively List simultaneously returns;Circulation current procedures are until be judged as NO.
Specifically, lead to card issue server and acquisition company, node A institute is sent to node A according to the node scan rule of pre-configuration First solicited message of the IP address list for each second node that the public information and node A of each second node connect are connected, Node A generation public information addr (B), addr (C), addr (D) and IP address list IP_B, IP_C, IP_D are simultaneously returned;
Addr (B), addr (C), addr (D) and the IP address column that logical card issue server receiving node A is generated and returned Table I P_B, IP_C, IP_D;
Logical card issue server is according to the received public information addr (B) of institute, addr (C), addr (D) or IP address list IP_B, IP_C, IP_D judge whether that the third node of not sent first solicited message is arrived in scanning:
Since the node that logical card issue server is connected is node A, only IP_A is locally stored in logical card issue server And addr (A);Since existing embodiment is illustrated the principle for using IP address list to be judged, only illustrates and use herein Public address is judged:
The public information that logical card issue server receives is addr (B), addr (C), addr (D), therefore is scanned to not Send the node (node B, node C, node D) of the first solicited message;Logical card issue server is sent out to node B, node C, node D The first solicited message is sent, node B generates and return public information addr (A), addr (C) and IP address list IP_A, IP_C, section Point C generates and returns public information addr (A), addr (B) and IP address list IP_A, IP_B, and node D is generated and returned to disclosure Information addr (A) and IP address list IP_A;
Since logical card issue server locally has addr (A), addr (B), addr (C), addr (D), the IP received IP address in address list is addr (A), addr (B), addr (C), addr (D), therefore does not scan not sent first and ask The node of information is sought, circulation terminates.
In more embodiments, if node generates and broadcasts the friendship of the IP address including this section point when block chain is added Easily, the IP address of each block chain node is recorded on block chain, the above method is configurable to:
The corresponding node of each IP address recorded according to the node scan rule of pre-configuration on block chain, which is sent, obtains public affairs The first solicited message of information is opened, so that each node generates respectively and return public information and returns.
Specifically, the IP address recorded on block chain is IP_A, IP_B, IP_C, IP_D;
Notify issue server according to the node scan rule of pre-configuration to the corresponding node of IP_A, IP_B, IP_C, IP_D The first solicited message for obtaining public information is sent, the corresponding node A of IP_A generates public information addr (A), and IP_B pairs The node B answered generates public information addr (B), and the corresponding node C of IP_C generates public information addr (C), IP_D Corresponding node D generates public information addr (D).
Fig. 3 is the flow chart of step S14 in a kind of preferred embodiment of method shown in Fig. 1.As shown in figure 3, excellent one It selects in embodiment, public information includes the public key information of corresponding node, and step S14 includes:
S142: corresponding address is generated according to the public key information of each block chain node;
S144: several drop target nodes are gone out according to the air-drop Rules Filtering of each address, pre-configuration.
Fig. 4 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.As shown in figure 4, in a preferred embodiment In, public information further includes that corresponding node has synchronized block height, the above method further include:
S17: to the checking solicited message for the first block of fourth node request for having returned to public information, for the 4th Node returns to the first block data of the first block;Wherein, the first block height of the first block has been not more than fourth node Synchronous block height;
S18: whether verifying fourth node returns the first block data of correct first block:
It is no, then follow the steps S19: not to the logical card of fourth node granting.
Specifically, the first block height of the first block has synchronized block height no more than fourth node, with the firstth area For block number evidence is the block Hash of the first block, it is assumed that fourth node is node B, and the first block is block (100_B);
In step S17, logical card issue server obtains block (100_B) to the Node B requests for having returned to public information Checking solicited message, node B return block (100_B) the first block data hash (100_B);
In step S18: whether logical card issue server verifying node B returns correct hash (100_B):
It is no, it thens follow the steps S19: not providing logical card to node B.
In more embodiments, the first block data can be additionally configured to the other parameters for identifying the first block, Such as the block ID of the first block is configured to, it can be achieved that identical technical effect.
Above-described embodiment passes through the correctness of comparison block data, not to the public chain node for possessing incorrect block data The method for providing logical card further motivates the public chain node of user's deployment correctly to participate in the construction and maintenance of public chain, increases The robustness of Qiang Gonglian.
Fig. 5 is the flow chart of step S14 in a kind of preferred embodiment of method shown in Fig. 4.As shown in figure 5, excellent one It selects in embodiment, step S14 includes:
S146: according to each block chain node, corresponding to have synchronized block height, the air-drop Rules Filtering of pre-configuration several out Drop target node.
Specifically, it is assumed that the air-drop rule of pre-configuration is sieved will to have synchronized the node scanned of the block height greater than 1000 It is selected as drop target node;Node A, node B, node C the block height that synchronized be 1001, node D synchronize block high Degree is 500;
In step S146, since the block height that synchronized of node A, node B, node C are 1001, node D together Walking block height is 500, and the air-drop rule of pre-configuration is screened will to have synchronized the node scanned of the block height greater than 1000 For drop target node, therefore block height, the air-drop rule of pre-configuration have been synchronized according to each block chain node is corresponding Several drop target nodes are filtered out, drop target node is node A, node B, node C.
In more embodiments, will can also synchronize block level configurations according to actual needs is other integers, for example, 500,2000;Or block level configurations will have been synchronized as the percentage of the highest block height through knowing together and rounded up, for example, Highest block height is 1001, configures 80% for percentage, then having synchronized block altimeter and having calculated is 801;Or by synchronization zone Block level configurations are the percentage of the highest block height through knowing together and round up, for example, highest block height is 1001, it will Percentage is configured to 80%, then has synchronized block altimeter and calculated as 800, it can be achieved that identical technical effect.
Fig. 6 is the flow chart of step S18 in a kind of preferred embodiment of method shown in Fig. 4.As shown in fig. 6, excellent one It selects in embodiment, step S18 includes:
S182: Xiang Ruogan the 5th node request and the verifying of identical second block of block height of the first block are asked Information is sought, so that each 5th node returns to the second block data of the second block;
S184: the second block data that each 5th node returns is received, and is known together to each second block data;
S186: it is according to the first block data and the first block data of whether identical verifying of the second block data through knowing together It is no correct.
Specifically, it is assumed that several 5th nodes are respectively node A, node C, node D, and node A, node C, node D are returned The second block the second block data it is identical;
In step S182, lead to card issue server to node A, node C, node D request and the first block area The checking solicited message of identical second block of block height, node A return to hash (100_A), and node C returns to hash (100_C), Node D returns to hash (100_D);
In step S184, leads to card issue server and receive hash (100_A), hash (100_C), hash (100_D), and It knows together to hash (100_A), hash (100_C), hash (100_D);
In step S186, it is assumed that the second block data through knowing together is hash (100) ' (hash (100) ' and hash (100_A), hash (100_C), hash (100_D) are identical) lead to card issue server according to hash (100_B) and hash (100) ' Whether whether the first block data of identical verifying is correct.
In more embodiments, other nodes can be configured by several 5th nodes, for example, it is configured to node A, it can be real Existing identical technical effect.
In more embodiments, due to configuring the 5th node to the mechanism of fixed node, it be easy to cause the 5th node It is attacked, if the 5th node is attacked, the block data of the 5th node is the block data forged, and leading to card issue server will It is logical to demonstrate,prove the node for being issued to block data identical with the block data for possessing forgery, logical card can not be issued to correct participation To the node in the construction and maintenance of public chain;It is asked at random to several 5th nodes in view of the above-mentioned problems, step S182 is configured that Ask the checking solicited message for obtaining identical second block with the block of the first block height, it can be achieved that identical technical effect.
In more embodiments, since block chain node has going after profit or gain property, different blocks chain node is closed since interests are conspired The node of scheme will forge block data jointly;If having more node in randomly selected several 5th nodes is the section conspired Point, then can not be by the logical node demonstrate,proved and be issued in the construction and maintenance for correctly participating in public chain.In view of the above-mentioned problems, by the 5th Node is the node of official's configuration, and the block data of the node of official's configuration is genuine block data, while by step S182 is configured that the checking request to identical second block of the block of several 5th node requests and the first block height Letter is, it can be achieved that identical technical effect.
In a preferred embodiment, when the first block data is identical as the second block data, block height and hair have been synchronized The quantity for putting logical card is positively correlated.
The public chain node that above-described embodiment further motivates user to dispose correctly participates in the construction and maintenance of public chain, Enhance the robustness of public chain.
Fig. 7 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in fig. 7, present invention also provides a kind of equipment 700, including one or more centres as on the other hand Unit (CPU) 701 is managed, can be added according to the program being stored in read-only memory (ROM) 702 or from storage section 708 The program that is downloaded in random access storage device (RAM) 703 and execute various movements appropriate and processing.In RAM703, also deposit It contains equipment 700 and operates required various programs and data.CPU701, ROM702 and RAM703 pass through the phase each other of bus 704 Even.Input/output (I/O) interface 705 is also connected to bus 704.
I/O interface 705 is connected to lower component: the importation 706 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 707 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 708 including hard disk etc.; And the communications portion 709 of the network interface card including LAN card, modem etc..Communications portion 709 via such as because The network of spy's net executes communication process.Driver 710 is also connected to I/O interface 705 as needed.Detachable media 711, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 710, in order to read from thereon Computer program be mounted into storage section 708 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the logical card distribution method of any of the above-described embodiment description can be implemented For computer software programs.For example, embodiment of the disclosure includes a kind of computer program product comprising be tangibly embodied in Computer program on machine readable media, the computer program include the program code for executing logical card distribution method. In such embodiments, which can be downloaded and installed from network by communications portion 709, and/or from Detachable media 711 is mounted.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should Program is used to execute the logical card distribution method for being described in the application by one or more than one processor.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can To be the software program being arranged in computer or intelligent movable equipment, it is also possible to the hardware device being separately configured.Wherein, this The title of a little units or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions Technical characteristic replaced mutually and the technical solution that is formed.

Claims (9)

1. the logical card distribution method of one kind, which is characterized in that be suitable for logical card issue server, comprising:
The first solicited message for obtaining public information is sent to each block chain node according to the node scan rule of pre-configuration, is received And store the public information that each block chain node is generated and returned;Wherein, the public information includes the ground of corresponding node Location;
Go out several drop target nodes according to the air-drop Rules Filtering of each public information, pre-configuration;
It generates the air-drop for providing several logical cards to each drop target node to trade, and each to each block chain node broadcasts The air-drop transaction.
2. the method according to claim 1, wherein the node scan rule according to pre-configuration is to each block Chain node sends the first solicited message for obtaining public information, receives and stores the public affairs that each block chain node is generated and returned Opening information includes:
It is sent according to the node scan rule of pre-configuration to each first node connected and obtains public information and the first segment First solicited message of the IP address list for each second node that point is connected, so that each first node generates disclosure respectively Information and IP address list simultaneously return;
Receive public information and IP address list that each first node is generated and returned;
Judge whether that the third node of not sent first solicited message is arrived in scanning according to each received IP address list: It is then to send first solicited message to the third node, so that the third node generates public information and IP address List simultaneously returns;Circulation current procedures are until be judged as NO.
3. method according to claim 1 or 2, which is characterized in that the public information includes the public key letter of corresponding node Breath, the air-drop Rules Filtering according to each public information, pre-configuration go out several drop target nodes and include:
Corresponding address is generated according to the public key information of each block chain node;
Go out several drop target nodes according to the air-drop Rules Filtering of each address, pre-configuration.
4. method according to claim 1 or 2, which is characterized in that the public information further include corresponding node together Block height is walked, the method also includes:
To the checking solicited message for the first block of fourth node request for having returned to public information, for the fourth node Return to the first block data of first block;Wherein, the first block height of first block is not more than the described 4th Node has synchronized block height;
Verify the first the block data whether fourth node returns correct first block:
It is no, then not to the logical card of the fourth node granting.
5. according to the method described in claim 4, it is characterized in that, described according to each public information, the air-drop of pre-configuration Rules Filtering goes out several drop target nodes
According to each block chain node it is corresponding synchronized block height, the air-drop Rules Filtering of pre-configuration goes out several air-drop mesh Mark node.
6. according to the method described in claim 4, it is characterized in that, whether the verifying fourth node returns correctly First block data of first block includes:
Believe to the checking request of identical second block of the block of several 5th node requests and first block height Breath, so that each 5th node returns to the second block data of second block;
Second block data that each 5th node returns is received, and is known together to each second block data;
According to first block data verifying first block counts whether identical as second block data through knowing together According to whether correct.
7. according to the method described in claim 6, it is characterized in that, when first block data and second block data Identical, the quantity for having synchronized block height and having provided logical card is positively correlated.
8. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors Execute such as method of any of claims 1-7.
9. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed Benefit requires method described in any one of 1-7.
CN201910687808.4A 2019-07-29 2019-07-29 Method, device and storage medium for issuing general certificate Active CN110445852B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910687808.4A CN110445852B (en) 2019-07-29 2019-07-29 Method, device and storage medium for issuing general certificate

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910687808.4A CN110445852B (en) 2019-07-29 2019-07-29 Method, device and storage medium for issuing general certificate

Publications (2)

Publication Number Publication Date
CN110445852A true CN110445852A (en) 2019-11-12
CN110445852B CN110445852B (en) 2021-12-10

Family

ID=68431936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910687808.4A Active CN110445852B (en) 2019-07-29 2019-07-29 Method, device and storage medium for issuing general certificate

Country Status (1)

Country Link
CN (1) CN110445852B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112055077A (en) * 2020-09-02 2020-12-08 杭州复杂美科技有限公司 Block link access method, device and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418876A (en) * 2018-02-09 2018-08-17 北京众享比特科技有限公司 Store proof of work method and system, motivational techniques and system
CN108470277A (en) * 2018-02-28 2018-08-31 深圳市网心科技有限公司 Reward settlement method, system, readable storage medium storing program for executing and the computing device of block chain
CN108985774A (en) * 2018-07-18 2018-12-11 百度在线网络技术(北京)有限公司 A kind of motivational techniques, device, equipment and the storage medium of block chain network
CN109003003A (en) * 2018-09-03 2018-12-14 夸克链科技(深圳)有限公司 A kind of work quantity algorithm difficulty stacking method
CN109034756A (en) * 2018-06-14 2018-12-18 胡晓东 Block chain digital asset distributing method and relevant apparatus based on random number
CN109087111A (en) * 2018-08-31 2018-12-25 深圳付贝科技有限公司 Common recognition verification method, digging mine machine and block catenary system based on block chain
WO2019021106A1 (en) * 2017-07-24 2019-01-31 nChain Holdings Limited Computer-Implemented System and Method Enabling Secure Storage of a Large Blockchain Over a Plurality of Storage Nodes
CN109934710A (en) * 2018-11-08 2019-06-25 杭州基尔区块链科技有限公司 The intelligent common recognition mechanism suitable for intellectual property alliance chain based on bilateral card
CN110011974A (en) * 2019-03-07 2019-07-12 深圳市融汇通金科技有限公司 Bookkeeping methods, device, terminal and the computer readable storage medium of block chain
CN110060160A (en) * 2019-03-20 2019-07-26 湖南天河国云科技有限公司 A kind of block reward distribution method, system and computer readable storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019021106A1 (en) * 2017-07-24 2019-01-31 nChain Holdings Limited Computer-Implemented System and Method Enabling Secure Storage of a Large Blockchain Over a Plurality of Storage Nodes
CN108418876A (en) * 2018-02-09 2018-08-17 北京众享比特科技有限公司 Store proof of work method and system, motivational techniques and system
CN108470277A (en) * 2018-02-28 2018-08-31 深圳市网心科技有限公司 Reward settlement method, system, readable storage medium storing program for executing and the computing device of block chain
CN109034756A (en) * 2018-06-14 2018-12-18 胡晓东 Block chain digital asset distributing method and relevant apparatus based on random number
CN108985774A (en) * 2018-07-18 2018-12-11 百度在线网络技术(北京)有限公司 A kind of motivational techniques, device, equipment and the storage medium of block chain network
CN109087111A (en) * 2018-08-31 2018-12-25 深圳付贝科技有限公司 Common recognition verification method, digging mine machine and block catenary system based on block chain
CN109003003A (en) * 2018-09-03 2018-12-14 夸克链科技(深圳)有限公司 A kind of work quantity algorithm difficulty stacking method
CN109934710A (en) * 2018-11-08 2019-06-25 杭州基尔区块链科技有限公司 The intelligent common recognition mechanism suitable for intellectual property alliance chain based on bilateral card
CN110011974A (en) * 2019-03-07 2019-07-12 深圳市融汇通金科技有限公司 Bookkeeping methods, device, terminal and the computer readable storage medium of block chain
CN110060160A (en) * 2019-03-20 2019-07-26 湖南天河国云科技有限公司 A kind of block reward distribution method, system and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112055077A (en) * 2020-09-02 2020-12-08 杭州复杂美科技有限公司 Block link access method, device and storage medium
CN112055077B (en) * 2020-09-02 2023-04-18 杭州复杂美科技有限公司 Block link access method, device and storage medium

Also Published As

Publication number Publication date
CN110445852B (en) 2021-12-10

Similar Documents

Publication Publication Date Title
CN110197285B (en) Block chain-based safe cooperation deep learning method and device
CN110868441B (en) Block chain public link maintenance method and device, node and block chain public link
CN106485167B (en) Credit recording system and method based on block chain
Phillips et al. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites
CN109242484A (en) A kind of common recognition motivational techniques of block chain
CN110046480A (en) Works copyright distribution method and device based on block chain
EP3655905B1 (en) Distributed ledger technology
CN109543075A (en) Block generation method and system
CN109951474B (en) Method for realizing block chain common identification block
CN109583903A (en) Block confirmation method, equipment and storage medium
CN109219940A (en) Privately owned node, the processing method in privately owned node and the program for it
CN109982435A (en) Frequency spectrum access and management method based on block chain
CN109360091A (en) A kind of arbitrary object choosing method and device based on block chain
CN111325581B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN101711470A (en) A system and method for creating a list of shared information on a peer-to-peer network
CN110009338A (en) Bookkeeping methods and device, electronic equipment based on block chain
CN112737782B (en) Method and apparatus for providing cross-chain messages
CN109857936A (en) A kind of big data collection analysis and service system
CN110139120A (en) Information display method, device, electronic equipment and computer readable storage medium
CN112418859B (en) Block chain consensus method and device, electronic equipment and readable storage medium
CN109376187A (en) A kind of querying method and device based on block chain
CN110348911A (en) Advertisement placement method, apparatus and system
CN110009439A (en) A kind of taxi operational know-how and device based on block chain
CN110445852A (en) Logical card distribution method, equipment and storage medium
KR102366233B1 (en) Mobile phone inventory management system supporting mobile phone retail business of seller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20191112

Assignee: Hangzhou DUOLIAN Technology Co.,Ltd.

Assignor: HANGZHOU FUZAMEI TECHNOLOGY Co.,Ltd.

Contract record no.: X2022330000090

Denomination of invention: Pass issuing method, equipment and storage medium

Granted publication date: 20211210

License type: Common License

Record date: 20220516

Application publication date: 20191112

Assignee: Hangzhou left chain Technology Co.,Ltd.

Assignor: HANGZHOU FUZAMEI TECHNOLOGY Co.,Ltd.

Contract record no.: X2022330000092

Denomination of invention: Pass issuing method, equipment and storage medium

Granted publication date: 20211210

License type: Common License

Record date: 20220516

Application publication date: 20191112

Assignee: Hangzhou Kulian Technology Co.,Ltd.

Assignor: HANGZHOU FUZAMEI TECHNOLOGY Co.,Ltd.

Contract record no.: X2022330000091

Denomination of invention: Pass issuing method, equipment and storage medium

Granted publication date: 20211210

License type: Common License

Record date: 20220516

EE01 Entry into force of recordation of patent licensing contract