CN111612466A - Consensus and resource transmission method, device and storage medium - Google Patents

Consensus and resource transmission method, device and storage medium Download PDF

Info

Publication number
CN111612466A
CN111612466A CN202010551115.5A CN202010551115A CN111612466A CN 111612466 A CN111612466 A CN 111612466A CN 202010551115 A CN202010551115 A CN 202010551115A CN 111612466 A CN111612466 A CN 111612466A
Authority
CN
China
Prior art keywords
network
transaction
node
hash value
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010551115.5A
Other languages
Chinese (zh)
Other versions
CN111612466B (en
Inventor
古莹莹
江漫滔
肖世校
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Tanhong Information Technology Co ltd
Original Assignee
Xiamen Tanhong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=72197110&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN111612466(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Xiamen Tanhong Information Technology Co ltd filed Critical Xiamen Tanhong Information Technology Co ltd
Priority to CN202210061763.1A priority Critical patent/CN114418574A/en
Publication of CN111612466A publication Critical patent/CN111612466A/en
Priority to PCT/CN2021/093096 priority patent/WO2021254029A1/en
Application granted granted Critical
Publication of CN111612466B publication Critical patent/CN111612466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Abstract

The invention discloses a consensus and resource transmission method, a device and a storage medium, belonging to the technical field of data sharing. Analyzing and verifying more than one first transaction passing the verification, judging whether the first transaction is a transaction containing a node request for joining, if so, receiving a response message of the node requesting for joining according to a first transaction content at least comprising a consensus method required by the node requesting for joining and the identity of the node requesting for joining, judging whether the node requesting for joining agrees, and if so, distributing the first transaction and a transaction packaging uplink comprising the node requesting for joining to a first network; if not, the first transaction and the transaction packaging uplink comprising the node which requests to join are refused to be distributed to the first network; and if the first transaction is not a transaction containing the node request for joining, packaging and linking the first transaction. The technical problems of multiple activities in different places and data conflict can be solved during resource transmission.

Description

Consensus and resource transmission method, device and storage medium
Technical Field
The present invention relates to the field of data sharing technologies, and in particular, to a consensus and resource transmission method, device, and storage medium.
Background
In order to promote social progress and improve the knowledge level of people, the state establishes advanced education institutions, opens various network teaching platforms, vigorously supports various education and teaching institutions, encourages the development of resource providers of professional technical websites and other types, expands the knowledge area of people and improves the skills of people. Resources of different education platforms and education institutions have characteristics, are operated and maintained independently of one another and are not shared with one another, and therefore, the resources or knowledge acquirers are inconvenient. In addition, the database data of different types of resource providers is numerous and complicated, and is managed by a centralized system and stored in hardware; the method is difficult to deal with various complex network attacks and limited by the defect of a centralized system, and resource data are easy to lose and easy to be distorted; the hardware storage mode has the problems of high cost, limited reading speed, difficulty in meeting the requirements of a resource acquirer and the like. In addition, the existing communication service field has similar problems, several operators are independent of each other, integration of three networks is always a difficult point in the existing domestic communication field, the hardware infrastructure transformation cost is high, the software network system is difficult to realize, and the like.
The block chain network system is introduced under various scenes due to the technical effects of safety, difficult tampering and the like, so that the technical problem that resources, information or data and the like are easy to modify under various scenes is solved, but the common identification process is time-consuming, the speed is low in the actual implementation process, and few technical schemes run well.
Disclosure of Invention
1. Technical problem to be solved by the invention
In order to overcome the technical problems, the invention provides a consensus and resource transmission method, a device and a storage medium. The technical problems of multiple activities in different places and data conflict can be solved during resource transmission, value and data resource transmission, sharing and distribution can be realized in a chain-crossing mode, and data and value resource transmission and sharing among different platform mechanisms can be realized.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
a consensus method is suitable for a root node, more than one first transaction passing the analysis and verification is analyzed, whether the first transaction is a transaction containing a node request for joining is judged, if yes, the node requesting for joining is subjected to network fragmentation according to first transaction contents at least comprising a consensus method required by the node requesting for joining and the identity of the node requesting for joining, and the node requesting for joining is distributed to a first network; sending a message for distributing the node requesting to join to the first network to the node requesting to join; receiving a response message of the node requesting to join, judging whether the node requesting to join agrees, if so, distributing the first transaction and the transaction package uplink comprising the node requesting to join to the first network; if not, the first transaction and the transaction packaging uplink comprising the node which requests to join are refused to be distributed to the first network; and if the first transaction is not a transaction containing the node request for joining, packaging and linking the first transaction.
Optionally, the communication mode of the consensus method is MQTT.
Optionally, the identity of the node requesting to join includes a physical IP address of the node requesting to join and a type of the node requesting to join.
Optionally, when the transaction is packaged and linked, a timestamp of a national time service center of a Chinese academy is added.
Optionally, the network fragmentation is performed on the node requesting to join, and a principle of allocating the node requesting to join to the first network is as follows: the consensus method required by the node requesting to join is consistent with the consensus method of the first network, and the networking principle of the first network is met.
A resource transmission method, the node in the first network, discern and verify the identity of the party visiting, if the party visiting passes the identity verification, open the API interface of the first network or second network for the party visiting; judging the request type of an access party, if the request is a resource data uploading request, performing hash operation on the resource data to obtain a resource data hash value, chaining the resource data hash value, and storing the resource data into a cloud computing or fog computing storage space through an API (application program interface) of a first network or a second network; and if the resource data is the resource data acquisition request, acquiring the resource data from the cloud computing or fog computing storage space through an API (application program interface) of the first network or the second network, comparing whether the hash value of the data resource is consistent with the hash value of the data resource data after chain linking through hash operation, and if so, sending the resource data to the access party.
Optionally, the timestamp of the national time service center of the Chinese academy is added when the resource data is stored in the cloud computing or fog computing storage space through the API interface.
Optionally, in the verification, a user verification token mode is adopted for a data interface of the B/S architecture; and for the data interface of the C/S architecture, a verification interface mode is adopted.
Optionally, the verification interface mode is a process of identifying and verifying an identity of an access party, and includes: the access party carries out Hash operation on the encryption key to be verified to obtain an encryption key Hash value to be verified, the obtained encryption key Hash value is compared with the encryption key Hash value of the uplink in the first network or the second network, if the obtained encryption key Hash value is consistent with the encryption key Hash value of the uplink in the second network, the access party decrypts the ciphertext of the identity information of the access party through the encryption key to obtain the plaintext of the identity information of the access party through an AES256 algorithm, and the identity verification of the access party is passed; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key of the uplink in the first network or the second network, the identity verification of the access party is not passed; correspondingly, the process of encrypting the identity of the access party is as follows: obtaining a ciphertext of the identity information of the access party according to the AES256 algorithm from the plaintext of the identity information of the access party through the encryption key; and performing hash operation on the encryption key to obtain an encryption key hash value, and linking the encryption key hash value and the ciphertext of the access party identity information in the first network or the second network.
Optionally, the nodes of the first network or the second network include a fog computing node, a cloud computing center node, and an edge computing node.
Optionally, the verification interface mode is used for interface verification when the first network and the second network transmit data.
Furthermore, the present invention provides an apparatus comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Accordingly, the present invention provides a storage medium storing a computer program which, when executed by a processor, implements a method as claimed in any one of the above.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
distributed cloud computing based on blockchains may employ a consensus mechanism of blockchains, i.e., token transactions between participants are triggered by off-chain activities, such as providing data sets in real time, transferring files, performing computations, providing professional services, and the like. All computing resource-related providers (computing facilitators, data providers, application providers) are provided with a trusted platform for value or data resource sharing transactions. A unique consensus protocol is integrated to ensure the credibility of the platform and the safety of data on the platform, and application programs in multiple fields including high-performance computing to the Internet of things are supported.
Drawings
FIG. 1 is a schematic diagram of an apparatus according to the present invention;
FIG. 2 is a schematic flow chart of a consensus process;
fig. 3 is a flowchart illustrating a resource transmission method.
Detailed Description
For a further understanding of the present invention, reference will now be made in detail to the embodiments illustrated in the drawings.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, and have no specific limiting effect, but are all generic terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
A consensus method, applied to a root chain, as shown in fig. 2: s101, analyzing more than one first transaction passing verification; s102, judging whether the first transaction is a transaction containing a node request for joining, if so, S103, carrying out network fragmentation on the node request for joining according to a first transaction content at least comprising a consensus method required by the node request for joining and an identity of the node request for joining, and distributing the node request for joining to a first network; s104, sending a message for distributing the node requesting to join to a first network to the node requesting to join; s105, receiving a response message of the node requesting to join; s106, judging whether the node requesting to join agrees, if so, S1061, allocating the first transaction and the transaction packaging uplink comprising the node requesting to join to the first network; if not, S1062, the first transaction and the transaction-packed uplink including the node which requests to join are refused to be distributed to the first network; if the first transaction is not a transaction including a node request to join, S107, the first transaction is packaged and linked.
Optionally, the first transaction and the block containing the first transaction are constructed by using timestamps of national time service centers of Chinese academy; the first transaction and the hash operation applied to the block containing the first transaction are combined to ensure the uniqueness of the first transaction and the block containing the first transaction so as to prevent the occurrence of a data collision phenomenon when data and value resources are inquired, accessed and acquired subsequently; the remote multi-active resource transmission speed is improved, and the time delay is reduced. And after the first transaction verification is passed, packaging the first transaction hash values into block uplink, and storing the first transaction in a cloud computing or fog computing space corresponding to the root chain.
The communication between the fragmentation networks is forwarded by various intelligent contracts deployed on a root chain, flexible flow load and seamless switching are realized among nodes, and intelligent flow management and distribution are realized inside cluster nodes. Based on the principle of root chain priority, double-layer logic is adopted, namely not only a node network interface with the best experience is selected for a user, but also the load of internet traffic is balanced to a plurality of nodes. When a certain node network interface fails, the client flow can be guided to a suboptimal node network interface immediately. The architecture allows for the use of "hopping" to form new routes for messages to reach the destination of transmission when a node in the network topology is dead or out of service. The intelligent contract is utilized to carry out intelligent flow distribution and management on the application system, and meanwhile, flexible application deployment and seamless communication among different networks are provided.
The root chain is used for building the fragment network, adding and exiting the fragment network nodes, distributing and managing the fragment network nodes, and controlling the two-layer block chain system from the source so as to keep the excellent characteristics of the block chain network, such as decentralization, non-falsification and the like, provide the opportunity of fair and fair participation in consensus for each independent node without the defects in the POC consensus method. The consensus algorithm of the fragmentation network is not limited, and can be any one of the existing consensus algorithms, so that the application requirements of different operators on different application scenes are met, and the consensus algorithm is flexible and changeable.
If the node requesting to join agrees to join the first network, the method further comprises the following steps: the node agreeing to the requested join configures an API interface for receiving and sending the first network message that requires authentication. By setting an API interface and adding identity authentication, secondary login is prevented, the risk problems of network attack and the like are solved, and meanwhile, the hash operation and the DTS time stamp of the root link node are combined, so that the remote multi-activity is ensured, and data conflict is prevented.
The root chain is formed by a plurality of virtual machine networking networks positioned on a plurality of hardware devices, is a point-to-point distributed computing network, can construct an intelligent contract, and can transmit virtual currency resources carrying commercial values and data resources.
Network fragmentation is the division of the entire blockchain network into multiple sub-networks, one for each sub-network. In the embodiment, the root chain forms a plurality of fragment networks respectively through dividing nodes requesting to join, such as a first network, a second network, a third network and the like, wherein the different fragment networks have different consensus methods and different node admission conditions.
The node identity requesting the joining comprises a physical IP address of the node requesting the joining and the type of the node requesting the joining. The principle of performing network fragmentation on the node requesting to join and allocating the node requesting to join to the first network is as follows: the consensus method required by the node requesting to join is consistent with the consensus method of the first network, and the networking principle of the first network is met.
By the physical IP address and the type of the node requesting to join, the node requesting to join is subjected to network fragmentation by the root chain node, and dual constraints of networking principles are added, so that the excellent characteristics of the block chain are maintained, the occurrence of a local centralization condition is avoided, and the node right is ensured to be fair and fair in size.
As an optional implementation manner of this embodiment, the communication mode of the consensus method is MQTT. On the basis of network fragmentation, each fragmentation network independently uses MQTT for real-time communication, and all network fragments are protected by a root chain by the common identification method, so that the safety of each fragmentation network in the whole system is high, and even a newly added fragmentation network is immediately protected by the root chain. The protection mode is that a user token verification mode is adopted for a data interface of the B/S architecture, a verification interface mode is adopted for a data interface of the C/S architecture, and double encryption is carried out through an AES256 algorithm and a Hash algorithm, so that risks such as malicious communication attack and the like are prevented, and the communication transmission safety is ensured; furthermore, in combination with the consensus approach described above, there is no risk of security mechanisms to drastically change MQTT.
The greatest advantage of MQTT is its common subscription message queuing mechanism and many-to-many broadcast capability. The support of long-acting TCP connection pointing to MQTT proxy end makes the MQTT message receiving and sending with limited bandwidth simple and easy. Has the following main characteristics:
providing decoupling between one-to-many message publishing and application programs using a publish/subscribe message model;
secondly, the message transmission does not need to know the load content;
thirdly, providing network connection by using TCP/IP;
and fourthly, the service quality of three kinds of message issuing exists.
In an optional embodiment, the consensus method running on any node of a fragmented network, such as the first network, the second network, or the third network, includes: receiving and verifying the second transaction, and packaging and chaining the second transaction after the second transaction passes verification according to a consensus algorithm established by the established fragmentation network; the time stamps of the national time service center of the Chinese academy are adopted when the second transaction and the block containing the second transaction are constructed; the second transaction and the hash operation applied to the block containing the second transaction are combined to ensure the uniqueness of the second transaction and the block containing the second transaction so as to prevent the data collision phenomenon during subsequent inquiry, access and acquisition of data and value resources; the remote multi-active resource transmission speed is improved, and the time delay is reduced. The second transaction may be an asset transaction including a virtual value resource in the value transmission, or a non-asset transaction in the aspects of data storage, reading, access, and the like.
The root chain and a plurality of first networks, second networks, third networks and other slice networks, as well as all slice networks, such as the first network, the second network, the third network and the like, all adopt the communication mode of MQTT, a corresponding consensus method on the root chain is constructed on a networking virtual machine of the root chain in the mode of intelligent contracts, a corresponding consensus algorithm of the slice networks is constructed on all slice networks in the mode of intelligent contracts or node configuration application, the potential safety hazard of the MQTT can be overcome while utilizing the advantages of the MQTT, and the safety of a constructed double-layer block chain network system of the root chain and the slice networks is ensured by the consensus method of the root chain and the slice networks, interface verification, and the uniqueness of a time stamp and a Hash operation result of a national time center of Chinese academy. The transmission speed is improved, meanwhile, various network attacks can be resisted, and the network security and the data security are ensured.
A resource transmission method, as shown in FIG. 3, is applicable to any node in fragmented networks such as a first network, a second network, a third network, etc., S201, identifies and verifies the identity of an access party, and if the identity of the access party passes verification, opens an API interface of the first network or the second network for the access party; s202, judging whether the request type of the access party is a resource data uploading request, if so, S203, performing hash operation on the resource data to obtain a resource data hash value, chaining the resource data hash value, and storing the resource data into a cloud computing or fog computing storage space through an API (application program interface) of a first network or a second network; if the resource data is the resource data acquisition request, acquiring the resource data from the cloud computing or fog computing storage space through the API of the first network or the second network, and comparing whether the hash value of the data resource is consistent with the hash value of the data resource data after uplink through hash operation, and if so, sending the resource data to the access party.
The resource data hash value chaining includes but is not limited to: the method comprises the steps of establishing a third transaction containing a resource data uploading request and a resource data hash value, packaging the third transaction into a block after the third transaction passes verification on a corresponding fragmentation network, adopting a timestamp of a national time service center of a Chinese academy when the third transaction and the block containing the third transaction are established, ensuring uniqueness of an uplink transaction by combining the third transaction hash value and the block hash value containing the third transaction, ensuring that the uplink data cannot be tampered by utilizing a decentralized consensus method, and verifying data access stored in a cloud computing or fog computing storage space or obtaining uniqueness by hash value comparison to prevent data collision.
And when the resource data are stored in the cloud computing storage space through the API, adding a timestamp of the national time service center of the Chinese academy. So as to ensure the uniqueness of the resource data and prevent data collision.
The verification adopts a user verification token mode for a data interface of the B/S architecture; and for the data interface of the C/S architecture, a verification interface mode is adopted.
The verification interface mode is a process of identifying and verifying the identity of an access party, and comprises the following steps: the access party carries out Hash operation on the encryption key to be verified to obtain an encryption key Hash value to be verified, the obtained encryption key Hash value is compared with the encryption key Hash value of the uplink in the first network or the second network, if the obtained encryption key Hash value is consistent with the encryption key Hash value of the uplink in the second network, the access party decrypts the ciphertext of the identity information of the access party through the encryption key to obtain the plaintext of the identity information of the access party through an AES256 algorithm, and the identity verification of the access party is passed; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key of the uplink in the first network or the second network, the identity verification of the access party is not passed; correspondingly, the process of encrypting the identity of the access party is as follows: obtaining a ciphertext of the identity information of the access party according to the AES256 algorithm from the plaintext of the identity information of the access party through the encryption key; and performing hash operation on the encryption key to obtain an encryption key hash value, and linking the encryption key hash value and the ciphertext of the access party identity information in the first network or the second network.
The nodes of the first network or the second network comprise a fog computing node, a cloud computing center node and an edge computing node. The verification interface mode is used for interface verification when the first network and the second network transmit data.
Through a block chain network with a double-layer structure, chain crossing can be easily realized, and meanwhile, the layout requirements of various operation scenes can be met; data resource sharing, value resource transmission, dual transmission of data and value, and differentiation characteristics of different fragment networks solve information isolated islands and resource isolated islands through the double-layer network architecture; meanwhile, the reality, reliability and non-tampering of shared resources are ensured.
When the resource data are stored in the cloud computing storage space through the API, the time stamp of the national time service center of the Chinese academy is added to prevent data conflict. The process of encrypting the identity of the access party comprises the steps of sequentially carrying out Hash operation and AES256 algorithm operation on the identity of the access party, and chaining in the first network or the second network; correspondingly, the method for automatically identifying and verifying the identity of the access party is an access party verification token mode or a verification interface mode. The B/S and the C/S need different authentication modes to prevent repeated login, network attack and data conflict problems. The nodes of the first network or the second network comprise a cloud computing center node and an edge computing node. The network scale is expanded, the differentiated layout of the node types is realized, the storage space is expanded, and the advantages of all the nodes are fully exerted.
By utilizing a distributed point-to-point network consisting of the fog computing nodes, the cloud computing center nodes and the edge computing nodes and a data storage space of cloud computing or fog computing, the remote multi-event data transmission is realized, the data transmission speed is high, no data conflict exists, and the timestamp of the national time service center of the Chinese academy is added when the common chain is packaged after the transaction hash computation containing the value or the data resource. And adding a timestamp of a national time service center of the Chinese academy of China when the resource data is stored in a cloud computing or fog computing storage space through an API (application program interface). The problem of data conflict is solved through asymmetric hash operation and the timestamp of the authoritative national time service center of the Chinese academy. The verification mode is adopted when the access party carries out the uplink of the transaction data through the verification mode when carrying out data communication transmission among different fragment networks, so that the network safety and the data safety are ensured, and the downtime caused by malicious access attack is greatly reduced.
Correspondingly, the present embodiment provides a resource transmission method applicable to a root chain, including: when the resources are data resources, the data resources are stored in a cloud computing or fog computing storage space which can be accessed and acquired by a root chain; and after receiving a resource acquisition request sent by a node on the fragment network, the root link acquires the corresponding resource from the cloud computing or fog computing storage space and transmits the resource to a client of the corresponding node on the fragment network, wherein the client needs to acquire the resource.
When two users in different fragment networks need to exchange values, value transfer is carried out through the root chain. Here, account interaction and virtual value transfer of different fragmentation networks are involved. If the network fragments X and Y are provided, the account of the user A on the network fragments needs to transfer to the account of the user B on the network fragments Y, in order to maintain the atomicity of the transaction and prevent the generation of double flowers, the intelligent contract C on the root chain is used for managing the transfer process operated at the position of the fragment, and the processing method for the intelligent contract on the root chain comprises the following steps:
receiving a transaction request sent by a user A for transferring the virtual value (such as the number of tokens and the value amount corresponding to the tokens) of the user A of the fragmentation network X to a user B of the fragmentation network Y; after the transaction request is verified to be correct, wherein the transaction verification comprises the steps of verifying whether the format of the transaction is legal or not, verifying whether the balance on an account A1 corresponding to the user A in the fragmentation network Y is larger than or equal to the sum of the transfer amount and the reserved transaction cost or not, and if the transaction is legal and the balance on the account A1 meets the requirement, freezing the corresponding transfer amount and the reserved transaction cost of the user A on the fragmentation network X; after the freezing is finished, the intelligent contract initiates a corresponding transfer transaction to a user B through an account A1 of the user A in the fragmentation network Y, the corresponding transfer transaction is recorded as transaction Y1, meanwhile, a hash value H-Y1 of the transfer transaction on the fragmentation network Y is fed back to the intelligent contract C, the hash value H-Y1 of the transfer transaction on the fragmentation network Y is fed back to the user A on the fragmentation network X by the intelligent contract C, the corresponding actually-occurring transfer amount is transferred to the intelligent contract C by the user A on the fragmentation network X according to the actually-occurring transfer amount on the fragmentation network Y, meanwhile, the hash value H-Y1 of the transfer transaction on the fragmentation network Y is added into the format content of the transaction, the constructed hash value H-Y1 is recorded as transaction X1, and the redundant part is unfrozen and returns to the address of the user A on the fragmentation network X; feeding back the hash value H-X1 of transaction X1 to the smart contract C; adding the hash value H-X1 into the format content of the transaction Y1 again by the intelligent contract C to construct a transaction Y11 of the fragment network Y, commonly recognizing the transaction X1 on the fragment network X, commonly recognizing the transaction Y11 on the fragment network Y, monitoring a block containing the transaction X1 on the fragment network X and a block containing the transaction Y11 on the fragment network Y by the intelligent contract C, and identifying that the cross-piece transfer is successful when the two are successfully recognized; because the intelligent contract C monitors the execution states of the two, even if malicious attacks or operations such as forking occur, the phenomenon of double flowers does not occur, and the atomicity of the transaction is ensured.
In order to ensure the enthusiasm of the root chain, the intelligent contract C on the root chain can charge a commission fee from the trans-patch transfer process so as to support the sustainable and stable development of the root chain. In conclusion, the cross-segment value transfer belongs to the value transfer process among different segment networks, and for the value transfer of the same segment network, similar to the common transaction method in the prior art, the corresponding transaction content and format can be flexibly adapted and changed according to the difference of the consensus method set by different segment networks so as to meet the value transfer process of each segment network.
The root chain and the architecture mode of the two-layer blockchain network of the plurality of segmented networks, which are provided by the technical scheme of the embodiment, can exchange, transfer or redistribute the value resources and the data resources, and can be flexibly changed according to the needs when being popularized and applied in different business scenes; such as acquisition of resources and/or transfer and exchange of value, may be accompanied when different users in the fragmented networks E and F interact. The method can flexibly adapt to different kinds of business scenes, can flexibly switch according to different business scenes, and is multi-party compatible.
By adopting a gateway separation technology, clients of enterprise parks or branches access various data center nodes (including a fog computing node, a cloud computing center node or an edge computing node) through a three-layer network (a root chain, a fragment network and a cloud computing or fog computing storage space), computing, communication, control and storage resources and services are distributed to users or distributed on equipment and systems close to the users, and cloud computing is expanded to the network edge node. And small clouds at the edge of the network, namely local small clouds, are subjected to fog computing. The method has limited processing capacity and storage equipment, and provides a method for screening information flow from components of the Internet of things, which has the following characteristics:
the fog computation is not as decentralized as edge computation, but further reduces the amount of data transmitted over the network or up to the cloud computing layer, which facilitates communication and collaboration between "nodes" in the edge layer.
And the system is applied to the industrial Internet of things and is positioned among a plurality of warehouses and factories in a supply chain. The fog computing layer may be used to "check and balance" material, equipment, and supply levels at multiple locations and automatically trigger the creation, sending, and receiving of orders.
And thirdly, controlling the movement amount and type of operation data through the equipment and the local area network of the organization and the decision maker (or the industrial cloud data service). Fog computing can help reduce bandwidth usage, even mitigate the need for expensive upgrades by enterprises, and help enterprises keep IT infrastructure running smoothly.
And the storage networks are interconnected. Cross-center storage network intercommunication (storage space network intercommunication between different cloud computing or fog computing centers, or intercommunication between different types of nodes) is a necessary condition for ensuring dynamic migration of the virtual machine, and a 'shared storage mode' or a 'double-active storage mode' can be adopted.
And two-layer network interconnection. The IP address is not changed after the virtual machine is dynamically migrated, so that a cross-center two-layer network is constructed at the virtual machine network access layer. The method can be realized by adopting the technologies of EVI, VPLS, DWDM/Dark Fiber and the like.
And three-layer network interconnection. Networking nodes or access parties such as clients of an enterprise park or a branch office access each data center through a three-layer network, and for a distributed data center capable of supporting cross-center migration of virtual machines, a traditional three-layer network deployment scheme realizes single-side gateway export by uniformly deploying VRRP (virtual router redundancy protocol) across centers.
The interconnection among the data centers is realized on the physical medium layer, a flexible deployment form can be provided for cross-center two-layer expansion (a two-layer network of a root chain and a fragment network), an interconnection channel of three layers (the interconnection and the intercommunication of the root chain, the fragment network and a storage center) is firstly established among the data centers, and then VLAN expansion is realized on the basis of the MAC Over IP technology.
A dynamic DNS analysis technology is adopted to solve three-layer suboptimal paths, and different service IP addresses are presented by the same virtual machine in different data centers through NAT (realized by SLB equipment). The GSLB acts as a DNS server and resolves to clients different service IP addresses according to the physical location of the virtual machine (virtual machine corresponding to the root node point). Technical problem how to inform GSLB of the physical location of a virtual machine and to modify DNS records. The technical problem is solved by adopting an RHI (Route Health Injection) technology, the characteristic is usually realized by an SLB device, the SLB device periodically detects the survival state of a server/a virtual machine, and when the detection result is normal, the SLB issues a host Route of the virtual machine address to a backbone network; and when the checking result is abnormal, withdrawing the host route. Therefore, the Ingress traffic path from the client to the A or B center can be dynamically adjusted, and the health state of the virtual machine corresponding to the root link point is ensured.
Gateway split technique in the Egress direction (virtual machine to client where the accessing party is located). To avoid sub-optimal paths in the Egress direction, the same VRRP configuration (the same VRRP VIP configuration on a convergence device at a certain A, B center) must be deployed simultaneously on the convergence switches at both sides of the distributed data center, and cross-central two-layer interworking of VLANs where VRRPs are located must be ensured. If the aggregation device already adopts VLAN extension based on H3C EVI technology, the localized deployment of the VRRP is supported by default, and if the technical characteristics similar to EVI are not deployed, a user can also realize the localized deployment of the VRRP by configuring a corresponding command line.
The root chain and any one of the fragment networks can be any one of the blockchains such as a public chain, a alliance chain and a private chain, cross-chain intercommunication and interconnection can be realized by the method of the embodiment, and the problem of flow island can be solved. On the premise of completely maintaining the technical architecture, the storage architecture and the management organization of the native chain and on the premise of not generating chemical action (namely, the architecture self-management and operation self-maintenance between the root chain and any one of the fragment networks and among the fragment networks), the communication interaction and interconnection service is provided for the native chain.
The technical scheme of the embodiment can be popularized and used in value transfer in the financial field, for example, a self-organized cross-chain data transfer system among a plurality of financial subjects organizes and controls a root chain through an authoritative financial system center, and strictly controls networking principles when each financial subject forms a fragmentation network, node networking conditions of the fragmentation network formed by each financial subject and the like to ensure network security and data security. The method can also be popularized and used in various resource learning sharing platforms, and the data island barrier between the platforms is broken, so that diversified interaction is realized.
Example 2
This embodiment provides an apparatus, the apparatus comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Furthermore, the present embodiment provides a storage medium storing a computer program that, when executed by a processor, implements the method as described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 1, as another aspect, the present application also provides an apparatus 500 including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus 500 are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to embodiments disclosed herein, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (11)

1. A consensus method, comprising:
analyzing and verifying more than one first transaction passing the verification, judging whether the first transaction is a transaction containing a node request for joining, if so, carrying out network fragmentation on the node requesting for joining according to a first transaction content at least comprising a consensus method required by the node requesting for joining and the identity of the node requesting for joining, and distributing the node requesting for joining to a first network; sending a message for distributing the node requesting to join to the first network to the node requesting to join; receiving a response message of the node requesting to join, judging whether the node requesting to join agrees, if so, distributing the first transaction and the transaction package uplink comprising the node requesting to join to the first network; if not, the first transaction and the transaction packaging uplink comprising the node which requests to join are refused to be distributed to the first network;
and if the first transaction is not a transaction containing the node request for joining, packaging and linking the first transaction.
2. A consensus method as claimed in claim 1, wherein: the communication mode of the method is MQTT.
3. A consensus method as claimed in claim 1, wherein:
and when the transaction is packed and linked, adding a timestamp of a national time service center of the Chinese academy.
4. A consensus method as claimed in claim 1, wherein:
the principle of performing network fragmentation on the node requesting to join and allocating the node requesting to join to the first network is as follows:
the consensus method required by the node requesting to join is consistent with the consensus method of the first network, and the networking principle of the first network is met.
5. A method for resource transmission, comprising:
identifying and verifying the identity of the access party, and if the identity of the access party is verified to be passed, opening an API (application program interface) of the first network or the second network for the access party; judging the request type of an access party, if the request is a resource data uploading request, performing hash operation on the resource data to obtain a resource data hash value, chaining the resource data hash value, and storing the resource data into a cloud computing or fog computing storage space through an API (application program interface) of a first network or a second network;
and if the resource data is the resource data acquisition request, acquiring the resource data from the cloud computing or fog computing storage space through an API (application program interface) of the first network or the second network, comparing whether the hash value of the data resource is consistent with the hash value of the data resource data after chain linking through hash operation, and if so, sending the resource data to the access party.
6. The method of claim 5, wherein: the verification adopts a user verification token mode for a data interface of the B/S architecture; and for the data interface of the C/S architecture, a verification interface mode is adopted.
7. The method of claim 6, wherein:
the verification interface mode is a process of identifying and verifying the identity of an access party, and comprises the following steps:
the access party carries out Hash operation on the encryption key to be verified to obtain an encryption key Hash value to be verified, the obtained encryption key Hash value is compared with the encryption key Hash value of the uplink in the first network or the second network, if the obtained encryption key Hash value is consistent with the encryption key Hash value of the uplink in the second network, the access party decrypts the ciphertext of the identity information of the access party through the encryption key to obtain the plaintext of the identity information of the access party through an AES256 algorithm, and the identity verification of the access party is passed; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key of the uplink in the first network or the second network, the identity verification of the access party is not passed;
correspondingly, the process of encrypting the identity of the access party is as follows:
obtaining a ciphertext of the identity information of the access party according to the AES256 algorithm from the plaintext of the identity information of the access party through the encryption key;
and performing hash operation on the encryption key to obtain an encryption key hash value, and linking the encryption key hash value and the ciphertext of the access party identity information in the first network or the second network.
8. The method of claim 5, wherein:
the nodes of the first network or the second network comprise a fog computing node, a cloud computing center node and an edge computing node.
9. The method according to claim 7, wherein:
the verification interface mode is used for interface verification when the first network and the second network transmit data.
10. An apparatus, characterized in that the apparatus comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-9.
11. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-9.
CN202010551115.5A 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium Active CN111612466B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210061763.1A CN114418574A (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium
PCT/CN2021/093096 WO2021254029A1 (en) 2020-01-17 2021-05-11 Consensus and resource transmission methods, device, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2020100545742 2020-01-17
CN202010054574 2020-01-17

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202210061763.1A Division CN114418574A (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium

Publications (2)

Publication Number Publication Date
CN111612466A true CN111612466A (en) 2020-09-01
CN111612466B CN111612466B (en) 2022-02-18

Family

ID=72197110

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010551115.5A Active CN111612466B (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium
CN202210061763.1A Pending CN114418574A (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202210061763.1A Pending CN114418574A (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium

Country Status (2)

Country Link
CN (2) CN111612466B (en)
WO (1) WO2021254029A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235382A (en) * 2020-09-30 2021-01-15 苏州讯如电子科技有限公司 Transaction management system and method based on block chain fragmentation
CN112950415A (en) * 2021-03-11 2021-06-11 全链通有限公司 Judicial evidence fixing method, platform and system based on block chain
CN113472534A (en) * 2021-07-23 2021-10-01 厦门潭宏信息科技有限公司 Block chain data encryption method, equipment and storage medium
CN113516557A (en) * 2021-07-14 2021-10-19 桂林电子科技大学 Block chain with directed acyclic graph structure and implementation method thereof
WO2021254029A1 (en) * 2020-01-17 2021-12-23 厦门潭宏信息科技有限公司 Consensus and resource transmission methods, device, and storage medium
CN114221972A (en) * 2020-09-03 2022-03-22 中国电信股份有限公司 Relay blockchain system and cross-chain transaction method
CN115473766A (en) * 2022-08-22 2022-12-13 苏州思萃工业互联网技术研究所有限公司 Method and system for realizing vip based on distributed gateway

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114430326B (en) * 2022-04-07 2022-08-05 中国工商银行股份有限公司 Block chain based information confirmation method and device, electronic equipment and storage medium
CN115348263A (en) * 2022-06-29 2022-11-15 中国工商银行股份有限公司 Multi-layer block chain system, and hybrid networking method and device of multi-layer block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475666A (en) * 2013-09-23 2013-12-25 中国科学院声学研究所 Internet of things resource digital signature authentication method
CN109191124A (en) * 2018-08-16 2019-01-11 北京京东尚科信息技术有限公司 Block chain network, dispositions method and storage medium
CN109345387A (en) * 2018-09-04 2019-02-15 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, across chain communication device and storage medium
CN110535872A (en) * 2019-09-12 2019-12-03 腾讯科技(深圳)有限公司 The method and apparatus of request of data are handled in block chain network
CN110753026A (en) * 2019-02-27 2020-02-04 北京嘀嘀无限科技发展有限公司 Block chain-based fragmentation method and device
CN110855761A (en) * 2019-10-29 2020-02-28 深圳前海微众银行股份有限公司 Data processing method and device based on block chain system
WO2020082213A1 (en) * 2018-10-22 2020-04-30 深圳市哈希树科技有限公司 Network expandability blockchain implementation method

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107171829B (en) * 2017-04-24 2019-12-24 杭州趣链科技有限公司 Dynamic node management method realized based on BFT consensus algorithm
US10853772B2 (en) * 2018-04-04 2020-12-01 Vijay K. Madisetti Method and system for exchange of value or tokens between blockchain networks
US11528258B2 (en) * 2018-11-02 2022-12-13 Intel Corporation System and apparatus for data confidentiality in distributed ledger
CN109949160A (en) * 2019-03-27 2019-06-28 上海优扬新媒信息技术有限公司 A kind of sharding method and device of block chain
CN114401150B (en) * 2019-09-05 2023-10-20 创新先进技术有限公司 Method for adding node in blockchain network and blockchain system
CN110545286B (en) * 2019-09-18 2022-04-26 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for joining and exiting alliance chain
CN110557403B (en) * 2019-09-26 2022-05-31 腾讯科技(深圳)有限公司 Resource allocation method and device based on block chain, storage medium and node equipment
CN111245836B (en) * 2020-01-13 2021-07-13 电子科技大学 Block chain network dynamic management method based on multi-node decision
CN111612466B (en) * 2020-01-17 2022-02-18 厦门潭宏信息科技有限公司 Consensus and resource transmission method, device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475666A (en) * 2013-09-23 2013-12-25 中国科学院声学研究所 Internet of things resource digital signature authentication method
CN109191124A (en) * 2018-08-16 2019-01-11 北京京东尚科信息技术有限公司 Block chain network, dispositions method and storage medium
CN109345387A (en) * 2018-09-04 2019-02-15 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, across chain communication device and storage medium
WO2020082213A1 (en) * 2018-10-22 2020-04-30 深圳市哈希树科技有限公司 Network expandability blockchain implementation method
CN110753026A (en) * 2019-02-27 2020-02-04 北京嘀嘀无限科技发展有限公司 Block chain-based fragmentation method and device
CN110535872A (en) * 2019-09-12 2019-12-03 腾讯科技(深圳)有限公司 The method and apparatus of request of data are handled in block chain network
CN110855761A (en) * 2019-10-29 2020-02-28 深圳前海微众银行股份有限公司 Data processing method and device based on block chain system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021254029A1 (en) * 2020-01-17 2021-12-23 厦门潭宏信息科技有限公司 Consensus and resource transmission methods, device, and storage medium
CN114221972A (en) * 2020-09-03 2022-03-22 中国电信股份有限公司 Relay blockchain system and cross-chain transaction method
CN112235382A (en) * 2020-09-30 2021-01-15 苏州讯如电子科技有限公司 Transaction management system and method based on block chain fragmentation
CN112235382B (en) * 2020-09-30 2021-09-10 厦门攸基数据科技有限公司 Transaction management system and method based on block chain fragmentation
CN112950415A (en) * 2021-03-11 2021-06-11 全链通有限公司 Judicial evidence fixing method, platform and system based on block chain
CN112950415B (en) * 2021-03-11 2024-01-16 全链通有限公司 Judicial evidence fixing method, platform and system based on blockchain
CN113516557A (en) * 2021-07-14 2021-10-19 桂林电子科技大学 Block chain with directed acyclic graph structure and implementation method thereof
CN113516557B (en) * 2021-07-14 2022-09-23 桂林电子科技大学 Block chain with directed acyclic graph structure and implementation method thereof
CN113472534A (en) * 2021-07-23 2021-10-01 厦门潭宏信息科技有限公司 Block chain data encryption method, equipment and storage medium
CN115473766A (en) * 2022-08-22 2022-12-13 苏州思萃工业互联网技术研究所有限公司 Method and system for realizing vip based on distributed gateway
CN115473766B (en) * 2022-08-22 2024-01-26 苏州思萃工业互联网技术研究所有限公司 Vip implementation method and system based on distributed gateway

Also Published As

Publication number Publication date
CN114418574A (en) 2022-04-29
WO2021254029A1 (en) 2021-12-23
CN111612466B (en) 2022-02-18

Similar Documents

Publication Publication Date Title
CN111612466B (en) Consensus and resource transmission method, device and storage medium
US11502871B2 (en) Dynamic discovery of peer network devices across a Wide Area Network
Oktian et al. Distributed SDN controller system: A survey on design choice
Ortega et al. Trusted 5G vehicular networks: Blockchains and content-centric networking
CN108551464B (en) Connection establishment and data transmission method, device and system of hybrid cloud
Nguyen et al. Decentralized and revised content-centric networking-based service deployment and discovery platform in mobile edge computing for IoT devices
US10824454B2 (en) 5G dynamic slice and network identity instantiation, termination, and access management system and method
CN115277489B (en) System, method and computer readable medium for monitoring and controlling network traffic
WO2019201043A1 (en) Network communication method, system and device, and storage medium
US10484335B2 (en) Secure remote computer network
US7403980B2 (en) Methods and apparatus for scalable, distributed management of virtual private networks
CN112470436A (en) Multi-cloud connectivity using SRV6 and BGP
JP2018518862A (en) System and method for providing virtual interfaces and advanced smart routing in a global virtual network (GVN)
US20170118127A1 (en) Systems and Methods of Virtualized Services
CN104901825B (en) A kind of method and apparatus for realizing zero configuration starting
CN110035081A (en) A kind of publish/subscribe architectural framework based on block chain
US10362120B2 (en) Distributed gateways with centralized data center for high throughput satellite (HTS) spot beam network
US11647069B2 (en) Secure remote computer network
CN113472668B (en) Routing method and system in multiparty security computation
CN113839995A (en) Cross-domain resource management system, method, device and storage medium
KR101953584B1 (en) NFV service provider, VNF service provider, system for extending service chaining including them and method for extending service chaining
CN109104309B (en) Edge server management system and method of CDN (content delivery network)
Dayananda et al. Architecture for inter-cloud services using IPsec VPN
US11218918B2 (en) Fast roaming and uniform policy for wireless clients with distributed hashing
Yang Optical and wireless convergence network based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant