CN111930831A - Block chain light node implementation method based on to-be-uplink data alarm - Google Patents

Block chain light node implementation method based on to-be-uplink data alarm Download PDF

Info

Publication number
CN111930831A
CN111930831A CN202010597197.7A CN202010597197A CN111930831A CN 111930831 A CN111930831 A CN 111930831A CN 202010597197 A CN202010597197 A CN 202010597197A CN 111930831 A CN111930831 A CN 111930831A
Authority
CN
China
Prior art keywords
data
alarm
uplink
light node
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010597197.7A
Other languages
Chinese (zh)
Inventor
宋明明
肖雪
钱洪国
王伟兵
李照川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Quality Chain Technology Co Ltd
Original Assignee
Shandong Inspur Quality Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Quality Chain Technology Co Ltd filed Critical Shandong Inspur Quality Chain Technology Co Ltd
Priority to CN202010597197.7A priority Critical patent/CN111930831A/en
Publication of CN111930831A publication Critical patent/CN111930831A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a block chain light node implementation method based on to-be-linked data alarm, which is used for solving the problem that the block chain light node in the prior art can not participate in maintenance of the network environment safety of a block chain. The method comprises the following steps: the block chain network comprises a light node and a full node, wherein the light node receives a to-be-uplink data alarm sent by other nodes in the block chain network; after receiving the to-be-uplink data alarm, the light node acquires a data original text corresponding to the to-be-uplink data alarm; the light node verifies the data original.

Description

Block chain light node implementation method based on to-be-uplink data alarm
Technical Field
The application relates to the technical field of block chains, in particular to a block chain light node implementation method based on to-be-linked data alarm.
Background
With the development of the blockchain technology, people pay more attention to further guarantee the environmental security of the blockchain network under the limited storage space.
In some block chain networks, nodes are divided into a full node and a light node according to the difference of data stored in the nodes, the full node stores the full data and occupies a large storage space, and the light node only stores block head data of a block but does not store other specific data in the block and occupies a small storage space.
In these blockchain networks, only a full number of nodes participate in the maintenance of the environmental security of the blockchain network, and light nodes do not participate in the maintenance of the environmental security of the blockchain network.
However, the number of the light nodes is often much greater than that of the full-quantity nodes, in this case, only a part of the full-quantity nodes can be controlled by a malicious user, and the environmental security of the blockchain network can be threatened, and the proportion of the part of the full-quantity nodes to the total number of the nodes is very small, so that the malicious cost is reduced, and the environmental security of the blockchain network is not facilitated.
Disclosure of Invention
The embodiment of the application provides a block chain light node implementation method based on a to-be-linked data alarm, which is used for solving the problem that the block chain light node in the prior art cannot participate in maintaining the network environment safety of a block chain.
The embodiment of the application provides a block chain light node implementation method based on a to-be-uplink data alarm, which is characterized by comprising the following steps:
the light node receives data alarm to be uplink sent by other nodes in the block chain network;
after receiving the to-be-uplink data alarm, the light node acquires a data original text corresponding to the to-be-uplink data alarm;
the light node verifies the data original.
The light node can receive the data alarm to be uplink-linked and can acquire the data original text corresponding to the data alarm to be uplink-linked, so that the light node can verify the data original text and participate in the safety maintenance of the block chain network environment.
Optionally, after the light node receives the alarm of the data to be uplink sent by the other node in the blockchain network, the method further includes:
the light node judges whether the number of different nodes sending the alarm of the data to be uplink exceeds a preset value;
and if so, forwarding the alarm of the data to be uplink to other nodes.
Optionally, the receiving, by the light node, the to-be-uplink data alarm sent by another node in the block chain network specifically includes:
and the light node receives a data alarm to be uplink, wherein the data alarm to be uplink is sent by the full-scale node after the corresponding data original text is verified to be failed.
Optionally, the receiving, by the light node, the to-be-uplink data alarm sent by another node in the block chain network specifically includes:
and the light node receives the data alarm to be uplink forwarded by other light nodes.
The light nodes can receive the data alarm to be uplink forwarded by other light nodes, so the pressure of sending the data alarm to be uplink to the light nodes by the total number of nodes is reduced, and the network burden is reduced.
Optionally, the obtaining of the data original text corresponding to the to-be-uplink data alarm specifically includes:
the light node acquires a data text corresponding to the data alarm to be uplink from the full node; alternatively, the first and second electrodes may be,
the light node obtains the data original text from other light nodes.
Optionally, after the light node verifies the data original text, the method further includes:
and if the data original text is verified not to pass, the light node stores the data original text.
Optionally, after the light node stores the data original text and forwards the data original text to other nodes, the method further includes:
and the light node releases the storage space for storing the data original text.
The light node releases the storage space for storing the data original text, and the storage space of the light node is saved.
Optionally, after the light node verifies the data original text, the method further includes:
and if the data original text passes the verification, judging other nodes sending the data original text as malicious nodes by the light node.
Optionally, after the light node determines, as a malicious node, another node that sends the original data text, the method further includes:
if the alarm of the data to be uplink sent again by the malicious node is received, refusing to respond to the alarm of the data to be uplink; alternatively, the first and second electrodes may be,
and refusing to receive the alarm of the data to be uplink sent again by the malicious node.
Optionally, after the light node verifies the data original text, the method further includes:
and if the data original text is verified not to pass, the light node participates in a consensus process corresponding to the data original text.
According to the embodiment of the application, through at least one technical scheme, the light node can participate in the maintenance of the block chain network environment safety, and can acquire the data original text corresponding to the to-be-uplink data alarm based on the to-be-uplink data alarm and verify the data original text. The problems in the prior art are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a process diagram of a block chain light node implementation method based on a to-be-uplink data alarm according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the specific embodiments and accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given in the present application without any inventive step, are within the scope of the present application.
Aiming at the problems in the background art, the application provides a block chain light node implementation method based on a to-be-uplink data alarm.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a process diagram of a block chain light node implementation method based on a to-be-uplink data alarm according to an embodiment of the present application, and the method may include the following steps:
s101: and the light node receives the alarm of the data to be uplink sent by other nodes in the block chain network.
In the embodiment of the application, the blockchain network comprises light nodes and full nodes, and the number of the light nodes is more than that of the full nodes. There are two ways for the light node to receive the pending uplink data alarm:
first, the light node receives a data alarm to be uplink, wherein the data alarm to be uplink is sent by the full number of nodes after the corresponding data original text is verified. In a block chain network, a full node verifies a data original text corresponding to data to be uplink, and if the full node finds that the data original text is false data by tracing the data original text at the moment, the full node sends an alarm of the data to be uplink to surrounding light nodes. For example, in bitcoin transactions, a malicious node swarms transaction data and wants to chain up the transaction data, such as 20 bitcoins in the account balance of a malicious node, after one transaction is paid by using 2 bit coins, 18 bit coins remain in the account balance, but the malicious node changes the remaining 18 bit coins in the account balance after the transaction into 20 bit coins before the transaction, and wants to write the changed data into the blockchain network to perform two transactions, meanwhile, after verifying the transaction information, a large number of other malicious nodes agree to the request for writing the changed data into the blockchain, however, when there are other nodes in the total amount that fail to verify the transaction data, the transaction data is considered to be erroneous and is not supposed to be written into the blockchain network, and at this time, and the other full nodes which verify that the transaction data is wrong send the uplink data waiting alarm of the transaction data to the light node. And the light node receives the alarm of the data to be uplink sent by the full node.
After step S101, the light node determines whether the number of different nodes sending the to-be-uplink data alarm to itself exceeds a preset value, and if so, forwards the to-be-uplink data alarm to other nodes.
In this embodiment, if the light node receives the to-be-uplink data alarm, and the number of the to-be-uplink data alarms is sent by a certain number of different nodes and exceeds a preset value of the blockchain network, the preset value may be a specific number, for example, 5 different nodes, 10 different nodes, and is not limited herein. The different nodes at this time may be different full nodes, or different light nodes, or different full nodes and light nodes. When the light node receives the data alarm to be uplink sent by different nodes with the number exceeding the preset value, the light node also participates in the process of sending the data alarm to be uplink, and continuously forwards the data alarm to be uplink. For example, in a blockchain network, the preset value for forwarding the to-be-uplink data alarm by the light node is 5 different nodes, and if the light node receives the to-be-uplink data alarm sent by 2 different full-volume nodes, in addition to that, no to-be-uplink data alarm is received, the light node does not participate in forwarding the to-be-uplink data alarm. If the light node receives the data alarm to be uplink sent by 5 or more different total nodes, the light node forwards the data alarm to be uplink. If the light node receives the to-be-uplink data alarm sent by 5 or more different other light nodes, or the to-be-uplink data alarm sent by 2 different total nodes and 3 different other light nodes, the light node forwards the to-be-uplink data alarm.
Secondly, the light node receives the alarm of the data to be uplink forwarded by other light nodes. In a blockchain network, in order to reduce the network pressure of sending a to-be-uplink data alarm to other nodes by a total number of nodes, a light node can forward the to-be-uplink data alarm and also can receive the to-be-uplink data alarm forwarded by other light nodes. For example, in a block chain network, after a light node determines that a to-be-uplink data alarm sent by other nodes exceeding a preset value is received, the to-be-uplink data alarm is forwarded to the other nodes, and the other light nodes receive the to-be-uplink data alarm sent by the light node, and at this time, the other light nodes may have already received the to-be-uplink data alarm sent by the other nodes, and whether the to-be-uplink data alarm is forwarded or not can be determined according to the preset value set in the block chain network, so that the propagation speed of the to-be-uplink data alarm is increased, and the network pressure of the full-scale nodes sending the to-be-uplink data alarm to the other nodes.
S102: and after receiving the to-be-uplink data alarm, the light node acquires a data text corresponding to the to-be-uplink data alarm.
In this embodiment of the application, the light node obtains the data original text corresponding to the to-be-uplink data alarm from the full node, or the light node obtains the data original text from other light nodes.
For example, in a blockchain network, for example, in a blockchain network for tracing the source of a hairy crab, a hairy crab is from a great lake, a malicious node identifies the hairy crab as being from a Yangcheng lake and sends an uplink request, and most malicious nodes agree to uplink, at this time, other total nodes verify that the data original text corresponding to the data to be uplink fails, the hairy crab is considered to be from the great lake, and an alarm for identifying the hairy crab in the great lake as the Yangcheng lake hairy crab is sent to the other nodes, after receiving the alarm, a light node acquires the data original text corresponding to the hairy crab identification in the great lake from the total nodes, and at this time, the other light nodes can acquire the corresponding data original text from the light nodes acquiring the corresponding data original text without acquiring the corresponding data original text from the total nodes.
S103: the light node verifies the data original.
In the embodiment of the application, after the light node acquires the data original text corresponding to the to-be-uplink data alarm, the data original text is verified. For example, in a bit currency transaction system, after a transaction, a malicious node tampers and modifies transaction information, 30 bit currencies which should remain in an account balance are changed, the malicious node changes the remaining 32 bit currencies in the account balance in series and sends a chaining request, the full node fails in data verification, the 32 bit currencies which should remain in the account balance after the transaction are considered to have sent a data alarm to be chained, and after a light node obtains a data original text corresponding to the data alarm to be chained, the transaction information is traced back, and the data original text corresponding to the obtained data alarm to be chained is verified.
And if the data original text is verified not to pass, the light node stores the data original text. In this embodiment of the present application, the light node verifies the data original text corresponding to the acquired to-be-linked data alarm, if the data original text is still considered to be incorrect, the account balance should be 30 bit coins instead of 32 bit coins after the transaction, and the light node stores the data original text instead of only storing the block header of the block chain. If the light node does not determine that the data original text is correct or wrong after the light node verifies the data original text, the light node can also verify the data original text again until an exact result is verified, and whether the data original text is stored is judged according to the verification result.
And after the light node stores the data original text and forwards the data original text to other nodes, the light node releases the storage space for storing the data original text.
In the embodiment of the application, the light node verifies that the data original text does not pass, the data original text is forwarded to other nodes after the data original text is stored, at the moment, the light node stores the data original text and occupies a storage space, but the data original text has no use for the light node, the light node can release the storage space for storing the data original text, the storage space of the light node is saved, and the storage load of a block chain network is reduced.
After the light node verifies the data original text, if the data original text passes the verification, the light node judges other nodes sending the data original text as malicious nodes.
In the embodiment of the application, the light node verifies the data original text received from other nodes, if the data original text passes the verification, the other nodes sending the data original text are proved to be malicious alarm nodes, and the light node identifies the data original text as a malicious node.
And after judging other nodes sending the data original text as malicious nodes, if the malicious nodes send the to-be-uplink data alarm again, the light nodes refuse to respond to the to-be-uplink data alarm or refuse to receive the to-be-uplink data alarm sent again by the malicious nodes.
In the embodiment of the application, if the light node receives the alarm of the data to be uplink sent again by the malicious node, the light node may not make any action on the alarm, or the malicious node is blacked out, and the light node refuses to receive the alarm of the data to be uplink sent again by the malicious node. The block chain network congestion caused by the fact that a malicious node intentionally sends a warning of data to be linked up is avoided.
After the light node verifies the data original text, if the data original text is not verified to be passed, the light node participates in a consensus process corresponding to the data original text.
In the embodiment of the application, the light node verifies that the data original text does not pass through, and then participates in a consensus process corresponding to the data original text, the consensus process can be a workload proving mechanism, and because the number of the light nodes in the block chain network is greatly increased by most of all nodes, after the light nodes participate in the consensus process corresponding to the data original text, the workload of the malicious node hardly exceeds the sum of the workloads of the light nodes and part of all nodes, so that the environmental security of the block chain network is more powerfully guaranteed.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A block chain light node implementation method based on a to-be-uplink data alarm is characterized in that a block chain network comprises a light node and a full node, and the method comprises the following steps:
the light node receives data alarm to be uplink sent by other nodes in the block chain network;
after receiving the to-be-uplink data alarm, the light node acquires a data original text corresponding to the to-be-uplink data alarm;
the light node verifies the data original.
2. The method of claim 1, wherein after the light node receives the pending uplink data alarm sent by other nodes in the blockchain network, the method further comprises:
the light node judges whether the number of different nodes sending the alarm of the data to be uplink exceeds a preset value;
and if so, forwarding the alarm of the data to be uplink to other nodes.
3. The method of claim 1, wherein the receiving, by the light node, the pending uplink data alarm sent by the other node in the blockchain network comprises:
and the light node receives a data alarm to be uplink, wherein the data alarm to be uplink is sent by the full-scale node after the corresponding data original text is verified to be failed.
4. The method of claim 1, wherein the receiving, by the light node, the pending uplink data alarm sent by the other node in the blockchain network comprises:
and the light node receives the data alarm to be uplink forwarded by other light nodes.
5. The method according to claim 1, wherein the obtaining the data original corresponding to the to-be-uplink-data alarm specifically includes:
the light node acquires a data text corresponding to the data alarm to be uplink from the full node; alternatively, the first and second electrodes may be,
the light node obtains the data original text from other light nodes.
6. The method of claim 1, wherein after the light node verifies the data original, the method further comprises:
and if the data original text is verified not to pass, the light node stores the data original text.
7. The method of claim 6, wherein after the light node stores the data original and forwards the data original to other nodes, the method further comprises:
and the light node releases the storage space for storing the data original text.
8. The method of claim 1, wherein after the light node verifies the data original, the method further comprises:
and if the data original text passes the verification, judging other nodes sending the data original text as malicious nodes by the light node.
9. The method of claim 8, wherein after the light node determines other nodes sending the data original text as malicious nodes, the method further comprises:
if the alarm of the data to be uplink sent again by the malicious node is received, refusing to respond to the alarm of the data to be uplink; alternatively, the first and second electrodes may be,
and refusing to receive the alarm of the data to be uplink sent again by the malicious node.
10. The method of claim 1, wherein after the light node verifies the data original, the method further comprises:
and if the data original text is verified not to pass, the light node participates in a consensus process corresponding to the data original text.
CN202010597197.7A 2020-06-28 2020-06-28 Block chain light node implementation method based on to-be-uplink data alarm Pending CN111930831A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010597197.7A CN111930831A (en) 2020-06-28 2020-06-28 Block chain light node implementation method based on to-be-uplink data alarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010597197.7A CN111930831A (en) 2020-06-28 2020-06-28 Block chain light node implementation method based on to-be-uplink data alarm

Publications (1)

Publication Number Publication Date
CN111930831A true CN111930831A (en) 2020-11-13

Family

ID=73317796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010597197.7A Pending CN111930831A (en) 2020-06-28 2020-06-28 Block chain light node implementation method based on to-be-uplink data alarm

Country Status (1)

Country Link
CN (1) CN111930831A (en)

Similar Documents

Publication Publication Date Title
US11568372B2 (en) Deterministic java virtual machine
CN110442652B (en) Cross-chain data processing method and device based on block chain
WO2018051305A1 (en) Systems and methods for interception of smart contracts
CN104519018A (en) Method, device and system for preventing malicious requests for server
US20240062214A1 (en) Controlling Transactions on a Network
CN111767578A (en) Data inspection method, device and equipment
CN114255031A (en) System for executing cross block chain of transaction, cross chain transaction method and equipment
US10958780B1 (en) Decentralized automatic phone fraud risk management
CN108494557A (en) Social security digital certificate management method, computer readable storage medium and terminal device
CN109218311B (en) Block chain agglomeration method, block chain node and block chain
Wijaya et al. On the unforkability of monero
CN110309160A (en) Data enter chain transaction methods, device, computer equipment and storage medium
CN109493054A (en) Multichain approaches to IM, device, storage medium and block chain identity resolution device
KR102440878B1 (en) Learning method for learning detection model for fraud detection of virtual asset, detecting method of fraud detection of virtual asset using the detection model, apparatus and computer program for performing the learning method and the detecting method
CN111930831A (en) Block chain light node implementation method based on to-be-uplink data alarm
CN111367934A (en) Data consistency checking method, device, server and medium
CN111784359B (en) Multi-mode wind control grading disaster recovery method and device
CN112104701B (en) Method, device, network node and storage medium for cross-link communication
CN111444270B (en) Method and system for controlling harmful information based on block chain
CN113179273A (en) Block chain side chain-based block header verification method and device and computer-readable storage medium
CN112104607B (en) Method, device, network node and storage medium for cross-link communication
CN112950183A (en) Cross-link data interchange method, system, device and electronic equipment
CN113987574A (en) Block chain private transaction method, device, equipment and readable storage medium
AU2016357267A8 (en) Network bridge for local transaction authorization
US20210042295A1 (en) Blockchain-based data management method and related system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination