CN112149073B - Cone blockchain management method and system - Google Patents

Cone blockchain management method and system Download PDF

Info

Publication number
CN112149073B
CN112149073B CN202011021065.6A CN202011021065A CN112149073B CN 112149073 B CN112149073 B CN 112149073B CN 202011021065 A CN202011021065 A CN 202011021065A CN 112149073 B CN112149073 B CN 112149073B
Authority
CN
China
Prior art keywords
block
manager
authentication
information
blocks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011021065.6A
Other languages
Chinese (zh)
Other versions
CN112149073A (en
Inventor
李俊
李晶宇
武少华
张琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Texin Huanyu Information Technology Co ltd
Original Assignee
Shanxi Texin Huanyu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Texin Huanyu Information Technology Co ltd filed Critical Shanxi Texin Huanyu Information Technology Co ltd
Priority to CN202011021065.6A priority Critical patent/CN112149073B/en
Publication of CN112149073A publication Critical patent/CN112149073A/en
Priority to PCT/CN2021/119881 priority patent/WO2022063172A1/en
Application granted granted Critical
Publication of CN112149073B publication Critical patent/CN112149073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to the technical field of chain data structures, and particularly relates to a method and a system for managing a cone block chain, wherein a cone block comprises a node block, a subelement unit block and a user block; the node blocks, the sub unit blocks and the user blocks are connected to form cone blocks; the node block, the sub unit block and the user block are respectively generated with corresponding manager and manager hash values, wherein the node block manager information comprises the hash value of the lower sub unit block manager, and the sub unit block manager information comprises the lower user block manager hash value; information in each administrator and administrator hash values may be broadcast through the pyramidal blockchain. The cone block chain ensures that the information of the manager cannot be changed in a serial way, the information is true and reliable, meanwhile, the manager manages the block information, the problem that the data of the decentralized block chain is not supervised is solved, and the social reliability is increased.

Description

Cone blockchain management method and system
Technical Field
The invention belongs to the technical field of chain data structures, and particularly relates to a cone block chain management method and system.
Background
A blockchain is a decentralized, distributed database that nodes of the blockchain use over a P2P network and maintain.
The block chain is a chain structure taking blocks as units and mainly serves digital currency, the blocks are composed of block heads and block bodies, the block heads mainly comprise the version number of a node client, the hash value of the previous block, the timestamp, the random number, the Merker root value of transaction data, the difficulty target and other information, and the block bodies mainly comprise specific information of transactions.
The chain structure of the blockchain prevents the information in the blocks from being tampered to a certain extent, each block is related by a hash value, and therefore the tampered block information is almost impossible.
There are also some disadvantages to blockchains as a new technology, and the right to record data by blocks is currently mostly determined by computationally intensive miners. These miners are usually from large mines, and conflict with the concept of decentralization, and the data recording is selective, so that the authenticity of the data content is problematic.
The blockchain consumes significant energy and wastes significant resources based on the billing rights created by the mining. The inefficiency of blockchains, multi-node recording of data for decentralization, results in poor system flexibility and synchronization. The blocks are to avoid "bifurcation" in order to form a chain, contrary to the concept of decentering, which is encouraged. The block chain is uncontrollable, the system cannot be interfered by specific external force due to decentralization, future development of the system is unpredictable, and many illegal industries perform illegal activities through the block chain due to unmanned supervision, so that the national supervision concept is desalted.
Disclosure of Invention
Aiming at the technical problems, the invention provides a cone block chain management method and a cone block chain management system, which can solve the problem of low efficiency in an unmanned supervision and decentralization mode.
In order to solve the technical problems, the invention adopts the following technical scheme:
the cone block chain management method mainly comprises cone blocks, wherein the cone blocks comprise node blocks, sub unit blocks and user blocks, the sub unit blocks are lower blocks of the node blocks, and the user blocks are lower blocks of the sub unit blocks; the node blocks, the sub unit blocks and the user blocks are connected to form cone blocks;
the node block, the sub unit block and the user block are respectively generated with corresponding manager and manager hash values, wherein the node block manager information comprises the hash value of the lower sub unit block manager, and the sub unit block manager information comprises the lower user block manager hash value; information in each administrator and hash value changes of the information are obtained by the pyramidal blockchain broadcasting.
The information in each manager comprises the authorization authentication information of the manager of the block, the identity authentication information of the manager of the block, the authority of the block, the internal approval process of the block and the information of the lower-level block manager.
The method for generating the hash value of the administrator of the node block comprises the following steps:
generating a node block code after the node block applies for registration; the node block legal person performs legal person identity authentication on the cone block chain; after the authentication is passed, carrying out authentication and authorization of the node block manager; setting the authority of a node block manager and an internal management approval process; after the Cone blockchain authentication is passed, the node blockchain manager authorizes authentication, manager identity authentication, manager authority and internal approval flow, and the information hash value, the time stamp and the generated node blockchain manager information of the sub unit blockchain manager are stored in the node blockchain block, the hash operation forms the manager information hash value which is stored in the block head;
the administrator of the sub unit block and the method for generating the hash value of the administrator are as follows:
after the node blocks are generated, the node blocks are positioned in the cone block chain according to node codes; registering different subentry unit blocks according to different service property applications, and generating subentry unit block codes at the same time; after the authentication of the node block manager is passed, carrying out authentication and manager authorization of the sub unit block manager; setting authority of a subitem unit block manager and internal management approval flow; after the authentication of the subunit block manager passes through the Cone blockchain authentication, the administrator authorizes authentication, administrator identity authentication, administrator authority and internal approval flow, user block administrator information hash value, time stamp, generating subunit block administrator information, storing in a subunit block area block, forming an administrator information hash value by hash operation, and storing in a block head;
the administrator of the user block and the method for generating the hash value of the administrator are as follows:
after the sub unit blocks are generated, different user blocks are registered according to different user information applications, and user block codes are generated at the same time; after passing the authentication of the sub unit block manager, carrying out user block manager identity authentication and manager authorization; setting authority of a user block manager and an internal management approval process; after the Cone blockchain authentication is passed, the manager authorizes authentication, manager identity authentication, authority and internal approval flow, micro-block manager information hash value, time stamp and generation of user block manager information, the user block manager information is stored in a user block, the hash operation is carried out to form manager information hash value, and the manager information hash value is stored in a block head.
Each administrator of the node block, the item unit block and the user block can be logged out and changed, and the logging out and changing methods are as follows:
firstly, carrying out identity real-time authentication in a cone block chain by legal persons of each block, and applying for an authorized manager to log off after the authentication is passed; and generating a cancellation hash value according to cancellation information operation, and changing after cancellation to regenerate the corresponding new manager and the new manager hash value.
The manager logout hash value is authenticated by the block legal person in real time, and the manager authorizes logout authentication, time stamp and hash operation to generate the logout hash value.
Generating an administrator hash value by a Cone block chain block administrator, broadcasting the administrator hash value to all the consensus blocks according to a broadcast transmission mechanism, and performing consensus storage after the administrators corresponding to all the consensus blocks are successfully compared; the comparison content has common legal person authentication, logout authentication, new authorization authentication, administrator change flow authentication and authorization administrator authentication.
And the management system is used for realizing authentication generation, authorization, change, hash operation, consensus storage, verification and association verification of each level of block manager.
Compared with the prior art, the invention has the beneficial effects that:
the blocks in the cone block chain all contain administrator information, different block administrators respectively carry out management authentication on the block information, the upper-level block administrator information receives the hash value of the lower-level block administrator, and the lower-level block administrator is verified. The cone blockchain ensures that the information of the administrator cannot be changed in a serial way, the information of the administrator is real and reliable, meanwhile, the administrator manages the blockinformation, the problem that the data of the decentralized blockchain is not supervised is solved, the information is disclosed and transparent, and the social reliability is increased.
Drawings
FIG. 1 is a schematic diagram of a Cone blockchain manager system architecture in accordance with the present invention;
FIG. 2 is a flow chart of generation of a Cone blockchain manager hash value;
FIG. 3 is a flowchart of a de-registration change of a Cone blockchain manager;
FIG. 4 is a schematic diagram of a pyramid block chain structure;
fig. 5 is a schematic diagram of a cone block structure.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, 4 and 5, a Cone blockchain management method is disclosed, wherein a Cone blockchain mainly comprises cone blocks, the cone blocks comprise node blocks, sub unit blocks and user blocks, the sub unit blocks are lower blocks of the node blocks, and the user blocks are lower blocks of the sub units; the node blocks, the sub-unit blocks and the user blocks are connected to form cone blocks. For the cone blocks and cone block chains, a cone block, cone block chain structure and method of patent application 202010797084.1 are described in detail, and therefore a brief description is provided herein:
the node block is a top layer block of the cone block; the sub unit blocks are middle layer blocks of the cone blocks, belong to classification blocks of the node blocks and are sub blocks of the node blocks; the user block is the bottom block of the pyramid block.
Each sub-block in the cone block is composed of a block header and a block body, wherein the block header mainly contains a block code, an associated block hash value, a service network address, a server identifier, a timestamp, an administrator information hash value, a block content hash value, and the block body contains administrator information and block content. The administrator information comprises registration, change and logout of an administrator; the tile content includes authentication content, associated authentication content, other tile content.
The user block can apply for the secondary unit block and the secondary user block according to the self service content, such as providing a public platform; cone blocks are also formed between the user blocks, the secondary cell blocks and the secondary user blocks. Some mechanisms also have no user block or no branching unit block.
The cone block chain structure comprises a plurality of cone blocks, wherein one cone block is a total cone block, and other cone blocks are divided according to the category or property of the cone block chain structure: cone blocks of the same category or property are positioned in the same row, and node blocks in the cone blocks on the same row are connected to form a linear chain; forming a plurality of columns of linear chains according to the different categories or properties; the linear chains of different rows are intersected with the node blocks in the total cone block to form a cone block chain structure as a whole.
The cone blocks on the same column are layered according to the grades and form a private chain according to the association consensus relation; the linear chains of different columns form cone alliance chains according to the consensus relation; the tapered blocks with the same level comprise more than one tapered block with the same level on the same layer, namely the same layer on the same row.
Private chain: mechanisms with the same property are positioned in the same column of the cone block chain, and each cone block forms a private chain according to a consensus relationship; alliance chain: the mechanisms with different properties are positioned in different columns of the cone block chain, and each cone block forms a alliance chain according to the consensus relation; specific: the different tiers 3-6 may be categorized by a hierarchy of rights (or a hierarchy of dependencies).
For example: public security in Shanxi province, public security in the Shuozhou city, and private links are connected between public security in Pinglu district; the links between public security in Shanxi province, civil authorities in Shanxi province, labor authorities in Shanxi province, and so on are alliance chains.
The hierarchical relationship is from top to bottom: node blocks, sub-unit blocks, user blocks, secondary unit blocks, secondary user blocks, and micro-blocks.
The node block, the sub unit block and the user block are respectively generated with corresponding manager and manager hash values, wherein the node block manager information comprises the hash value of the lower sub unit block manager, and the sub unit block manager information comprises the lower user block manager hash value; information in each administrator and hash value changes of the information are obtained by the pyramidal blockchain broadcasting.
The information in each manager comprises the authorization authentication information of the manager of the block, the identity authentication information of the manager of the block, the authority of the block, the internal approval process of the block and the hash value of the information of the lower-level block manager.
Further, as shown in fig. 2, the method for generating the administrator and the administrator hash value of the node block is as follows:
the node block is applied for registration and then generates a node block code, a node block legal person performs identity authentication on the cone block chain, after the authentication is passed, a cone block chain identity authorization system can be used for node block manager authorization and manager identity authentication, manager authority and internal management approval processes are set, and after the cone block chain authentication, the manager is used for authorizing authentication, manager identity authentication, manager authority and internal approval processes, time stamp and hash operation to generate a node block manager hash value. The node block manager information is stored in the node block area block, the hash operation forms a manager information hash value and is stored in the block head.
The administrator of the sub unit block and the method for generating the hash value of the administrator are as follows:
after the node blocks are generated, the node blocks are positioned in the cone block chain according to node codes; registering different sub unit blocks according to different business property applications, generating sub unit block codes at the same time, performing legal identity authentication, authorizing a sub unit block manager after authentication passes, setting manager authority and internal management approval flow, performing manager identity authentication, authorizing the manager identity authentication by the sub unit block manager after authentication passes, enabling a cone block chain to perform real-time authentication on the manager identity, generating a sub unit block manager hash value by hash operation by virtue of manager authority and internal management approval flow and time stamp; generating the manager information of the sub unit block, storing the manager information in the sub unit block, and carrying out hash operation to form a hash value of the manager information, and storing the hash value in a block head.
The administrator of the user block and the method for generating the hash value of the administrator are as follows:
after the sub unit blocks are generated, registering different user blocks according to different user information applications, and generating user block codes at the same time; after passing the authentication of the sub unit block manager, carrying out user block manager identity authentication and manager authorization; setting authority of a user block manager and an internal management approval process; after the Cone blockchain authentication is passed, the user blockmanager authorizes authentication, manager identity authentication, manager authority and internal approval flow, micro-block manager information hash value, time stamp and generation of user blockmanager information, and the user blockchain information is stored in a user blockblock, the hash operation forms a manager information hash value and is stored in a blockhead.
For legal user blocks, secondary unit blocks, and administrator generation methods for secondary user blocks: a legal user block manager generates a method same node block; generating a method same-item unit block by a two-level unit block manager; the second-level user block manager generating method and the user block; for example:
the generation of the second-level unit block manager and the manager hash value refers to that after the identity of the second-level unit block passes the real-time authentication, user block manager authorization and manager identity verification can be performed through a cone block chain identity authorization system, manager authority and internal management approval flow are set, after the cone block chain authentication, the manager is authorized to authenticate, manager identity authentication, manager authority and internal approval flow and time stamp generate second-level unit block manager information, and the manager hash value is formed through hash operation.
For micro-tiles:
the main micro-block registration generates a main micro-block code, legal identity authentication is carried out, a main micro-block manager is authorized after authentication is passed, manager authority and internal management approval flow are set, manager identity authentication is carried out, and after authentication is passed, the main micro-block authorizes manager identity authentication, time stamp and hash operation to generate a main micro-block manager hash value. The hash value of the secondary micro-block manager is authenticated by the primary micro-block in real time and is obtained according to the transmission mechanism of the cone block chain. (the secondary micro-tile obtains the master micro-tile manager hash value according to the association rule transmission mechanism of the Cone blockchain)
The secondary micro-tile manager information is formed from primary micro-tile manager information, such as:
education department (node block), the academic department (sub-unit block), specifically the information about the person's academic (user block), specifically the highest person's academic (micro-block), also called master micro-block.
A certain business unit (node block), personnel part (item unit block), identity information of a certain person (user block), academic information of a certain person (micro-block) also called sub-micro-block,
the micro-block manager information of a certain public institution is derived from micro-blocks of the education part, the manager information of the micro-blocks of the education part is derived from the authorization authentication of the micro-block manager of the education part, the identity authentication of the micro-block manager is achieved, and the micro-block manager authority, the internal approval flow and the time stamp generate the micro-block manager information of the education part.
The node blocks are public security departments, subordinate sub-item blocks are all departments of the public security organization, the public security departments need to register node block codes for applying for the public security organization, a legal person authorizes a public security organization manager, then the manager identity is verified through a cone identity authorization system, and time stamp information is added through internal authority and internal management approval flow to form node block manager information. The subordinate sub-unit block administrators of the public security organization are authorized by corresponding block legal persons, the identities of the administrators pass through the cone block chain identity authentication system again, the administrator authority and the internal management approval flow are set, hash values and time stamps of the subordinate sub-unit block administrators pass through authentication, and the public security department block administrator information is generated. The user block manager needs to be authorized by a legal person corresponding to public security, user block manager authorization and manager identity verification are carried out through a Cone block chain identity authorization system, and a time stamp is added to carry out hash operation to form a hash value of the user block manager.
Further, as shown in fig. 3, each administrator of the node block, the itemizing unit block and the user block can log out and change, and the log out and change method is as follows:
firstly, carrying out identity real-time authentication in a cone block chain by legal persons of each block, and applying for an authorized manager to log off after the authentication is passed; and generating a cancellation hash value according to the cancellation information hash operation, and changing after cancellation to regenerate the corresponding new manager and the new manager hash value.
The cancellation hash value is generated by the real-time authentication of the identity of the block legal person, the authentication cancellation authorized by the administrator and the timestamp hash operation.
The method comprises the following steps:
the node block legal person carries out the real-time authentication of the identity of the cone block chain, and after the authentication is passed, the authorized manager can be applied to log off. The node block legal identity is authenticated in real time, the cancellation authentication is authorized, and the cancellation hash value is generated by the timestamp hash operation. And re-authorizing to generate a new manager hash value according to the method for generating the node block manager authorization.
The person in the sub unit block law performs real-time identity authentication of the Cone block chain, and after the authentication is passed, an authorized manager can be applied to log off. The person identity of the sub-unit block method is authenticated in real time, the cancellation authentication is authorized, and the cancellation hash value is generated through the timestamp hash operation. And re-authorizing to generate a new manager hash value according to the method for generating the manager authorization of the sub-unit block.
The user block legal person carries out the real-time authentication of the identity of the Cone block chain, and after the authentication is passed, the authorized manager can be applied to log off. User block legal identity real-time authentication, authorized cancellation authentication and timestamp hash operation to generate cancellation hash value. And re-authorizing to generate a new manager hash value according to the method for generating the manager authorization of the user block.
And the second-level unit block manager logs out, the user block legal person of the sub unit block performs real-time authentication through the Cone block chain identity, the authorized manager is applied to log out, and the logging-out hash value is generated through the real-time authentication, authorized logging-out authentication and the timestamp hash operation of the second-level unit block legal person identity. And re-authorizing to generate a new administrator according to the second-level unit block administrator authorization generation method.
And (3) logging off the master micro-block manager, applying for logging off the authorized manager after the master micro-block legal person authenticates the identity of the master micro-block legal person in real time through the cone block chain, and generating a logging off hash value through the real-time authentication, the authorized logging off authentication and the timestamp hash operation of the identity of the master micro-block legal person. And re-authorizing to generate a new administrator according to the master micro-block administrator authorization generation method.
The secondary micro-tile manager changes are acquired by the primary micro-tile change broadcast: the secondary micro-block manager change information is synchronized with the primary micro-block, and the primary micro-block change method is the same as the user block change method.
For example: the legal person of the civil administration carries out the real-time authentication of the identity of the cone block chain, and after the authentication is passed, the authorized manager can be applied to log off. The civil administration codes, legal identity real-time authentication, authorized cancellation authentication and timestamp hash operation to generate cancellation hash value. And re-authorizing to generate a new manager hash value according to the method for generating the manager authorization of the civil administration. Cone blockchain identity real-time authentication is carried out by a legal person of an established institution in the civil government office, and after the authentication is passed, the authorized manager can be applied to log off. The civil administration establishes an organization code, legal identity real-time authentication, authorized cancellation authentication and timestamp hash operation to generate cancellation hash value. And re-authorizing to generate a new manager hash value according to a method for generating the authorization of the built-in organization manager of the civil administration. The welfare institution is a legal user of the civil government agency, and the welfare institution legal performs real-time identity authentication of the Cone blockchain, and can apply for the authorized manager to log off after the authentication is passed. Welfare institution coding, legal identity real-time authentication, authorized cancellation authentication and timestamp hash operation to generate hash value. And re-authorizing to generate a new manager hash value according to the method for generating the manager authorization of the welfare institution. Logging off by a welfare institution internal gate manager, applying for logging off by an authorized manager after the welfare institution legal personnel of the welfare institution department authenticates the identity in real time through a cone block chain, and generating a logging off hash value by the welfare institution department code, the legal identity real-time authentication, the authorized logging off authentication and the timestamp hash operation. And re-authorizing to generate a new manager according to the manager authorization generation method of the welfare institution department.
And generating an administrator hash value by the Cone block chain block administrator, broadcasting the administrator hash value to the consensus blocks according to a broadcasting transmission mechanism of the Cone blocks, and performing consensus storage after the comparison of the consensus administrators corresponding to the consensus blocks is successful.
The method comprises the steps of verifying user manager information of a node block, a sub unit block, a user block, a legal user block, a secondary unit block, a secondary user block and a main micro block, comparing manager hash values, if the manager hash values are the same, verifying specific contents is not performed, namely, verification is passed, if the manager hash values are different, comparing whether the specific contents are changed, wherein the specific comparison contents are as follows: block legal person authentication, manager logout authentication, new authorized manager authentication, manager change flow authentication.
The secondary micro-block receives the information of the main micro-block manager logging-off and the new authorization change, performs verification, verifies whether the hash value of the logging-off manager is consistent with that of the reserved manager, and performs consensus storage after successful comparison, if the hash value of the new authorization manager is consistent with that of the original manager, the hash value of the new authorization manager is consistent with that of the associated consensus block manager.
The information verification of the secondary micro-block manager is carried out by broadcasting and receiving the information of the cancellation and the new authorization change of the primary micro-block manager, and the content of comparison is the same as that of the primary micro-block manager.
For example: and verifying a manager of a certain department of the public security organization, and after the manager applies for success, broadcasting the related information of the manager and the hash value generated by the related information to the department associated with the department, comparing the related department with the manager legal person, canceling the authentication, newly authorizing the authentication, and realizing the verification process of the manager by changing the flow of the manager and authorizing the manager authentication.
The administrator verification of the personal learning information needs to verify the administrator of the micro-block of the learning department corresponding to the education department, but does not verify the learning information administrator of the person corresponding to the personnel department of the organization.
Further, a management system is used for realizing each-level block manager authentication generation, authorization, change, hash operation, consensus storage, verification and association verification. The administrator system alone may also constitute a pyramidal blockchain system. Can be independently used for making a personnel management system (a national institute, an enterprise personnel assignment cone block chain system).
The preferred embodiments of the present invention have been described in detail, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the spirit of the present invention, and the various changes are included in the scope of the present invention.

Claims (6)

1. A cone block chain management method is characterized in that: the cone block chain mainly comprises cone blocks, wherein the cone blocks comprise node blocks, sub unit blocks and user blocks, the sub unit blocks are lower blocks of the node blocks, and the user blocks are lower blocks of the sub unit blocks; the node blocks, the sub unit blocks and the user blocks are connected to form cone blocks;
the node block, the sub unit block and the user block respectively comprise corresponding manager information and manager information hash values, wherein the node block manager information comprises hash values of lower-level sub unit block manager information, and the sub unit block manager information comprises hash values of lower-level user block manager information; information in each manager and hash value change of the information are obtained through broadcasting of a cone block chain;
the information in each manager comprises the authorization authentication information of the manager of the block, the identity authentication information of the manager of the block, the authority of the block, the internal approval flow of the block and the information hash value of the lower-level manager of the block;
the method for generating the hash value of the administrator of the node block comprises the following steps:
generating a node block code after the node block applies for registration; the node block legal person performs legal person identity authentication on the cone block chain; after the authentication is passed, carrying out authentication and authorization of the node block manager; setting the authority of a node block manager and an internal management approval process; after the Cone blockchain authentication is passed, the node blockchain manager authorizes authentication, manager identity authentication, manager authority and internal approval flow, and the information hash value, the time stamp and the generated node blockchain manager information of the sub unit blockchain manager are stored in the node blockchain block, the hash operation forms the manager information hash value which is stored in the block head;
the administrator of the sub unit block and the method for generating the hash value of the administrator are as follows:
after the node blocks are generated, the node blocks are positioned in the cone block chain according to node codes; registering different subentry unit blocks according to different service property applications, and generating subentry unit block codes at the same time; after the authentication of the node block manager is passed, carrying out authentication and manager authorization of the sub unit block manager; setting authority of a subitem unit block manager and internal management approval flow; after the authentication of the subunit block manager passes through the Cone blockchain authentication, the administrator authorizes authentication, administrator identity authentication, administrator authority and internal approval flow, user block administrator information hash value, time stamp, generating subunit block administrator information, storing in a subunit block area block, forming an administrator information hash value by hash operation, and storing in a block head;
the administrator of the user block and the method for generating the hash value of the administrator are as follows:
after the sub unit blocks are generated, different user blocks are registered according to different user information applications, and user block codes are generated at the same time; after passing the authentication of the sub unit block manager, carrying out user block manager identity authentication and manager authorization; setting authority of a user block manager and an internal management approval process; after the Cone blockchain authentication is passed, the user blockmanager authorizes authentication, manager identity authentication, manager authority and internal approval flow, micro-block manager information hash value, time stamp and generation of user blockmanager information, and the user blockchain information is stored in a user blockblock, the hash operation forms a manager information hash value and is stored in a blockhead.
2. The method of claim 1, wherein: each administrator of the node block, the item unit block and the user block can be logged out and changed, and the logging out and changing methods are as follows:
firstly, carrying out identity real-time authentication in a cone block chain by legal persons of each block, and applying for an authorized manager to log off after the authentication is passed; and generating a cancellation hash value according to cancellation information operation, and changing after cancellation to regenerate the corresponding new manager and the new manager hash value.
3. The method of claim 2, wherein: the manager logout hash value is generated by the real-time authentication of the identity of the block legal person, the authorization of the block manager to logout authentication and the timestamp hash operation.
4. The method of claim 1, wherein: and generating an administrator hash value by the Cone block chain block administrator, broadcasting the administrator hash value to all the consensus blocks according to a broadcast transmission mechanism, and performing consensus storage after the administrator information corresponding to all the consensus blocks is successfully compared.
5. The method of claim 4, wherein: the administrator information verification and comparison content comprises the following steps: block legal person authentication, manager logout authentication, new authorized manager authentication, manager change flow authentication.
6. A pyramidal blockchain management system, characterized by: a management system for implementing block administrator authentication generation, authorization, change, hash, consensus storage, verification, and association verification of any of claims 1 to 5.
CN202011021065.6A 2020-09-25 2020-09-25 Cone blockchain management method and system Active CN112149073B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011021065.6A CN112149073B (en) 2020-09-25 2020-09-25 Cone blockchain management method and system
PCT/CN2021/119881 WO2022063172A1 (en) 2020-09-25 2021-09-23 Cone blockchain management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011021065.6A CN112149073B (en) 2020-09-25 2020-09-25 Cone blockchain management method and system

Publications (2)

Publication Number Publication Date
CN112149073A CN112149073A (en) 2020-12-29
CN112149073B true CN112149073B (en) 2023-09-29

Family

ID=73896941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011021065.6A Active CN112149073B (en) 2020-09-25 2020-09-25 Cone blockchain management method and system

Country Status (2)

Country Link
CN (1) CN112149073B (en)
WO (1) WO2022063172A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112149073B (en) * 2020-09-25 2023-09-29 山西特信环宇信息技术有限公司 Cone blockchain management method and system
CN112769917B (en) * 2020-12-31 2022-08-02 山西特信环宇信息技术有限公司 Owner power alliance chain of cone block chain
CN112822687B (en) * 2020-12-31 2023-03-24 山西特信环宇信息技术有限公司 Cone block chain mobile terminal authentication method
CN113407626B (en) * 2021-06-16 2024-05-10 深圳大学 Planning management and control method based on blockchain, storage medium and terminal equipment
CN117040718A (en) * 2023-08-23 2023-11-10 重庆易保全网络科技有限公司 Electronic visa method, system and terminal based on multi-level chained mode

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147735A (en) * 2017-05-12 2017-09-08 北京博晨技术有限公司 A kind of distributed account book system based on hierarchy
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358420B (en) * 2017-06-09 2020-08-11 北京博晨技术有限公司 Block chain system for realizing hot spot account and method for realizing hot spot account
WO2019055585A1 (en) * 2017-09-12 2019-03-21 Kadena Llc Parallel-chain architecture for blockchain systems
US20190303933A1 (en) * 2019-06-05 2019-10-03 Bitwage, Inc. Novel application of blockchain data structure for insurance certificate management
CN111314436A (en) * 2020-01-20 2020-06-19 柏建华 Hierarchical block chain system and implementation method
CN112149073B (en) * 2020-09-25 2023-09-29 山西特信环宇信息技术有限公司 Cone blockchain management method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147735A (en) * 2017-05-12 2017-09-08 北京博晨技术有限公司 A kind of distributed account book system based on hierarchy
CN109639632A (en) * 2018-11-02 2019-04-16 远光软件股份有限公司 User information management method, electronic equipment and storage medium based on block chain

Also Published As

Publication number Publication date
CN112149073A (en) 2020-12-29
WO2022063172A1 (en) 2022-03-31

Similar Documents

Publication Publication Date Title
CN112149073B (en) Cone blockchain management method and system
CN111988338B (en) Permission-controllable Internet of things cloud platform based on block chain and data interaction method
CN112055025B (en) Privacy data protection method based on block chain
CN111400749B (en) Government affair financial data sharing platform based on block chain and implementation method thereof
CN112148787B (en) Cone block, cone block chain structure and method
CN107231299A (en) A kind of chain route and realized the system that block chain communicates across chain
CN111444277B (en) Anti-terrorism information cooperative sharing platform and method based on blockchain technology
CN106789090A (en) Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN108229962A (en) Right management method and system based on block chain
CN110278462A (en) A kind of mobile film projection authorization management method based on block chain
CN111445238A (en) Electronic deposit certificate system based on block chain
CN109815748A (en) A kind of centre data source method for monitoring based on block chain
CN114285867B (en) Air-railway combined transport data sharing system based on alliance chain and attribute encryption
US20220020008A1 (en) Smart Contract-Based Electronic Contract Preservation System
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
CN113902384B (en) Tracing method and system based on RFID and intelligent contract
CN111444267A (en) Government information sharing platform and method based on block chain
CN112116349B (en) High-throughput-rate-oriented random consensus method and device for drawing account book
CN110555783B (en) Block chain-based electric power marketing data protection method and system
Guo et al. Antitampering scheme of evidence transfer information in judicial system based on blockchain
Bary et al. Multiple Layer Public Blockchain Approach for Internet of Things (IoT) Systems (January 2024)
CN112199729B (en) Cone blockchain verification method and system
CN109284630A (en) File editing method and system, agent node
CN111402104B (en) Block chain-based public security data management platform and method
Zhu et al. HCSC: A Hierarchical Certificate Service Chain Based on Reputation for VANETs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant