CN112199445A - Hierarchical structure of pyramidal block chain - Google Patents

Hierarchical structure of pyramidal block chain Download PDF

Info

Publication number
CN112199445A
CN112199445A CN202011256084.7A CN202011256084A CN112199445A CN 112199445 A CN112199445 A CN 112199445A CN 202011256084 A CN202011256084 A CN 202011256084A CN 112199445 A CN112199445 A CN 112199445A
Authority
CN
China
Prior art keywords
layer
authentication
block
terminal
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011256084.7A
Other languages
Chinese (zh)
Other versions
CN112199445B (en
Inventor
李俊
李晶宇
武少华
张琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Prestige Information Technology Co ltd
Original Assignee
Global Prestige Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Global Prestige Information Technology Co ltd filed Critical Global Prestige Information Technology Co ltd
Priority to CN202011256084.7A priority Critical patent/CN112199445B/en
Publication of CN112199445A publication Critical patent/CN112199445A/en
Priority to PCT/CN2021/120041 priority patent/WO2022100291A1/en
Application granted granted Critical
Publication of CN112199445B publication Critical patent/CN112199445B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention belongs to the technical field of block chains, and particularly relates to a hierarchical architecture of a cone block chain, which comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer; the data layer realizes the safety of data storage and the consistency of data; the network layer is packaged with a cone block chain system networking mode; the contract is packaged with script codes, algorithms and intelligent contracts of the cone block chain; the consensus layer is used for realizing consensus of the cone block chain system and is packaged with a consensus algorithm. The network layer is composed of a data layer, a network layer, a consensus layer, a contract layer and an application layer, wherein: the data layer is the technology of the bottom layer of the cone block chain, mainly realizes the safety of data storage and the consistency of data, the network layer encapsulates the networking mode of the cone block chain system, and the contract layer encapsulates various script codes, algorithms and intelligent contracts of the cone block chain, so that the foundation for realizing the flexible programming and data operation of the cone block chain system is realized.

Description

Hierarchical structure of pyramidal block chain
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a hierarchical structure of a cone block chain.
Background
With the rise of digital currency, the blockchain technology has gained more and more attention, and is a bottom-layer technology of the bitcoin, which is a decentralized, multi-block maintenance distributed database, wherein data consistency and security are realized through a merkel tree data structure, a distributed storage technology, a cryptography principle, and a consensus algorithm.
The hierarchical structure of the block chain is divided into a data layer, a network layer, a consensus layer, a contract layer, an excitation layer and an application layer, wherein the necessary hierarchy is the data layer, the network layer and the consensus layer, the data layer, the network layer and the consensus layer form the bottom layer foundation of the block chain hierarchy, and one layer is indispensable. Contract, stimulus, application layers, are not essential in blockchain technology, such as: the bitcoin has no contract layer. The six levels are independent and inseparable, and the whole block chain level structure is formed.
The block chain as a novel technology has some defects, except for the influence of policy factors, the block chain has a slow storage speed, the transaction confirmation time is long, and the requirement of high-frequency storage in the modern society cannot be met.
The block chain is characterized by decentralization, and the centers are not determined by a consensus algorithm at a certain level, so that the consistency and safety of information depend on the consensus algorithm extremely.
Therefore, the invention provides a hierarchical architecture and a method of a cone block chain, which establish a new block chain hierarchical architecture to ensure the safety and consistency of the cone block chain system.
Disclosure of Invention
In view of the above technical problems, the present invention provides a hierarchical architecture of a pyramid block chain, which solves some disadvantages of block chain decentralization and the problem of fuzzy hierarchy of the pyramid block chain.
In order to solve the technical problems, the invention adopts the technical scheme that:
a hierarchical architecture of pyramidal blockchains, characterized in that: the cone block chain comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer;
in particular, the data layer realizes the safety of data storage and the consistency of data;
particularly, a network layer is encapsulated with a cone block chain system networking mode;
particularly, the consensus layer is used for realizing consensus of the cone block chain system and is packaged with a consensus algorithm;
particularly, the contract layer is packaged with script codes, algorithms and intelligent contracts of the cone block chains;
in particular, the application layer encapsulates various application scenarios and cases of the pyramidal blockchain.
The data layer is packaged with a cone data block, a cone chain structure, a time stamp, a random number, a hash function, a dynamic key, asymmetric encryption and consensus storage.
The network layer realizes the block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and performs data verification of broadcast transmission according to a verification mechanism; establishing a cone block chain according to a consensus relationship and a consistency consensus algorithm;
the consensus layer realizes the connection of the consensus relationship of all blocks to form a cone block chain encryption chain network, wherein the blocks of the cone block chain are connected with other blocks according to the same-row consensus relationship of the consensus layer; establishing same-column same-layer and non-column same-layer connection according to the same-column same-layer and non-column same-layer relations of the cone block chain to form a cone hierarchical chain data structure; establishing cross-column and cross-level connection among the blocks according to the non-column non-same-layer relation of the blocks;
the contract layer comprises script codes, an algorithm mechanism and an intelligent contract, and automatically realizes broadcasting and data transmission of the cone block chain.
The application layer is packaged with a cone block chain terminal layer, a basic layer, a permission qualification layer, a product layer, an asset analysis layer, a credit layer and a sharing layer.
A hierarchy of pyramidal block chains is provided,
in particular, the terminal layer comprises any one or more of a PC terminal, a mobile terminal, a sensor terminal and a data terminal;
particularly, the basic layer comprises a human-computer-integrated block authentication block, a personal identity authentication block and a legal identity authentication block;
specifically, the permission qualification layer comprises a permission authentication block, a qualification authentication block and an identity relation certification block;
in particular, the product layer includes a production and management legal user block, a currency issuing and financial legal user block;
particularly, the asset analysis layer comprises product attributes, currency attributes and value circulation cone identity filing and analysis;
in particular, the credit layer includes personal credits, corporate credits, and social credits;
in particular, the sharing layer includes product sharing, asset resource sharing, wealth sharing, and social sharing.
The layered application method of the application layer comprises the following steps:
s1, the cone block chain terminal initiates a request, and the application layer starts a cone block chain key according to the authentication information;
s2, the permission qualification layer of the cone block chain application layer is that the terminal layer sends a request by the personal identity or the identity of a legal person, after passing the authentication of the basic layer, the request is sent to a permission or qualification authentication block corresponding to the personal or legal person for the permission or qualification authentication corresponding to the identity, and after passing the authentication, the authentication information is sent to the terminal;
s3, the product layer and the terminal layer send out requests, after the basic layer passes the authentication, the products are allowed to be approved, after the basic layer passes the authentication, the products are sent to the legal second-level cell block for product information authentication, and after the authentication, the authentication information is sent to the terminal;
s4, the asset analysis layer and the terminal send an authentication request, the authentication of the basic layer block is the asset of the permitted product, the authentication of the permitted layer block is performed, the authentication of the product and the circulation block is performed, the asset is recorded, and the authentication information is returned to the terminal after the authentication of the qualification recording layer;
s5, the credit layer terminal layer sends out request, the basic layer passes the certification, it is the certification of the product, after passing the certification, it sends the certification to the resource layer to carry out the certification of the product and the output, and sends the certification information to the terminal after the certification of the asset register and the finance;
s6, a sharing layer and a terminal layer send requests, a base layer authenticates and sends a permission layer, a permission layer authenticates and sends a product layer, a product layer authenticates and sends a resource layer, and an asset layer authenticates and sends a credit layer, so that the product sharing is realized on the basis of product production capacity and sales authentication, the asset sharing is realized on the basis of asset authentication and registration record authentication, and the value sharing is realized on the basis of financial authentication.
The cone block chain terminal initiates a request with a personal identity, and carries out the authentication of the human-machine-integrated authentication in the human-machine-integrated authentication block of the cone block chain, and after the authentication is passed, the cone block chain terminal sends the cone block chain to the personal identity authentication block corresponding to the certificate number to carry out biological identification and terminal collection living body comparison to carry out identity information authentication; the authentication information returns to the terminal to display the authentication information.
The cone block chain terminal initiates a request by the identity of a legal person, and after passing the authentication of the registered human-computer-integrated authentication block, the cone block chain terminal sends the request to a legal person representative or legal person authorized representative corresponding to the certificate number; the identity authentication block of the individual registration is compared with the biological information of the living body collected by the terminal, and the comparison result is sent to the authentication block of the legal person registration for identity information authentication of the legal person; after the authentication is passed, sending authentication information to the terminal; the authentication information returns to the terminal to display the authentication information.
Compared with the prior art, the invention has the following beneficial effects:
the cone block chain hierarchical structure consists of a data layer, a network layer, a consensus layer, a contract layer and an application layer, wherein: the data layer is a technology of the bottommost layer of the cone block chain, mainly achieves safety of data storage and data consistency, the network layer encapsulates a networking mode of the cone block chain system, the consensus layer achieves consensus of the cone block chain distributed system, and the contract layer encapsulates various script codes, algorithms and intelligent contracts of the cone block chain, and is a basis for achieving flexible programming and data operation of the cone block chain system. The application layer is a display layer of the cone block chain and encapsulates various application scenes and cases of the cone block chain.
The built cone block chain hierarchical structure solves the problem of block chain decentralization, and the cone block ecological system is built by building the cone block chain hierarchical structure to realize the consistency and the uniformity of the cone block chain system.
Drawings
FIG. 1 is a schematic diagram of a hierarchical architecture of the pyramidal blockchain of the present invention;
FIG. 2 is a schematic illustration of the cone blockchain application level of the present invention;
FIG. 3 is a schematic diagram of an exemplary pyramidal blockchain application level architecture;
FIG. 4 is a schematic view of the cone block structure of the present invention;
FIG. 5 is a schematic view of a pyramidal block chain structure according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a hierarchical architecture and method of a pyramidal volume block chain is composed of a data layer, a network layer, a consensus layer, a contract layer, and an application layer, wherein:
s1, the data layer is the technology of the bottommost layer of the cone block chain, mainly realizes the safety of data storage and the consistency of data, and specifically comprises the cone data block, a cone chain structure, a time stamp, a random number, a hash function, a dynamic key, asymmetric encryption and consensus storage.
S2, the networking mode of the cone block chain system encapsulated by the network layer specifically comprises the following steps: P2P network mutual authentication, broadcast transmission mechanism, verification mechanism.
S3, the contract layer encapsulates various script codes, algorithms and intelligent contracts of the cone block chain, and the contract layer is the basis for realizing flexible programming and operation data of the cone block chain system. The method comprises the following steps: cone script code, algorithm mechanism, intelligent contracts.
S4, the consensus layer realizes the consensus of the cone block chain distributed system, and the consensus comprises the following steps: the method comprises a same-column upper-lower level association consensus algorithm, a same-column same-layer association consensus algorithm, a non-column same-layer association consensus algorithm and other association consensus algorithms.
S5, the application layer is a display layer of the cone block chain and encapsulates various application scenes and cases of the cone block chain, and the application layer specifically comprises a cone block chain terminal layer, a base layer, a permission qualification layer, a product layer, an asset analysis layer, a credit layer and a sharing layer.
As shown in fig. 2, an application layer is the topmost layer of a pyramidal block chain hierarchical framework, and is the salient feature and the core of a pyramidal block chain, where each layer of hierarchical content includes:
and S1, the terminal layer comprises a PC terminal, a mobile terminal, a sensor terminal and a data terminal.
S2, the basic layer comprises: a person-card machine integrated block authentication block, a personal identity authentication block and a legal identity authentication block.
S3, the permission qualification layer includes: an admission authentication block, a qualification authentication block, and an identity relationship proof block.
S4, the product layer comprises: production and management legal user blocks, currency issuing and financial legal user blocks.
S5, the asset resolution layer comprises: product attributes, currency attributes, value flow pyramid identity filing and parsing.
S6, the credit layer comprises: personal credit, corporate credit, social credit.
S7, the sharing layer comprises: product sharing, asset resource sharing, wealth sharing and social sharing.
And a data layer, a network layer, a consensus layer, a contract layer and an application layer of the cone block chain form the whole ecosystem of the cone block.
Further, a data layer and a network layer of the cone block chain and a bottom layer technical framework forming the cone block chain.
Furthermore, a terminal of the cone block chain application layer, a base layer, a permission qualification layer, a product layer, assets, an identity analysis layer, a credit layer, a sharing layer and an application layer hierarchical architecture are formed together.
The cone block chain bottom layer technology architecture and the layered application of the application layer hierarchical architecture form a subsystem of the cone block chain.
The cone block chain bottom layer technology data structure and the layering method are as follows:
s1, the blocks of the pyramidal block chain are connected to each block of the sector in the same-row consensus relationship of the consensus layer, that is, the upper block and the lower blocks of the block are connected.
S2, establishing same-column same-layer and non-column same-layer connection according to the same-column same-layer and non-column same-layer relations of the cone block chain, and forming a cone hierarchical chain data structure.
S3, establishing cross-column and cross-hierarchy connection among the blocks according to the non-column non-peer relationship of the blocks.
And S4, storing the data content in each block of the cone block in a layered manner by using the association consensus relationship of the consensus storage, and forming a cone block chain encryption chain network by using a dynamic key and an asymmetric encryption method.
S5, the network layer realizes block point-to-point mutual authentication and point-to-point broadcast data transmission of the cone block chain, and performs data verification of broadcast transmission according to a verification mechanism.
S6, establishing the cone block network according to the consensus relationship and the consistency consensus algorithm.
S7, automatically realizing the broadcast data transmission of the cone block chain according to the script code, the algorithm mechanism and the intelligent contract of the contract layer.
As shown in fig. 3, the hierarchical application method of the pyramid block application layer:
s1, the cone block chain terminal initiates a request with the personal identity, the person-card-machine-integrated authentication is carried out in the person-card-machine-integrated authentication block of the cone block chain, and after the authentication is passed, the person-card-machine-integrated authentication block is sent to the personal identity authentication block corresponding to the certificate number to carry out the biological identification and the terminal living body collection comparison so as to carry out the identity information authentication. The authentication information returns to the terminal to display the authentication information.
And S2, the cone block chain terminal initiates a request by the identity of the legal person, and after passing the authentication of the registered person-certificate-machine integrated authentication block, the request is sent to the legal person representative or legal person authorized representative corresponding to the certificate number. And the identity authentication block of the individual registration is compared with the biological information of the living body collected by the terminal, and the comparison result is sent to the authentication block of the legal person registration to authenticate the identity information of the legal person. And after the authentication is passed, sending authentication information to the terminal. The authentication information returns to the terminal to display the authentication information.
And S3, the cone block chain terminal initiates a request, and the application layer opens the cone block chain key according to the authentication information.
S4, the permission qualification layer of the cone block chain application layer is that the terminal layer sends a request by the personal identity or the identity of a legal person, after passing the authentication of the basic layer, the request is sent to a permission or qualification authentication block corresponding to the personal or legal person to carry out the permission or qualification authentication corresponding to the identity, and after passing the authentication, the authentication information is sent to the terminal.
S5, the product layer and the terminal layer send out request, after the basic layer passes the certification, the product is certified, after the certification, the product is sent to the legal second-level cell block for product information certification, and after the certification, the certification information is sent to the terminal
S6, the asset analysis layer and the terminal send authentication request, which is the asset of the permitted product through the authentication of the base layer block, is the product and circulation block authentication and the record asset through the authentication of the product layer block, and returns the authentication information to the terminal through the qualification record layer authentication.
S7, the credit layer terminal layer sends out request, the basic layer passes the certification, it is the certification of the product, after passing the certification, it sends the certification to the resource layer to carry out the certification of the product and the output, and sends the certification information to the terminal after the certification of the asset register and the finance.
S8, a sharing layer and a terminal layer send requests, a base layer authenticates and sends a permission layer, a permission layer authenticates and sends a product layer, a product layer authenticates and sends a resource layer, and an asset layer authenticates and sends a credit layer, so that the product sharing is realized on the basis of product production capacity and sales authentication, the asset sharing is realized on the basis of asset authentication and registration record authentication, and the value sharing is realized on the basis of financial authentication.
Further, the cone block chain basic authentication is personal identity authentication and legal identity authentication
Further, the authentication of the cone block chain terminal is a certificate-machine-integrated authentication.
The above-mentioned cone blocks and cone block chains are described in detail in a cone block, cone block chain structure and method of patent application No. 202010797084.1, and therefore, the following is briefly described here:
as shown in fig. 4 and 5, the block is the top-level block of the pyramid block; the item-dividing unit block is a middle layer block of the cone block, belongs to a classification block of the block and is a sub-block of the block; the user tile is the bottom tile of the pyramid tile.
Each sub-block in the pyramid block is composed of a block head and a block body, wherein the block head mainly contains a block code, an associated block hash value, a service network address, a server identification, a time stamp, an administrator information hash value and a block content hash value, and the block body contains administrator information and block content. The administrator information comprises the registration, the change and the logout of an administrator; the block content comprises verification content, associated verification content and other block content.
The user block can apply for a secondary unit block and a secondary user block according to self service contents, such as providing a public platform; the user blocks, the secondary unit blocks and the secondary user blocks form pyramid blocks. There are also some organizations that have no user tiles, or no subentry tiles.
The cone block chain structure comprises a plurality of cone blocks, wherein one cone block is a total cone block, and other cone blocks are divided according to the categories or properties of the cone blocks: the cone blocks of the same category or property are positioned in the same row, and the blocks in the cone blocks on the same row are connected to form a linear chain; forming a plurality of rows of linear chains according to different categories or properties; blocks in the total cone block are intersected among the linear chains in different rows, and the whole cone block chain structure is formed.
Cone blocks in the same row are layered according to the levels and form a private chain according to the association consensus relationship; forming cone union chains by the linear chains in different columns according to a consensus relationship; tapered blocks of the same grade include more than one tapered block of the same grade on the same layer, i.e., the same layer in the same row.
Private chain: mechanisms with the same property are positioned in the same row of the cone block chains, and each cone block forms a private chain according to the consensus relationship; federation chain: mechanisms with different properties are positioned in different rows of the cone block chains, and all cone blocks form a alliance chain according to a consensus relationship; specifically, the method comprises the following steps: may be classified into different levels 3-6 according to the level of rights (or level of membership).
For example: the connection between the public security of Shanxi province, the public security of the Shuzhou city and the public security of the Pinlu area is a private chain; the connection between the Shanxi province public security, the Shanxi province civil and political bureau, the Shanxi province labor bureau and the like is a alliance chain.
The hierarchical relationship is from top to bottom: block, item unit block, user block, secondary unit block, secondary user block, micro block.
The block, the item dividing unit block and the user block respectively generate administrator and administrator hash values corresponding to the block, the item dividing unit block and the user block, wherein the block administrator hash value comprises a hash value of a lower item dividing unit block administrator, and the item dividing unit block administrator hash value comprises a lower user block administrator hash value; information changes in each administrator may form hash values and broadcast over the cone blockchain.
In each login process, living body biological information is collected through a cone block chain client; combining the collected living body biological information with the user information, the timestamp and the random number which pass the authentication of the personal identity authentication block, and generating a private key through Hash operation; the private key is dynamically generated, and different private keys are formed by logging in each time; the private key is generated to form the public key.
After the private key is generated, a public key is generated through an elliptic curve algorithm; and carrying out hash operation on the public key and the timestamp information to form a cone area block chain client address, storing the private key in the cone area block chain client, and sending the public key in a cone area block chain network.
Although only the preferred embodiments of the present invention have been described in detail, the present invention is not limited to the above embodiments, and various changes can be made without departing from the spirit of the present invention within the knowledge of those skilled in the art, and all changes are encompassed in the scope of the present invention.

Claims (10)

1. A hierarchical architecture of pyramidal blockchains, characterized in that: the system comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer;
the data layer realizes the safety of data storage and the consistency of data;
the network layer is packaged with a cone block chain system networking mode;
the consensus layer is used for realizing consensus of the cone block chain system and is packaged with a consensus algorithm;
the contract layer is packaged with script codes, algorithms and intelligent contracts of the cone block chains;
the application layer encapsulates various application scenarios and cases of the pyramidal blockchain.
2. The hierarchical architecture of pyramid blockchains according to claim 1, wherein: the data layer is packaged with a cone data block, a cone chain structure, a time stamp, a random number, a hash function, a dynamic key, asymmetric encryption and consensus storage.
3. The hierarchical architecture of pyramid blockchains according to claim 1, wherein: the network layer realizes the block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and performs data verification of broadcast transmission according to a verification mechanism; and establishing a cone block chain according to a consensus relationship and a consistency consensus algorithm.
4. The hierarchical architecture of pyramid blockchains according to claim 1, wherein: the consensus layer realizes the connection of the consensus relationship of all blocks to form a cone block chain encryption chain network, wherein the blocks of the cone block chain are connected with other blocks according to the same-row consensus relationship of the consensus layer; establishing same-column same-layer and non-column same-layer connection according to the same-column same-layer and non-column same-layer relations of the cone block chain to form a cone hierarchical chain data structure; and establishing cross-column and cross-level connection among the blocks according to the non-column and non-layer relation of the blocks.
5. The hierarchical architecture of pyramid blockchains according to claim 1, wherein: the contract layer comprises script codes, an algorithm mechanism and an intelligent contract, and automatically realizes broadcasting and data transmission of the cone block chain.
6. The hierarchical architecture of pyramid blockchains according to claim 1, wherein: the application layer is packaged with a cone block chain terminal layer, a basic layer, a permission qualification layer, a product layer, an asset analysis layer, a credit layer and a sharing layer.
7. The hierarchical architecture of pyramid blockchains according to claim 6, wherein:
the terminal layer comprises any one or more of a PC terminal, a mobile terminal, a sensor terminal and a data terminal;
the basic layer comprises a human-computer-integrated block authentication block, a personal identity authentication block and a legal identity authentication block;
the permission qualification layer comprises a permission authentication block, a qualification authentication block and an identity relation certification block;
the product layer comprises a production and management legal user block, a currency issuing and financial legal user block;
the asset analysis layer comprises product attributes, currency attributes and value circulation cone identity filing and analysis;
the credit layer comprises personal credit, legal credit and social credit;
the sharing layer comprises product sharing, asset resource sharing, wealth sharing and social sharing.
8. The hierarchical architecture of pyramidal blockchains according to claim 6, wherein said method for hierarchical application of application layers comprises the following steps:
the cone block chain terminal initiates a request, and starts a cone block chain key according to the authentication information in an application layer;
the permission qualification layer of the cone block chain application layer is that the terminal layer sends a request by the personal identity or the identity of a legal person, after passing the authentication of the basic layer, the base layer sends the request to a permission or qualification authentication block corresponding to the personal identity or the legal person for the permission or qualification authentication corresponding to the identity, and after passing the authentication, the authentication information is sent to the terminal;
the product layer and the terminal layer send out requests, after the basic layer passes the authentication, the products are allowed to be authenticated, after the authentication passes, the products are sent to a legal second-level unit block for product information authentication, and after the authentication, the authentication information is sent to the terminal;
the asset analysis layer and the terminal send authentication requests, the assets of products are approved through the authentication of the base layer block, the assets of the products are approved through the authentication of the base layer block, the products and the circulation block are authenticated through the authentication of the product layer block, the assets are recorded, and the authentication information is returned to the terminal through the authentication of the qualification recording layer;
the credit layer terminal layer sends out a request, the basic layer passes the authentication, the product layer is authenticated by the licensing layer, the product layer is sent to authenticate the product and the yield after passing the authentication, the product layer is sent to the asset layer to authenticate the sales volume, and the authentication information is sent back to the terminal after the asset registration and record authentication and finance related authentication;
the system comprises a sharing layer and a terminal layer, wherein the sharing layer and the terminal layer send requests, a base layer authenticates and sends a permission layer, a permission layer authenticates and sends a product layer, a product layer authenticates and sends a resource layer, and an asset layer authenticates and sends a credit layer.
9. The hierarchical architecture of pyramid blockchains according to claim 8, wherein: the cone block chain terminal initiates a request with a personal identity, and carries out the authentication of the human-machine-integrated authentication in the human-machine-integrated authentication block of the cone block chain, and after the authentication is passed, the cone block chain terminal sends the cone block chain to the personal identity authentication block corresponding to the certificate number to carry out biological identification and terminal collection living body comparison to carry out identity information authentication; the authentication information returns to the terminal to display the authentication information.
10. The hierarchical architecture of pyramid blockchains according to claim 8, wherein: the cone block chain terminal initiates a request by the identity of a legal person, and after passing the authentication of the registered human-computer-integrated authentication block, the cone block chain terminal sends the request to a legal person representative or legal person authorized representative corresponding to the certificate number; the identity authentication block of the individual registration is compared with the biological information of the living body collected by the terminal, and the comparison result is sent to the authentication block of the legal person registration for identity information authentication of the legal person; after the authentication is passed, sending authentication information to the terminal; the authentication information returns to the terminal to display the authentication information.
CN202011256084.7A 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain Active CN112199445B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011256084.7A CN112199445B (en) 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain
PCT/CN2021/120041 WO2022100291A1 (en) 2020-11-11 2021-09-24 Hierarchical architecture of pyramid blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011256084.7A CN112199445B (en) 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain

Publications (2)

Publication Number Publication Date
CN112199445A true CN112199445A (en) 2021-01-08
CN112199445B CN112199445B (en) 2023-06-23

Family

ID=74034177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011256084.7A Active CN112199445B (en) 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain

Country Status (2)

Country Link
CN (1) CN112199445B (en)
WO (1) WO2022100291A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112750032A (en) * 2021-01-29 2021-05-04 山西特信环宇信息技术有限公司 Cash management system based on cone block chain and chain loading method thereof
CN113360445A (en) * 2021-07-07 2021-09-07 上海万向区块链股份公司 Lithium ion battery data acquisition sharing device based on block chain technology
WO2022100291A1 (en) * 2020-11-11 2022-05-19 山西特信环宇信息技术有限公司 Hierarchical architecture of pyramid blockchain

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115495714B (en) * 2022-09-14 2023-07-07 湖南大学 Financial artificial intelligence algorithm integration method and system based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147735A (en) * 2017-05-12 2017-09-08 北京博晨技术有限公司 A kind of distributed account book system based on hierarchy
CN110019347A (en) * 2018-01-02 2019-07-16 中国移动通信有限公司研究院 A kind of data processing method, device and the terminal device of block chain
CN110097445A (en) * 2018-12-11 2019-08-06 周晓辉 Internet finance cloud transaction platform and implementation method based on block chain
CN110609674A (en) * 2019-08-19 2019-12-24 杭州云象网络技术有限公司 Symbiotic information physical system construction method based on block chain technology
CN111049895A (en) * 2019-12-09 2020-04-21 北京工商大学 Improved PBFT consensus method based on ISM
CN111371905A (en) * 2020-03-27 2020-07-03 中国人民解放军国防科技大学 Block chain layered consensus proving system structure and method based on cloud computing
CN111444277A (en) * 2020-03-31 2020-07-24 中国刑事警察学院 Anti-terrorist information collaborative sharing platform and method based on block chain technology

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108337219B (en) * 2017-11-27 2021-12-28 中国电子科技集团公司电子科学研究院 Method for preventing Internet of things from being invaded and storage medium
CN108305056B (en) * 2018-03-27 2023-11-10 北京蓝亚盒子科技有限公司 Block chain-based data processing method and device and block chain node network
CN108596766A (en) * 2018-04-28 2018-09-28 深圳市优学链科技有限公司 Block chain credit rating method, apparatus, computer equipment and storage medium
CN108667618B (en) * 2018-05-10 2020-07-03 阿里巴巴集团控股有限公司 Data processing method, device, server and system for member management of block chain
CN108764925A (en) * 2018-05-31 2018-11-06 李沁福 A kind of synthesis business platform based on block chain technology
CN109118168A (en) * 2018-07-20 2019-01-01 北京开普云信息科技有限公司 A kind of government affairs service process traceability system and its construction method based on block chain mechanism
CN109379266B (en) * 2018-09-29 2021-05-07 湖南智慧政务区块链科技有限公司 Method and system for constructing multi-layer government affair block chain network based on star network
CN109472593A (en) * 2018-10-10 2019-03-15 远光软件股份有限公司 A kind of settlement method based on block chain technology, device and block chain network
CN109560938A (en) * 2019-01-23 2019-04-02 广州微盾科技股份有限公司 Based on the block catenary system for referring to human body biological characteristics identification technology
CN109859046A (en) * 2019-01-30 2019-06-07 威海华智数字经济研究院有限公司 One kind being based on block chain technology big data wisdom operation management system
CN109756589B (en) * 2019-02-20 2020-11-13 中国互联网络信息中心 Domain name information maintenance system based on block chain multi-party co-treatment
CN111461879A (en) * 2020-03-11 2020-07-28 中关村科技软件股份有限公司 Block chain-based government affair service processing system and method
CN112199445B (en) * 2020-11-11 2023-06-23 山西特信环宇信息技术有限公司 Hierarchical architecture of cone block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147735A (en) * 2017-05-12 2017-09-08 北京博晨技术有限公司 A kind of distributed account book system based on hierarchy
CN110019347A (en) * 2018-01-02 2019-07-16 中国移动通信有限公司研究院 A kind of data processing method, device and the terminal device of block chain
CN110097445A (en) * 2018-12-11 2019-08-06 周晓辉 Internet finance cloud transaction platform and implementation method based on block chain
CN110609674A (en) * 2019-08-19 2019-12-24 杭州云象网络技术有限公司 Symbiotic information physical system construction method based on block chain technology
CN111049895A (en) * 2019-12-09 2020-04-21 北京工商大学 Improved PBFT consensus method based on ISM
CN111371905A (en) * 2020-03-27 2020-07-03 中国人民解放军国防科技大学 Block chain layered consensus proving system structure and method based on cloud computing
CN111444277A (en) * 2020-03-31 2020-07-24 中国刑事警察学院 Anti-terrorist information collaborative sharing platform and method based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李悦: "《区块链智能合约技术与应用》", pages: 5 - 6 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022100291A1 (en) * 2020-11-11 2022-05-19 山西特信环宇信息技术有限公司 Hierarchical architecture of pyramid blockchain
CN112750032A (en) * 2021-01-29 2021-05-04 山西特信环宇信息技术有限公司 Cash management system based on cone block chain and chain loading method thereof
CN113360445A (en) * 2021-07-07 2021-09-07 上海万向区块链股份公司 Lithium ion battery data acquisition sharing device based on block chain technology

Also Published As

Publication number Publication date
CN112199445B (en) 2023-06-23
WO2022100291A1 (en) 2022-05-19

Similar Documents

Publication Publication Date Title
CN112199445A (en) Hierarchical structure of pyramidal block chain
CN108985089B (en) Internet data sharing system
CN109450638A (en) Electronic component data management system and method based on block chain
JP7104181B2 (en) How to track quality of sleeve injection based on blockchain
CN111444277B (en) Anti-terrorism information cooperative sharing platform and method based on blockchain technology
CN112217807B (en) Cone block chain key generation method, authentication method and system
CN107231299A (en) A kind of chain route and realized the system that block chain communicates across chain
CN109314636A (en) Cryptographic method and system for secure extraction of data from blockchains
CN112149073B (en) Cone blockchain management method and system
CN110120953A (en) A kind of railway passenger identity authorization system towards smart phone client
CN111475866A (en) Block chain electronic evidence preservation method and system
CN114285867B (en) Air-railway combined transport data sharing system based on alliance chain and attribute encryption
CN108449325A (en) A kind of block chain authentication method, equipment and the storage device of ID-based cryptosystem
CN112769917A (en) Owner power alliance chain of cone block chain
Liu et al. A blockchain-based cross-domain authentication management system for IoT devices
Li et al. Blockchain-Based Data Integrity Verification Scheme in AIoT Cloud–Edge Computing Environment
CN116305316A (en) Data management method for realizing intelligent construction based on alliance chain
EP4254234A1 (en) Digital credential issuing for an entity
CN109104402A (en) Information protecting method, equipment, medium and the framework of information physical emerging system
CN112199729A (en) Verification method and system for cone block chain
CN112637274A (en) Cone block chain terminal and access method thereof
Islam et al. Blockchain-based decentralized digital self-sovereign identity wallet for secure transaction
CN109117653A (en) A kind of encryption system and method for service transaction system of networking
CN112560081B (en) Cone blockchain intelligent contract operation method and system
Dewangan et al. Peer-to-peer trade registration process with blockchain in small and medium enterprises (smes) in e-governance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant