CN112199445B - Hierarchical architecture of cone block chain - Google Patents
Hierarchical architecture of cone block chain Download PDFInfo
- Publication number
- CN112199445B CN112199445B CN202011256084.7A CN202011256084A CN112199445B CN 112199445 B CN112199445 B CN 112199445B CN 202011256084 A CN202011256084 A CN 202011256084A CN 112199445 B CN112199445 B CN 112199445B
- Authority
- CN
- China
- Prior art keywords
- layer
- authentication
- block
- cone
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention belongs to the technical field of blockchains, and particularly relates to a hierarchical architecture of a cone blockchain, which comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer; the data layer realizes the safety of data storage and the consistency of data; the network layer is packaged with a cone block chain system networking mode; the contract is packaged with script codes, algorithms and intelligent contracts of the cone block chain; the consensus layer is used for realizing the consensus of the cone block chain system and encapsulates a consensus algorithm. The system consists of a data layer, a network layer, a consensus layer, a contract layer and an application layer, wherein: the data layer is the technology of the lowest layer of the cone block chain, mainly realizes the security of data storage and the consistency of data, the network layer encapsulates the networking mode of the cone block chain system, the contract layer encapsulates various script codes, algorithms and intelligent contracts of the cone block chain, and the data layer is the basis for realizing flexible programming and operation data of the cone block chain system.
Description
Technical Field
The invention belongs to the technical field of blockchains, and particularly relates to a hierarchical architecture of a cone blockchain.
Background
With the rise of digital currency, the blockchain technology is more and more focused, and is a bit coin underlying technology, and is a decentralized multi-block maintained distributed database, wherein the consistency and security of data are realized through a merck tree data structure, a distributed storage technology, a cryptography principle and a consensus algorithm.
The hierarchical architecture of the blockchain is divided into a data layer, a network layer, a consensus layer, a contract layer, an incentive layer and an application layer, wherein necessary layers are the data layer, the network layer and the consensus layer, and the three layers form the bottom foundation of the blockchain layer, and one layer is indispensable. Contract layer, incentive layer, application layer, are not essential in blockchain technology, such as: the bitcoin has no contract layer. The six levels are independent and inseparable, and integrally form a block chain level structure.
The blockchain is used as a novel technology, has a plurality of defects, has a slow storage speed except the influence of policy factors, has long time for obtaining transaction confirmation, and cannot meet the requirement of high-frequency storage in the current society.
The blockchain is characterized by decentralization, not without a center at a certain level, but rather by a consensus algorithm to determine the center, consistency of information, and security are extremely dependent on the consensus algorithm.
Therefore, the invention provides a hierarchical architecture and a method of a cone block chain, which establish a new hierarchical architecture of the block chain to ensure the security and consistency of the cone block chain system.
Disclosure of Invention
Aiming at the technical problems, the invention provides a hierarchical architecture of a cone block chain, which solves the problems of some defects of block chain decentralization and the problem of cone block chain hierarchical ambiguity.
In order to solve the technical problems, the invention adopts the following technical scheme:
a hierarchical architecture of a pyramidal blockchain, characterized by: the cone block chain comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer;
in particular, the data layer realizes the security of data storage and the consistency of data;
in particular, the network layer is encapsulated with a cone block chain system networking mode;
in particular, the consensus layer is used for realizing the consensus of the cone block chain system, and a consensus algorithm is packaged;
in particular, the contract layer encapsulates script code, algorithms, and intelligent contracts of the Cone blockchain;
in particular, the application layer encapsulates various application scenarios and cases of the pyramidal blockchain.
The data layer is packaged with cone data blocks, cone chain structures, time stamps, random numbers, hash functions, dynamic keys, asymmetric encryption and consensus storage.
The network layer realizes block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and performs data verification of broadcast transmission according to a verification mechanism; establishing a cone block chain according to the consensus relation, the consensus algorithm and the consensus algorithm;
the consensus layer realizes the connection of all the block consensus relations to form a cone block chain encryption chain network, wherein the blocks of the cone block chain are connected with other blocks according to the same-column consensus relation of the consensus layer; the blocks of the cone block chain are connected with the same column and the same layer according to the same column and the same layer of the non-column and the same layer of the consensus layer to form a cone hierarchical chain type data structure; according to the non-column non-same-layer relation of the blocks, establishing inter-column cross-layer connection between the blocks;
the contract layer comprises script codes, algorithm mechanisms and intelligent contracts, and automatically realizes broadcasting and data transmission of the cone block chain.
The application layer encapsulates a pyramidal blockchain termination layer, a base layer, a license check layer, a product layer, an asset analysis layer, a credit layer, and a sharing layer.
A hierarchical architecture of a pyramidal blockchain,
in particular, the terminal layer includes any one or more of a PC terminal, a mobile terminal, a sensor terminal, and a data terminal;
specifically, the base layer comprises a personal identification machine-block authentication block, a personal identity authentication block and a legal identity authentication block;
in particular, the license qualification layer comprises a license authentication block, a qualification authentication block and an identity relation proving block;
in particular, the product layer includes a production operations legal users block, a currency issuing and finance legal users block;
in particular, the asset analysis layer comprises product attributes, currency attributes, value flow cone identity record and analysis;
in particular, the credit layer includes personal credits, legal credits and social credits;
in particular, the sharing layer includes product sharing, asset resource sharing, financial sharing, and social sharing.
The layering application method of the application layer comprises the following steps:
s1, a cone block chain terminal initiates a request, and a cone block chain key is started at an application layer according to authentication information;
s2, a license check layer of the Cone blockchain application layer is that a terminal layer sends out a request by a personal identity or a legal identity, after the basic layer passes authentication, the request is sent to a license or qualification authentication block corresponding to the personal or legal for carrying out license or qualification authentication corresponding to the identity, and after the authentication passes, authentication information is sent to the terminal;
s3, the product layer and the terminal layer send out a request, after the basic layer passes the authentication, the product is permitted to carry out permission authentication, after the basic layer passes the authentication, the product is sent to a legal second-level unit block for product production to carry out product information authentication, and after the basic layer passes the authentication, authentication information is sent to the terminal;
s4, the asset analysis layer and the terminal send an authentication request, the authentication of the base layer block is the authentication of the licensed layer block which is the asset of the licensed product, the authentication of the product layer block is the authentication of the product and circulation block and the authentication of the record-keeping asset, and the authentication information is returned to the terminal through the authentication of the qualification record-keeping layer;
s5, the credit layer terminal layer sends out a request, the basic layer authentication passes through the permission layer authentication for permitting the product, the product layer authentication is sent to the asset layer for sales authentication after passing through the permission layer authentication for permitting the product, and the authentication information is sent back to the terminal after the asset registration record authentication and the financial related authentication;
s6, a sharing layer and a terminal layer send requests, a base layer authentication sending permission layer, a permission layer authentication sending product layer, a product layer authentication sending resource layer, an asset layer authentication sending credit layer, sharing of products on the basis of product production and sales authentication, sharing of assets on the basis of asset authentication and registration and record authentication, and sharing of value on the basis of financial authentication.
The cone block chain terminal initiates a request by a personal identity, and a personal identity authentication block of the cone block chain performs personal identity authentication, and after the authentication is passed, the cone block chain terminal sends the personal identity authentication block corresponding to the certificate number to perform biological recognition and the terminal acquires living body comparison to perform identity information authentication; the authentication information return terminal displays the authentication information.
The cone block chain terminal initiates a request by a legal identity, and sends the request to a legal representative or legal authorized representative corresponding to the certificate after passing the authentication of the registered human-certificate-machine integrated authentication block; the personal registered identity authentication block performs comparison with the living organism information collected by the terminal, and after the comparison is passed, the personal registered identity authentication block is sent to the legal registered authentication block to perform legal identity information authentication; after passing the authentication, sending authentication information to the terminal; the authentication information return terminal displays the authentication information.
Compared with the prior art, the invention has the beneficial effects that:
the Cone blockchain hierarchy is composed of a data layer, a network layer, a consensus layer, a contract layer and an application layer, wherein: the data layer is the technology of the lowest layer of the cone block chain, mainly realizes the security of data storage and the consistency of data, the network layer encapsulates the networking mode of the cone block chain system, the consensus layer realizes the consensus of the cone block chain distributed system, and the contract layer encapsulates various script codes, algorithms and intelligent contracts of the cone block chain, thereby being the basis for realizing flexible programming and data operation of the cone block chain system. The application layer is a display layer of the cone block chain, and encapsulates various application scenes and cases of the cone block chain.
The established hierarchical architecture of the cone block chain solves the problem of the decentralization of the block chain, establishes a cone block ecological system by establishing the hierarchical structure of the cone block chain, and realizes the consistency and the uniformity of the system of the cone block chain.
Drawings
FIG. 1 is a schematic diagram of a hierarchical architecture of a pyramidal blockchain of the present invention;
FIG. 2 is a schematic diagram of the application level content of the pyramidal blockchain of the present invention;
FIG. 3 is a schematic diagram of a pyramidal blockchain application hierarchy;
FIG. 4 is a schematic view of a cone block structure according to the present invention;
FIG. 5 is a schematic diagram of a pyramid block chain structure according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a hierarchical architecture and method of a pyramidal blockchain is composed of a data layer, a network layer, a consensus layer, a contract layer, and an application layer, wherein:
s1, a data layer is a technology of the bottommost layer of a cone block chain, and mainly achieves safety of data storage and consistency of data.
S2, a networking mode of the cone block chain system is packaged by a network layer, and the networking mode specifically comprises the following steps: P2P network mutual authentication, broadcast transmission mechanism, authentication mechanism.
S3, various script codes, algorithms and intelligent contracts of the cone block chain are packaged by the contract layer, and the method is a basis for realizing flexible programming and operation data of the cone block chain system. Comprising the following steps: cone script code, algorithmic mechanisms, smart contracts.
S4, the consensus layer realizes the consensus of the cone block chain distributed system and comprises the following steps: the upper and lower levels of correlation consensus algorithm are the same-column and same-layer correlation consensus algorithm, the non-column and same-layer correlation consensus algorithm and other correlation consensus algorithms.
S5, the application layer is a display layer of the cone block chain, and encapsulates various application scenes and cases of the cone block chain, and specifically comprises a cone block chain terminal layer, a base layer, a license information layer, a product layer, an asset analysis layer, a credit layer and a sharing layer.
As shown in fig. 2, a hierarchical architecture and method of a pyramidal blockchain, the application layer is the topmost layer of the hierarchical frame of the pyramidal blockchain, and is the salient features and core of the pyramidal blockchain, wherein each hierarchical content includes:
s1, the terminal layer comprises a PC terminal, a mobile terminal, a sensor terminal and a data terminal.
S2, the base layer comprises: the personal authentication machine is provided with a block authentication block, a personal identity authentication block and a legal identity authentication block.
S3, the license qualification layer comprises: the system comprises a permission authentication block, a qualification authentication block and an identity relation proving block.
S4, the product layer comprises: a production business legal users block, a currency issuing and finance legal users block.
S5, the asset analysis layer comprises: product attributes, currency attributes, value flow cone identity record and analysis.
S6, the credit layer comprises: personal credit, legal credit, social credit.
S7, the sharing layer comprises: product sharing, asset resource sharing, financial sharing, social sharing.
The data layer, the network layer, the consensus layer, the contract layer and the application layer of the cone block chain form the whole ecological system of the cone block.
Further, the data layer, the network layer and the bottom technical architecture of the cone block chain are formed.
Further, the terminals, base layer, license layer, product layer, asset, identity resolution layer, credit layer, sharing layer, and the like of the Cone blockchain application layer together form an application layer architecture.
Hierarchical applications of the Cone blockchain infrastructure and the application layer hierarchy constitute the sub-systems of the Cone blockchain.
Cone blockchain underlying technology data structure and layering method:
s1, the blocks of the cone block chain are connected with each block of the fan-shaped columns according to the same column consensus relation of the consensus layer, namely the upper-level blocks and the plurality of lower-level blocks of the blocks are connected.
S2, the blocks of the cone block chain are connected with the same column and the same layer according to the same column and the same layer of the non-column and the same layer of the common layer, so that a cone hierarchical chain type data structure is formed.
S3, establishing inter-block cross-column and cross-layer connection according to non-column and non-same-layer relation of the blocks.
S4, the stored association consensus relation is stored in a layering mode, data content is stored in each block of the cone block, and a cone block chain encryption chained network is formed by a dynamic key and an asymmetric encryption method.
S5, the network layer realizes block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and data verification of the broadcast transmission is carried out according to a verification mechanism.
And S6, establishing a cone block network according to the consensus relation and the consensus algorithm.
S7, according to script codes of a contract layer, an algorithm mechanism and intelligent contracts, broadcasting data transmission of the cone block chain is automatically achieved.
As shown in fig. 3, the hierarchical application method of the cone block application layer:
s1, a cone block chain terminal initiates a request by a personal identity, a person and evidence machine integrated authentication block of the cone block chain performs person and evidence machine integrated authentication, and after the authentication is passed, the person and evidence machine integrated authentication block is sent to a personal identity authentication block corresponding to a certificate number to perform biological recognition and terminal acquisition living body comparison to perform identity information authentication. The authentication information return terminal displays the authentication information.
S2, the Cone blockchain terminal initiates a request by a legal identity, and the registered legal identity authentication block sends the request to a legal representative or legal authorized representative corresponding to the certificate after passing the authentication. The personal registered identity authentication block performs comparison with the living organism information collected by the terminal, and after the comparison is passed, the personal registered identity authentication block is sent to the legal registered authentication block to perform legal identity information authentication. And after the authentication is passed, sending authentication information to the terminal. The authentication information return terminal displays the authentication information.
S3, the Cone blockchain terminal initiates a request, and a Cone blockchain key is started at an application layer according to the authentication information.
S4, the license check layer of the Cone blockchain application layer is that the terminal layer sends out a request by the personal identity or the legal identity, after the basic layer passes the authentication, the request is sent to a license or qualification authentication block corresponding to the personal or the legal for the corresponding license or qualification authentication, and after the authentication passes, authentication information is sent to the terminal.
S5, the product layer and the terminal layer send out requests, after the basic layer passes the authentication, the license authentication is carried out on the licensed product, after the authentication passes, the licensed product is sent to a legal secondary unit block for product production to carry out product information authentication, and after the authentication, the authentication information is sent to the terminal
S6, the asset analysis layer and the terminal send an authentication request, the authentication of the base layer block is the authentication of the licensed layer block which is the asset of the licensed product, the authentication of the product layer block is the authentication of the product and circulation block and the authentication of the record-keeping asset, and the authentication information is returned to the terminal through the authentication of the qualification record-keeping layer.
S7, the credit layer terminal layer sends out a request, the basic layer authentication passes through the permission layer authentication for permitting the product, the product layer authentication is sent after the pass through the permission layer authentication for product and yield authentication, the product layer authentication is sent to the asset layer for sales authentication, and the asset registration record authentication and the finance related authentication are sent back to the terminal.
S8, a sharing layer and a terminal layer send requests, a base layer authentication sending permission layer, a permission layer authentication sending product layer, a product layer authentication sending resource layer, an asset layer authentication sending credit layer, sharing of products on the basis of product production and sales authentication, sharing of assets on the basis of asset authentication and registration and record authentication, and sharing of value on the basis of financial authentication.
Further, the Cone blockchain base authentication is personal identity authentication and legal identity authentication
Further, the Cone blockchain terminal authentication is a person and evidence machine integrated authentication.
The above-mentioned cone blocks and cone block chains are described in detail in a cone block, cone block chain structure and method of patent application No. 202010797084.1, and therefore, the detailed description is briefly given here:
as shown in fig. 4 and 5, the tiles are the top-level tiles of the pyramid-shaped tiles; the sub unit blocks are middle layer blocks of the cone blocks, belong to classification blocks of the blocks and are sub blocks of the blocks; the user block is the bottom block of the pyramid block.
Each sub-block in the cone block is composed of a block header and a block body, wherein the block header mainly contains a block code, an associated block hash value, a service network address, a server identifier, a timestamp, an administrator information hash value, a block content hash value, and the block body contains administrator information and block content. The administrator information comprises registration, change and logout of an administrator; the tile content includes authentication content, associated authentication content, other tile content.
The user block can apply for the secondary unit block and the secondary user block according to the self service content, such as providing a public platform; cone blocks are also formed between the user blocks, the secondary cell blocks and the secondary user blocks. Some mechanisms also have no user block or no branching unit block.
The cone block chain structure comprises a plurality of cone blocks, wherein one cone block is a total cone block, and other cone blocks are divided according to the category or property of the cone block chain structure: cone blocks of the same category or property are positioned in the same row, and blocks in the cone blocks on the same row are connected to form a linear chain; forming a plurality of columns of linear chains according to the different categories or properties; the linear chains of different rows intersect with blocks in the total cone block to form a cone block chain structure as a whole.
The cone blocks on the same column are layered according to the grades and form a private chain according to the association consensus relation; the linear chains of different columns form cone alliance chains according to the consensus relation; the tapered blocks with the same level comprise more than one tapered block with the same level on the same layer, namely the same layer on the same row.
Private chain: mechanisms with the same property are positioned in the same column of the cone block chain, and each cone block forms a private chain according to a consensus relationship; alliance chain: the mechanisms with different properties are positioned in different columns of the cone block chain, and each cone block forms a alliance chain according to the consensus relation; specific: the different tiers 3-6 may be categorized by a hierarchy of rights (or a hierarchy of dependencies).
For example: public security in Shanxi province, public security in the Shuozhou city, and private links are connected between public security in Pinglu district; the links between public security in Shanxi province, civil authorities in Shanxi province, labor authorities in Shanxi province, and so on are alliance chains.
The hierarchical relationship is from top to bottom: block, sub-unit block, user block, secondary unit block, secondary user block, micro-block.
The block, the sub unit block and the user block are respectively generated with corresponding manager and manager hash values, wherein the manager hash value of the block comprises the hash value of the lower sub unit block manager, and the manager hash value of the sub unit block comprises the hash value of the lower user block manager; information changes in each administrator may form hash values and be broadcast through the pyramidal blockchain.
The living organism information is collected through the cone block chain client side when logging in each time; the collected living organism information is combined with user information, a time stamp and a random number which pass through the authentication of the personal identity authentication block, and a private key is generated through hash operation; the private key is dynamically generated, and different private keys are formed in each login; the private key is generated to form a public key.
After the private key is generated, generating a public key through an elliptic curve algorithm; the public key and the timestamp information are hashed to form a Cone blockchain client address, the private key is stored in the Cone blockchain client, and the public key is sent in the Cone blockchain network.
The preferred embodiments of the present invention have been described in detail, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the spirit of the present invention, and the various changes are included in the scope of the present invention.
Claims (8)
1. A hierarchical architecture of a pyramidal blockchain, characterized by: the system comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer;
the data layer realizes the safety of data storage and the consistency of data;
the network layer is packaged with a cone block chain system networking mode;
the consensus layer is used for realizing the consensus of the cone block chain system and is packaged with a consensus algorithm;
the contract layer encapsulates script codes, algorithms and intelligent contracts of the cone block chain;
the application layer encapsulates various application scenes and cases of the cone block chain;
the application layer is packaged with a cone block chain terminal layer, a base layer, a license information layer, a product layer, an asset analysis layer, a credit layer and a sharing layer;
the layering application method of the application layer comprises the following steps:
the Cone blockchain terminal initiates a request, and a Cone blockchain key is started at an application layer according to authentication information;
the license check layer of the Cone blockchain application layer is that the terminal layer sends out a request by the personal identity or legal identity, after the basic layer passes the authentication, the request is sent to a license or qualification authentication block corresponding to the personal or legal for the corresponding license or qualification authentication, and after the authentication passes, the authentication information is sent to the terminal;
the product layer and the terminal layer send out requests, the basic layer carries out license authentication of the licensed product after passing the authentication, the licensed product is sent to a legal secondary unit block for product production to carry out product information authentication, and authentication information is sent to the terminal after the authentication;
the asset analysis layer and the terminal send an authentication request, the authentication of the base layer block is the authentication of the asset of the licensed product, the authentication of the licensed layer block is the authentication of the product layer block, the authentication of the product layer block is the authentication of the product and circulation block and the authentication of the record-keeping asset, and the authentication information is returned to the terminal through the authentication of the qualification record-keeping layer;
the credit layer terminal layer sends out a request, the basic layer authentication passes through, the permission layer authentication of a permission product is carried out, the product layer authentication is sent to carry out product and yield authentication after passing through, the product layer authentication is sent to the asset layer to carry out sales authentication, and after asset registration record authentication and finance related authentication, authentication information is sent back to the terminal;
the sharing layer and the terminal layer send requests, the base layer authenticates and sends a permission layer, the permission layer authenticates and sends a product layer, the product layer authenticates and sends a resource layer, the asset layer authenticates and sends a credit layer, the sharing of products is realized on the basis of product production and sales authentication, the sharing of assets is realized on the basis of asset authentication and registration record authentication, and the sharing of value is realized on the basis of financial authentication.
2. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the data layer encapsulates a pyramidal data block, a pyramidal chain structure, a timestamp, a random number, a hash function, a dynamic key, asymmetric encryption, and consensus storage.
3. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the network layer realizes block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and performs data verification of broadcast transmission according to a verification mechanism; and establishing a cone block chain according to the consensus relation and the consensus algorithm.
4. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the consensus layer realizes the connection of all the block consensus relations to form a cone block chain encryption chain network, wherein the blocks of the cone block chain are connected with other blocks according to the same-column consensus relation of the consensus layer; the blocks of the cone block chain are connected with the same column and the same layer according to the same column and the same layer of the non-column and the same layer of the consensus layer to form a cone hierarchical chain type data structure; and establishing inter-column and inter-layer connection among the blocks according to the non-column and non-same-layer relationship of the blocks.
5. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the contract layer comprises script codes, algorithm mechanisms and intelligent contracts, and automatically realizes broadcasting and data transmission of the cone block chain.
6. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein:
the terminal layer comprises any one or more of a PC terminal, a mobile terminal, a sensor terminal and a data terminal;
the base layer comprises a personal identification machine integrated block authentication block, a personal identity authentication block and a legal identity authentication block;
the permission qualification layer comprises a permission authentication block, a qualification authentication block and an identity relation proving block;
the product layer comprises a production management legal user block, a currency issuing block and a financial legal user block;
the asset analysis layer comprises product attributes, currency attributes, value circulation cone identity record and analysis;
the credit layer comprises personal credit, legal credit and social credit;
the sharing layer comprises product sharing, asset resource sharing, financial sharing and social sharing.
7. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the cone block chain terminal initiates a request by a personal identity, and a personal identity authentication block of the cone block chain performs personal identity authentication, and after the authentication is passed, the cone block chain terminal sends the personal identity authentication block corresponding to the certificate number to perform biological recognition and the terminal acquires living body comparison to perform identity information authentication; the authentication information return terminal displays the authentication information.
8. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the cone block chain terminal initiates a request by a legal identity, and sends the request to a legal representative or legal authorized representative corresponding to the certificate after passing the authentication of the registered human-certificate-machine integrated authentication block; the personal registered identity authentication block performs comparison with the living organism information collected by the terminal, and after the comparison is passed, the personal registered identity authentication block is sent to the legal registered authentication block to perform legal identity information authentication; after passing the authentication, sending authentication information to the terminal; the authentication information return terminal displays the authentication information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011256084.7A CN112199445B (en) | 2020-11-11 | 2020-11-11 | Hierarchical architecture of cone block chain |
PCT/CN2021/120041 WO2022100291A1 (en) | 2020-11-11 | 2021-09-24 | Hierarchical architecture of pyramid blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011256084.7A CN112199445B (en) | 2020-11-11 | 2020-11-11 | Hierarchical architecture of cone block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112199445A CN112199445A (en) | 2021-01-08 |
CN112199445B true CN112199445B (en) | 2023-06-23 |
Family
ID=74034177
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011256084.7A Active CN112199445B (en) | 2020-11-11 | 2020-11-11 | Hierarchical architecture of cone block chain |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112199445B (en) |
WO (1) | WO2022100291A1 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199445B (en) * | 2020-11-11 | 2023-06-23 | 山西特信环宇信息技术有限公司 | Hierarchical architecture of cone block chain |
CN112750032A (en) * | 2021-01-29 | 2021-05-04 | 山西特信环宇信息技术有限公司 | Cash management system based on cone block chain and chain loading method thereof |
CN113360445B (en) * | 2021-07-07 | 2022-11-04 | 上海万向区块链股份公司 | Lithium ion battery data acquisition sharing device based on block chain technology |
CN115495714B (en) * | 2022-09-14 | 2023-07-07 | 湖南大学 | Financial artificial intelligence algorithm integration method and system based on block chain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107147735A (en) * | 2017-05-12 | 2017-09-08 | 北京博晨技术有限公司 | A kind of distributed account book system based on hierarchy |
CN110019347A (en) * | 2018-01-02 | 2019-07-16 | 中国移动通信有限公司研究院 | A kind of data processing method, device and the terminal device of block chain |
CN110097445A (en) * | 2018-12-11 | 2019-08-06 | 周晓辉 | Internet finance cloud transaction platform and implementation method based on block chain |
CN110609674A (en) * | 2019-08-19 | 2019-12-24 | 杭州云象网络技术有限公司 | Symbiotic information physical system construction method based on block chain technology |
CN111049895A (en) * | 2019-12-09 | 2020-04-21 | 北京工商大学 | Improved PBFT consensus method based on ISM |
CN111371905A (en) * | 2020-03-27 | 2020-07-03 | 中国人民解放军国防科技大学 | Block chain layered consensus proving system structure and method based on cloud computing |
CN111444277A (en) * | 2020-03-31 | 2020-07-24 | 中国刑事警察学院 | Anti-terrorist information collaborative sharing platform and method based on block chain technology |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108337219B (en) * | 2017-11-27 | 2021-12-28 | 中国电子科技集团公司电子科学研究院 | Method for preventing Internet of things from being invaded and storage medium |
CN108305056B (en) * | 2018-03-27 | 2023-11-10 | 北京蓝亚盒子科技有限公司 | Block chain-based data processing method and device and block chain node network |
CN108596766A (en) * | 2018-04-28 | 2018-09-28 | 深圳市优学链科技有限公司 | Block chain credit rating method, apparatus, computer equipment and storage medium |
CN108667618B (en) * | 2018-05-10 | 2020-07-03 | 阿里巴巴集团控股有限公司 | Data processing method, device, server and system for member management of block chain |
CN108764925A (en) * | 2018-05-31 | 2018-11-06 | 李沁福 | A kind of synthesis business platform based on block chain technology |
CN109118168A (en) * | 2018-07-20 | 2019-01-01 | 北京开普云信息科技有限公司 | A kind of government affairs service process traceability system and its construction method based on block chain mechanism |
CN109379266B (en) * | 2018-09-29 | 2021-05-07 | 湖南智慧政务区块链科技有限公司 | Method and system for constructing multi-layer government affair block chain network based on star network |
CN109472593A (en) * | 2018-10-10 | 2019-03-15 | 远光软件股份有限公司 | A kind of settlement method based on block chain technology, device and block chain network |
CN109560938A (en) * | 2019-01-23 | 2019-04-02 | 广州微盾科技股份有限公司 | Based on the block catenary system for referring to human body biological characteristics identification technology |
CN109859046A (en) * | 2019-01-30 | 2019-06-07 | 威海华智数字经济研究院有限公司 | One kind being based on block chain technology big data wisdom operation management system |
CN109756589B (en) * | 2019-02-20 | 2020-11-13 | 中国互联网络信息中心 | Domain name information maintenance system based on block chain multi-party co-treatment |
CN111461879A (en) * | 2020-03-11 | 2020-07-28 | 中关村科技软件股份有限公司 | Block chain-based government affair service processing system and method |
CN112199445B (en) * | 2020-11-11 | 2023-06-23 | 山西特信环宇信息技术有限公司 | Hierarchical architecture of cone block chain |
-
2020
- 2020-11-11 CN CN202011256084.7A patent/CN112199445B/en active Active
-
2021
- 2021-09-24 WO PCT/CN2021/120041 patent/WO2022100291A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107147735A (en) * | 2017-05-12 | 2017-09-08 | 北京博晨技术有限公司 | A kind of distributed account book system based on hierarchy |
CN110019347A (en) * | 2018-01-02 | 2019-07-16 | 中国移动通信有限公司研究院 | A kind of data processing method, device and the terminal device of block chain |
CN110097445A (en) * | 2018-12-11 | 2019-08-06 | 周晓辉 | Internet finance cloud transaction platform and implementation method based on block chain |
CN110609674A (en) * | 2019-08-19 | 2019-12-24 | 杭州云象网络技术有限公司 | Symbiotic information physical system construction method based on block chain technology |
CN111049895A (en) * | 2019-12-09 | 2020-04-21 | 北京工商大学 | Improved PBFT consensus method based on ISM |
CN111371905A (en) * | 2020-03-27 | 2020-07-03 | 中国人民解放军国防科技大学 | Block chain layered consensus proving system structure and method based on cloud computing |
CN111444277A (en) * | 2020-03-31 | 2020-07-24 | 中国刑事警察学院 | Anti-terrorist information collaborative sharing platform and method based on block chain technology |
Non-Patent Citations (1)
Title |
---|
李悦.《区块链智能合约技术与应用》.2019,第5-6页. * |
Also Published As
Publication number | Publication date |
---|---|
CN112199445A (en) | 2021-01-08 |
WO2022100291A1 (en) | 2022-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112199445B (en) | Hierarchical architecture of cone block chain | |
CN109450638A (en) | Electronic component data management system and method based on block chain | |
Gimenez-Aguilar et al. | Achieving cybersecurity in blockchain-based systems: A survey | |
CN111988338B (en) | Permission-controllable Internet of things cloud platform based on block chain and data interaction method | |
Cash et al. | Two-tier permission-ed and permission-less blockchain for secure data sharing | |
CN112148787B (en) | Cone block, cone block chain structure and method | |
CN112149073B (en) | Cone blockchain management method and system | |
CN110097445A (en) | Internet finance cloud transaction platform and implementation method based on block chain | |
CN109377363B (en) | Block chain-based Internet of things data transaction architecture and transaction security method thereof | |
CN110096903A (en) | Assets verification method and block chain network system based on block chain | |
CN111475866A (en) | Block chain electronic evidence preservation method and system | |
Valdivia et al. | Decentralization: The failed promise of cryptocurrencies | |
CN112101940A (en) | Random verifiable sample selection system implemented with block chains | |
CN112769917A (en) | Owner power alliance chain of cone block chain | |
Beckmann et al. | Blockchain‐based cyber physical trust systems | |
CN112199729B (en) | Cone blockchain verification method and system | |
CN116305316A (en) | Data management method for realizing intelligent construction based on alliance chain | |
CN112491914B (en) | Block chain bidirectional authentication method, communication method and system | |
CN112637274A (en) | Cone block chain terminal and access method thereof | |
CN112560081B (en) | Cone blockchain intelligent contract operation method and system | |
CN112822687B (en) | Cone block chain mobile terminal authentication method | |
Zhai et al. | A review of Blockchain-based access control for the industrial IoT | |
CN109117653A (en) | A kind of encryption system and method for service transaction system of networking | |
Dewangan et al. | Peer-to-peer trade registration process with blockchain in small and medium enterprises (smes) in e-governance | |
EP4356562A1 (en) | Self-sovereign-identities (ssi) for iot and next internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |