CN112199445B - Hierarchical architecture of cone block chain - Google Patents

Hierarchical architecture of cone block chain Download PDF

Info

Publication number
CN112199445B
CN112199445B CN202011256084.7A CN202011256084A CN112199445B CN 112199445 B CN112199445 B CN 112199445B CN 202011256084 A CN202011256084 A CN 202011256084A CN 112199445 B CN112199445 B CN 112199445B
Authority
CN
China
Prior art keywords
layer
authentication
block
cone
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011256084.7A
Other languages
Chinese (zh)
Other versions
CN112199445A (en
Inventor
李俊
李晶宇
武少华
张琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Texin Huanyu Information Technology Co ltd
Original Assignee
Shanxi Texin Huanyu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Texin Huanyu Information Technology Co ltd filed Critical Shanxi Texin Huanyu Information Technology Co ltd
Priority to CN202011256084.7A priority Critical patent/CN112199445B/en
Publication of CN112199445A publication Critical patent/CN112199445A/en
Priority to PCT/CN2021/120041 priority patent/WO2022100291A1/en
Application granted granted Critical
Publication of CN112199445B publication Critical patent/CN112199445B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention belongs to the technical field of blockchains, and particularly relates to a hierarchical architecture of a cone blockchain, which comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer; the data layer realizes the safety of data storage and the consistency of data; the network layer is packaged with a cone block chain system networking mode; the contract is packaged with script codes, algorithms and intelligent contracts of the cone block chain; the consensus layer is used for realizing the consensus of the cone block chain system and encapsulates a consensus algorithm. The system consists of a data layer, a network layer, a consensus layer, a contract layer and an application layer, wherein: the data layer is the technology of the lowest layer of the cone block chain, mainly realizes the security of data storage and the consistency of data, the network layer encapsulates the networking mode of the cone block chain system, the contract layer encapsulates various script codes, algorithms and intelligent contracts of the cone block chain, and the data layer is the basis for realizing flexible programming and operation data of the cone block chain system.

Description

Hierarchical architecture of cone block chain
Technical Field
The invention belongs to the technical field of blockchains, and particularly relates to a hierarchical architecture of a cone blockchain.
Background
With the rise of digital currency, the blockchain technology is more and more focused, and is a bit coin underlying technology, and is a decentralized multi-block maintained distributed database, wherein the consistency and security of data are realized through a merck tree data structure, a distributed storage technology, a cryptography principle and a consensus algorithm.
The hierarchical architecture of the blockchain is divided into a data layer, a network layer, a consensus layer, a contract layer, an incentive layer and an application layer, wherein necessary layers are the data layer, the network layer and the consensus layer, and the three layers form the bottom foundation of the blockchain layer, and one layer is indispensable. Contract layer, incentive layer, application layer, are not essential in blockchain technology, such as: the bitcoin has no contract layer. The six levels are independent and inseparable, and integrally form a block chain level structure.
The blockchain is used as a novel technology, has a plurality of defects, has a slow storage speed except the influence of policy factors, has long time for obtaining transaction confirmation, and cannot meet the requirement of high-frequency storage in the current society.
The blockchain is characterized by decentralization, not without a center at a certain level, but rather by a consensus algorithm to determine the center, consistency of information, and security are extremely dependent on the consensus algorithm.
Therefore, the invention provides a hierarchical architecture and a method of a cone block chain, which establish a new hierarchical architecture of the block chain to ensure the security and consistency of the cone block chain system.
Disclosure of Invention
Aiming at the technical problems, the invention provides a hierarchical architecture of a cone block chain, which solves the problems of some defects of block chain decentralization and the problem of cone block chain hierarchical ambiguity.
In order to solve the technical problems, the invention adopts the following technical scheme:
a hierarchical architecture of a pyramidal blockchain, characterized by: the cone block chain comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer;
in particular, the data layer realizes the security of data storage and the consistency of data;
in particular, the network layer is encapsulated with a cone block chain system networking mode;
in particular, the consensus layer is used for realizing the consensus of the cone block chain system, and a consensus algorithm is packaged;
in particular, the contract layer encapsulates script code, algorithms, and intelligent contracts of the Cone blockchain;
in particular, the application layer encapsulates various application scenarios and cases of the pyramidal blockchain.
The data layer is packaged with cone data blocks, cone chain structures, time stamps, random numbers, hash functions, dynamic keys, asymmetric encryption and consensus storage.
The network layer realizes block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and performs data verification of broadcast transmission according to a verification mechanism; establishing a cone block chain according to the consensus relation, the consensus algorithm and the consensus algorithm;
the consensus layer realizes the connection of all the block consensus relations to form a cone block chain encryption chain network, wherein the blocks of the cone block chain are connected with other blocks according to the same-column consensus relation of the consensus layer; the blocks of the cone block chain are connected with the same column and the same layer according to the same column and the same layer of the non-column and the same layer of the consensus layer to form a cone hierarchical chain type data structure; according to the non-column non-same-layer relation of the blocks, establishing inter-column cross-layer connection between the blocks;
the contract layer comprises script codes, algorithm mechanisms and intelligent contracts, and automatically realizes broadcasting and data transmission of the cone block chain.
The application layer encapsulates a pyramidal blockchain termination layer, a base layer, a license check layer, a product layer, an asset analysis layer, a credit layer, and a sharing layer.
A hierarchical architecture of a pyramidal blockchain,
in particular, the terminal layer includes any one or more of a PC terminal, a mobile terminal, a sensor terminal, and a data terminal;
specifically, the base layer comprises a personal identification machine-block authentication block, a personal identity authentication block and a legal identity authentication block;
in particular, the license qualification layer comprises a license authentication block, a qualification authentication block and an identity relation proving block;
in particular, the product layer includes a production operations legal users block, a currency issuing and finance legal users block;
in particular, the asset analysis layer comprises product attributes, currency attributes, value flow cone identity record and analysis;
in particular, the credit layer includes personal credits, legal credits and social credits;
in particular, the sharing layer includes product sharing, asset resource sharing, financial sharing, and social sharing.
The layering application method of the application layer comprises the following steps:
s1, a cone block chain terminal initiates a request, and a cone block chain key is started at an application layer according to authentication information;
s2, a license check layer of the Cone blockchain application layer is that a terminal layer sends out a request by a personal identity or a legal identity, after the basic layer passes authentication, the request is sent to a license or qualification authentication block corresponding to the personal or legal for carrying out license or qualification authentication corresponding to the identity, and after the authentication passes, authentication information is sent to the terminal;
s3, the product layer and the terminal layer send out a request, after the basic layer passes the authentication, the product is permitted to carry out permission authentication, after the basic layer passes the authentication, the product is sent to a legal second-level unit block for product production to carry out product information authentication, and after the basic layer passes the authentication, authentication information is sent to the terminal;
s4, the asset analysis layer and the terminal send an authentication request, the authentication of the base layer block is the authentication of the licensed layer block which is the asset of the licensed product, the authentication of the product layer block is the authentication of the product and circulation block and the authentication of the record-keeping asset, and the authentication information is returned to the terminal through the authentication of the qualification record-keeping layer;
s5, the credit layer terminal layer sends out a request, the basic layer authentication passes through the permission layer authentication for permitting the product, the product layer authentication is sent to the asset layer for sales authentication after passing through the permission layer authentication for permitting the product, and the authentication information is sent back to the terminal after the asset registration record authentication and the financial related authentication;
s6, a sharing layer and a terminal layer send requests, a base layer authentication sending permission layer, a permission layer authentication sending product layer, a product layer authentication sending resource layer, an asset layer authentication sending credit layer, sharing of products on the basis of product production and sales authentication, sharing of assets on the basis of asset authentication and registration and record authentication, and sharing of value on the basis of financial authentication.
The cone block chain terminal initiates a request by a personal identity, and a personal identity authentication block of the cone block chain performs personal identity authentication, and after the authentication is passed, the cone block chain terminal sends the personal identity authentication block corresponding to the certificate number to perform biological recognition and the terminal acquires living body comparison to perform identity information authentication; the authentication information return terminal displays the authentication information.
The cone block chain terminal initiates a request by a legal identity, and sends the request to a legal representative or legal authorized representative corresponding to the certificate after passing the authentication of the registered human-certificate-machine integrated authentication block; the personal registered identity authentication block performs comparison with the living organism information collected by the terminal, and after the comparison is passed, the personal registered identity authentication block is sent to the legal registered authentication block to perform legal identity information authentication; after passing the authentication, sending authentication information to the terminal; the authentication information return terminal displays the authentication information.
Compared with the prior art, the invention has the beneficial effects that:
the Cone blockchain hierarchy is composed of a data layer, a network layer, a consensus layer, a contract layer and an application layer, wherein: the data layer is the technology of the lowest layer of the cone block chain, mainly realizes the security of data storage and the consistency of data, the network layer encapsulates the networking mode of the cone block chain system, the consensus layer realizes the consensus of the cone block chain distributed system, and the contract layer encapsulates various script codes, algorithms and intelligent contracts of the cone block chain, thereby being the basis for realizing flexible programming and data operation of the cone block chain system. The application layer is a display layer of the cone block chain, and encapsulates various application scenes and cases of the cone block chain.
The established hierarchical architecture of the cone block chain solves the problem of the decentralization of the block chain, establishes a cone block ecological system by establishing the hierarchical structure of the cone block chain, and realizes the consistency and the uniformity of the system of the cone block chain.
Drawings
FIG. 1 is a schematic diagram of a hierarchical architecture of a pyramidal blockchain of the present invention;
FIG. 2 is a schematic diagram of the application level content of the pyramidal blockchain of the present invention;
FIG. 3 is a schematic diagram of a pyramidal blockchain application hierarchy;
FIG. 4 is a schematic view of a cone block structure according to the present invention;
FIG. 5 is a schematic diagram of a pyramid block chain structure according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
As shown in fig. 1, a hierarchical architecture and method of a pyramidal blockchain is composed of a data layer, a network layer, a consensus layer, a contract layer, and an application layer, wherein:
s1, a data layer is a technology of the bottommost layer of a cone block chain, and mainly achieves safety of data storage and consistency of data.
S2, a networking mode of the cone block chain system is packaged by a network layer, and the networking mode specifically comprises the following steps: P2P network mutual authentication, broadcast transmission mechanism, authentication mechanism.
S3, various script codes, algorithms and intelligent contracts of the cone block chain are packaged by the contract layer, and the method is a basis for realizing flexible programming and operation data of the cone block chain system. Comprising the following steps: cone script code, algorithmic mechanisms, smart contracts.
S4, the consensus layer realizes the consensus of the cone block chain distributed system and comprises the following steps: the upper and lower levels of correlation consensus algorithm are the same-column and same-layer correlation consensus algorithm, the non-column and same-layer correlation consensus algorithm and other correlation consensus algorithms.
S5, the application layer is a display layer of the cone block chain, and encapsulates various application scenes and cases of the cone block chain, and specifically comprises a cone block chain terminal layer, a base layer, a license information layer, a product layer, an asset analysis layer, a credit layer and a sharing layer.
As shown in fig. 2, a hierarchical architecture and method of a pyramidal blockchain, the application layer is the topmost layer of the hierarchical frame of the pyramidal blockchain, and is the salient features and core of the pyramidal blockchain, wherein each hierarchical content includes:
s1, the terminal layer comprises a PC terminal, a mobile terminal, a sensor terminal and a data terminal.
S2, the base layer comprises: the personal authentication machine is provided with a block authentication block, a personal identity authentication block and a legal identity authentication block.
S3, the license qualification layer comprises: the system comprises a permission authentication block, a qualification authentication block and an identity relation proving block.
S4, the product layer comprises: a production business legal users block, a currency issuing and finance legal users block.
S5, the asset analysis layer comprises: product attributes, currency attributes, value flow cone identity record and analysis.
S6, the credit layer comprises: personal credit, legal credit, social credit.
S7, the sharing layer comprises: product sharing, asset resource sharing, financial sharing, social sharing.
The data layer, the network layer, the consensus layer, the contract layer and the application layer of the cone block chain form the whole ecological system of the cone block.
Further, the data layer, the network layer and the bottom technical architecture of the cone block chain are formed.
Further, the terminals, base layer, license layer, product layer, asset, identity resolution layer, credit layer, sharing layer, and the like of the Cone blockchain application layer together form an application layer architecture.
Hierarchical applications of the Cone blockchain infrastructure and the application layer hierarchy constitute the sub-systems of the Cone blockchain.
Cone blockchain underlying technology data structure and layering method:
s1, the blocks of the cone block chain are connected with each block of the fan-shaped columns according to the same column consensus relation of the consensus layer, namely the upper-level blocks and the plurality of lower-level blocks of the blocks are connected.
S2, the blocks of the cone block chain are connected with the same column and the same layer according to the same column and the same layer of the non-column and the same layer of the common layer, so that a cone hierarchical chain type data structure is formed.
S3, establishing inter-block cross-column and cross-layer connection according to non-column and non-same-layer relation of the blocks.
S4, the stored association consensus relation is stored in a layering mode, data content is stored in each block of the cone block, and a cone block chain encryption chained network is formed by a dynamic key and an asymmetric encryption method.
S5, the network layer realizes block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and data verification of the broadcast transmission is carried out according to a verification mechanism.
And S6, establishing a cone block network according to the consensus relation and the consensus algorithm.
S7, according to script codes of a contract layer, an algorithm mechanism and intelligent contracts, broadcasting data transmission of the cone block chain is automatically achieved.
As shown in fig. 3, the hierarchical application method of the cone block application layer:
s1, a cone block chain terminal initiates a request by a personal identity, a person and evidence machine integrated authentication block of the cone block chain performs person and evidence machine integrated authentication, and after the authentication is passed, the person and evidence machine integrated authentication block is sent to a personal identity authentication block corresponding to a certificate number to perform biological recognition and terminal acquisition living body comparison to perform identity information authentication. The authentication information return terminal displays the authentication information.
S2, the Cone blockchain terminal initiates a request by a legal identity, and the registered legal identity authentication block sends the request to a legal representative or legal authorized representative corresponding to the certificate after passing the authentication. The personal registered identity authentication block performs comparison with the living organism information collected by the terminal, and after the comparison is passed, the personal registered identity authentication block is sent to the legal registered authentication block to perform legal identity information authentication. And after the authentication is passed, sending authentication information to the terminal. The authentication information return terminal displays the authentication information.
S3, the Cone blockchain terminal initiates a request, and a Cone blockchain key is started at an application layer according to the authentication information.
S4, the license check layer of the Cone blockchain application layer is that the terminal layer sends out a request by the personal identity or the legal identity, after the basic layer passes the authentication, the request is sent to a license or qualification authentication block corresponding to the personal or the legal for the corresponding license or qualification authentication, and after the authentication passes, authentication information is sent to the terminal.
S5, the product layer and the terminal layer send out requests, after the basic layer passes the authentication, the license authentication is carried out on the licensed product, after the authentication passes, the licensed product is sent to a legal secondary unit block for product production to carry out product information authentication, and after the authentication, the authentication information is sent to the terminal
S6, the asset analysis layer and the terminal send an authentication request, the authentication of the base layer block is the authentication of the licensed layer block which is the asset of the licensed product, the authentication of the product layer block is the authentication of the product and circulation block and the authentication of the record-keeping asset, and the authentication information is returned to the terminal through the authentication of the qualification record-keeping layer.
S7, the credit layer terminal layer sends out a request, the basic layer authentication passes through the permission layer authentication for permitting the product, the product layer authentication is sent after the pass through the permission layer authentication for product and yield authentication, the product layer authentication is sent to the asset layer for sales authentication, and the asset registration record authentication and the finance related authentication are sent back to the terminal.
S8, a sharing layer and a terminal layer send requests, a base layer authentication sending permission layer, a permission layer authentication sending product layer, a product layer authentication sending resource layer, an asset layer authentication sending credit layer, sharing of products on the basis of product production and sales authentication, sharing of assets on the basis of asset authentication and registration and record authentication, and sharing of value on the basis of financial authentication.
Further, the Cone blockchain base authentication is personal identity authentication and legal identity authentication
Further, the Cone blockchain terminal authentication is a person and evidence machine integrated authentication.
The above-mentioned cone blocks and cone block chains are described in detail in a cone block, cone block chain structure and method of patent application No. 202010797084.1, and therefore, the detailed description is briefly given here:
as shown in fig. 4 and 5, the tiles are the top-level tiles of the pyramid-shaped tiles; the sub unit blocks are middle layer blocks of the cone blocks, belong to classification blocks of the blocks and are sub blocks of the blocks; the user block is the bottom block of the pyramid block.
Each sub-block in the cone block is composed of a block header and a block body, wherein the block header mainly contains a block code, an associated block hash value, a service network address, a server identifier, a timestamp, an administrator information hash value, a block content hash value, and the block body contains administrator information and block content. The administrator information comprises registration, change and logout of an administrator; the tile content includes authentication content, associated authentication content, other tile content.
The user block can apply for the secondary unit block and the secondary user block according to the self service content, such as providing a public platform; cone blocks are also formed between the user blocks, the secondary cell blocks and the secondary user blocks. Some mechanisms also have no user block or no branching unit block.
The cone block chain structure comprises a plurality of cone blocks, wherein one cone block is a total cone block, and other cone blocks are divided according to the category or property of the cone block chain structure: cone blocks of the same category or property are positioned in the same row, and blocks in the cone blocks on the same row are connected to form a linear chain; forming a plurality of columns of linear chains according to the different categories or properties; the linear chains of different rows intersect with blocks in the total cone block to form a cone block chain structure as a whole.
The cone blocks on the same column are layered according to the grades and form a private chain according to the association consensus relation; the linear chains of different columns form cone alliance chains according to the consensus relation; the tapered blocks with the same level comprise more than one tapered block with the same level on the same layer, namely the same layer on the same row.
Private chain: mechanisms with the same property are positioned in the same column of the cone block chain, and each cone block forms a private chain according to a consensus relationship; alliance chain: the mechanisms with different properties are positioned in different columns of the cone block chain, and each cone block forms a alliance chain according to the consensus relation; specific: the different tiers 3-6 may be categorized by a hierarchy of rights (or a hierarchy of dependencies).
For example: public security in Shanxi province, public security in the Shuozhou city, and private links are connected between public security in Pinglu district; the links between public security in Shanxi province, civil authorities in Shanxi province, labor authorities in Shanxi province, and so on are alliance chains.
The hierarchical relationship is from top to bottom: block, sub-unit block, user block, secondary unit block, secondary user block, micro-block.
The block, the sub unit block and the user block are respectively generated with corresponding manager and manager hash values, wherein the manager hash value of the block comprises the hash value of the lower sub unit block manager, and the manager hash value of the sub unit block comprises the hash value of the lower user block manager; information changes in each administrator may form hash values and be broadcast through the pyramidal blockchain.
The living organism information is collected through the cone block chain client side when logging in each time; the collected living organism information is combined with user information, a time stamp and a random number which pass through the authentication of the personal identity authentication block, and a private key is generated through hash operation; the private key is dynamically generated, and different private keys are formed in each login; the private key is generated to form a public key.
After the private key is generated, generating a public key through an elliptic curve algorithm; the public key and the timestamp information are hashed to form a Cone blockchain client address, the private key is stored in the Cone blockchain client, and the public key is sent in the Cone blockchain network.
The preferred embodiments of the present invention have been described in detail, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the spirit of the present invention, and the various changes are included in the scope of the present invention.

Claims (8)

1. A hierarchical architecture of a pyramidal blockchain, characterized by: the system comprises a data layer, a network layer, a consensus layer, a contract layer and an application layer;
the data layer realizes the safety of data storage and the consistency of data;
the network layer is packaged with a cone block chain system networking mode;
the consensus layer is used for realizing the consensus of the cone block chain system and is packaged with a consensus algorithm;
the contract layer encapsulates script codes, algorithms and intelligent contracts of the cone block chain;
the application layer encapsulates various application scenes and cases of the cone block chain;
the application layer is packaged with a cone block chain terminal layer, a base layer, a license information layer, a product layer, an asset analysis layer, a credit layer and a sharing layer;
the layering application method of the application layer comprises the following steps:
the Cone blockchain terminal initiates a request, and a Cone blockchain key is started at an application layer according to authentication information;
the license check layer of the Cone blockchain application layer is that the terminal layer sends out a request by the personal identity or legal identity, after the basic layer passes the authentication, the request is sent to a license or qualification authentication block corresponding to the personal or legal for the corresponding license or qualification authentication, and after the authentication passes, the authentication information is sent to the terminal;
the product layer and the terminal layer send out requests, the basic layer carries out license authentication of the licensed product after passing the authentication, the licensed product is sent to a legal secondary unit block for product production to carry out product information authentication, and authentication information is sent to the terminal after the authentication;
the asset analysis layer and the terminal send an authentication request, the authentication of the base layer block is the authentication of the asset of the licensed product, the authentication of the licensed layer block is the authentication of the product layer block, the authentication of the product layer block is the authentication of the product and circulation block and the authentication of the record-keeping asset, and the authentication information is returned to the terminal through the authentication of the qualification record-keeping layer;
the credit layer terminal layer sends out a request, the basic layer authentication passes through, the permission layer authentication of a permission product is carried out, the product layer authentication is sent to carry out product and yield authentication after passing through, the product layer authentication is sent to the asset layer to carry out sales authentication, and after asset registration record authentication and finance related authentication, authentication information is sent back to the terminal;
the sharing layer and the terminal layer send requests, the base layer authenticates and sends a permission layer, the permission layer authenticates and sends a product layer, the product layer authenticates and sends a resource layer, the asset layer authenticates and sends a credit layer, the sharing of products is realized on the basis of product production and sales authentication, the sharing of assets is realized on the basis of asset authentication and registration record authentication, and the sharing of value is realized on the basis of financial authentication.
2. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the data layer encapsulates a pyramidal data block, a pyramidal chain structure, a timestamp, a random number, a hash function, a dynamic key, asymmetric encryption, and consensus storage.
3. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the network layer realizes block point-to-point bidirectional authentication and point-to-point broadcast data transmission of the cone block chain, and performs data verification of broadcast transmission according to a verification mechanism; and establishing a cone block chain according to the consensus relation and the consensus algorithm.
4. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the consensus layer realizes the connection of all the block consensus relations to form a cone block chain encryption chain network, wherein the blocks of the cone block chain are connected with other blocks according to the same-column consensus relation of the consensus layer; the blocks of the cone block chain are connected with the same column and the same layer according to the same column and the same layer of the non-column and the same layer of the consensus layer to form a cone hierarchical chain type data structure; and establishing inter-column and inter-layer connection among the blocks according to the non-column and non-same-layer relationship of the blocks.
5. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the contract layer comprises script codes, algorithm mechanisms and intelligent contracts, and automatically realizes broadcasting and data transmission of the cone block chain.
6. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein:
the terminal layer comprises any one or more of a PC terminal, a mobile terminal, a sensor terminal and a data terminal;
the base layer comprises a personal identification machine integrated block authentication block, a personal identity authentication block and a legal identity authentication block;
the permission qualification layer comprises a permission authentication block, a qualification authentication block and an identity relation proving block;
the product layer comprises a production management legal user block, a currency issuing block and a financial legal user block;
the asset analysis layer comprises product attributes, currency attributes, value circulation cone identity record and analysis;
the credit layer comprises personal credit, legal credit and social credit;
the sharing layer comprises product sharing, asset resource sharing, financial sharing and social sharing.
7. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the cone block chain terminal initiates a request by a personal identity, and a personal identity authentication block of the cone block chain performs personal identity authentication, and after the authentication is passed, the cone block chain terminal sends the personal identity authentication block corresponding to the certificate number to perform biological recognition and the terminal acquires living body comparison to perform identity information authentication; the authentication information return terminal displays the authentication information.
8. The hierarchical architecture of a pyramidal blockchain of claim 1, wherein: the cone block chain terminal initiates a request by a legal identity, and sends the request to a legal representative or legal authorized representative corresponding to the certificate after passing the authentication of the registered human-certificate-machine integrated authentication block; the personal registered identity authentication block performs comparison with the living organism information collected by the terminal, and after the comparison is passed, the personal registered identity authentication block is sent to the legal registered authentication block to perform legal identity information authentication; after passing the authentication, sending authentication information to the terminal; the authentication information return terminal displays the authentication information.
CN202011256084.7A 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain Active CN112199445B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011256084.7A CN112199445B (en) 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain
PCT/CN2021/120041 WO2022100291A1 (en) 2020-11-11 2021-09-24 Hierarchical architecture of pyramid blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011256084.7A CN112199445B (en) 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain

Publications (2)

Publication Number Publication Date
CN112199445A CN112199445A (en) 2021-01-08
CN112199445B true CN112199445B (en) 2023-06-23

Family

ID=74034177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011256084.7A Active CN112199445B (en) 2020-11-11 2020-11-11 Hierarchical architecture of cone block chain

Country Status (2)

Country Link
CN (1) CN112199445B (en)
WO (1) WO2022100291A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199445B (en) * 2020-11-11 2023-06-23 山西特信环宇信息技术有限公司 Hierarchical architecture of cone block chain
CN112750032A (en) * 2021-01-29 2021-05-04 山西特信环宇信息技术有限公司 Cash management system based on cone block chain and chain loading method thereof
CN113360445B (en) * 2021-07-07 2022-11-04 上海万向区块链股份公司 Lithium ion battery data acquisition sharing device based on block chain technology
CN115495714B (en) * 2022-09-14 2023-07-07 湖南大学 Financial artificial intelligence algorithm integration method and system based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147735A (en) * 2017-05-12 2017-09-08 北京博晨技术有限公司 A kind of distributed account book system based on hierarchy
CN110019347A (en) * 2018-01-02 2019-07-16 中国移动通信有限公司研究院 A kind of data processing method, device and the terminal device of block chain
CN110097445A (en) * 2018-12-11 2019-08-06 周晓辉 Internet finance cloud transaction platform and implementation method based on block chain
CN110609674A (en) * 2019-08-19 2019-12-24 杭州云象网络技术有限公司 Symbiotic information physical system construction method based on block chain technology
CN111049895A (en) * 2019-12-09 2020-04-21 北京工商大学 Improved PBFT consensus method based on ISM
CN111371905A (en) * 2020-03-27 2020-07-03 中国人民解放军国防科技大学 Block chain layered consensus proving system structure and method based on cloud computing
CN111444277A (en) * 2020-03-31 2020-07-24 中国刑事警察学院 Anti-terrorist information collaborative sharing platform and method based on block chain technology

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108337219B (en) * 2017-11-27 2021-12-28 中国电子科技集团公司电子科学研究院 Method for preventing Internet of things from being invaded and storage medium
CN108305056B (en) * 2018-03-27 2023-11-10 北京蓝亚盒子科技有限公司 Block chain-based data processing method and device and block chain node network
CN108596766A (en) * 2018-04-28 2018-09-28 深圳市优学链科技有限公司 Block chain credit rating method, apparatus, computer equipment and storage medium
CN108667618B (en) * 2018-05-10 2020-07-03 阿里巴巴集团控股有限公司 Data processing method, device, server and system for member management of block chain
CN108764925A (en) * 2018-05-31 2018-11-06 李沁福 A kind of synthesis business platform based on block chain technology
CN109118168A (en) * 2018-07-20 2019-01-01 北京开普云信息科技有限公司 A kind of government affairs service process traceability system and its construction method based on block chain mechanism
CN109379266B (en) * 2018-09-29 2021-05-07 湖南智慧政务区块链科技有限公司 Method and system for constructing multi-layer government affair block chain network based on star network
CN109472593A (en) * 2018-10-10 2019-03-15 远光软件股份有限公司 A kind of settlement method based on block chain technology, device and block chain network
CN109560938A (en) * 2019-01-23 2019-04-02 广州微盾科技股份有限公司 Based on the block catenary system for referring to human body biological characteristics identification technology
CN109859046A (en) * 2019-01-30 2019-06-07 威海华智数字经济研究院有限公司 One kind being based on block chain technology big data wisdom operation management system
CN109756589B (en) * 2019-02-20 2020-11-13 中国互联网络信息中心 Domain name information maintenance system based on block chain multi-party co-treatment
CN111461879A (en) * 2020-03-11 2020-07-28 中关村科技软件股份有限公司 Block chain-based government affair service processing system and method
CN112199445B (en) * 2020-11-11 2023-06-23 山西特信环宇信息技术有限公司 Hierarchical architecture of cone block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147735A (en) * 2017-05-12 2017-09-08 北京博晨技术有限公司 A kind of distributed account book system based on hierarchy
CN110019347A (en) * 2018-01-02 2019-07-16 中国移动通信有限公司研究院 A kind of data processing method, device and the terminal device of block chain
CN110097445A (en) * 2018-12-11 2019-08-06 周晓辉 Internet finance cloud transaction platform and implementation method based on block chain
CN110609674A (en) * 2019-08-19 2019-12-24 杭州云象网络技术有限公司 Symbiotic information physical system construction method based on block chain technology
CN111049895A (en) * 2019-12-09 2020-04-21 北京工商大学 Improved PBFT consensus method based on ISM
CN111371905A (en) * 2020-03-27 2020-07-03 中国人民解放军国防科技大学 Block chain layered consensus proving system structure and method based on cloud computing
CN111444277A (en) * 2020-03-31 2020-07-24 中国刑事警察学院 Anti-terrorist information collaborative sharing platform and method based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李悦.《区块链智能合约技术与应用》.2019,第5-6页. *

Also Published As

Publication number Publication date
CN112199445A (en) 2021-01-08
WO2022100291A1 (en) 2022-05-19

Similar Documents

Publication Publication Date Title
CN112199445B (en) Hierarchical architecture of cone block chain
CN109450638A (en) Electronic component data management system and method based on block chain
Gimenez-Aguilar et al. Achieving cybersecurity in blockchain-based systems: A survey
CN111988338B (en) Permission-controllable Internet of things cloud platform based on block chain and data interaction method
Cash et al. Two-tier permission-ed and permission-less blockchain for secure data sharing
CN112148787B (en) Cone block, cone block chain structure and method
CN112149073B (en) Cone blockchain management method and system
CN110097445A (en) Internet finance cloud transaction platform and implementation method based on block chain
CN109377363B (en) Block chain-based Internet of things data transaction architecture and transaction security method thereof
CN110096903A (en) Assets verification method and block chain network system based on block chain
CN111475866A (en) Block chain electronic evidence preservation method and system
Valdivia et al. Decentralization: The failed promise of cryptocurrencies
CN112101940A (en) Random verifiable sample selection system implemented with block chains
CN112769917A (en) Owner power alliance chain of cone block chain
Beckmann et al. Blockchain‐based cyber physical trust systems
CN112199729B (en) Cone blockchain verification method and system
CN116305316A (en) Data management method for realizing intelligent construction based on alliance chain
CN112491914B (en) Block chain bidirectional authentication method, communication method and system
CN112637274A (en) Cone block chain terminal and access method thereof
CN112560081B (en) Cone blockchain intelligent contract operation method and system
CN112822687B (en) Cone block chain mobile terminal authentication method
Zhai et al. A review of Blockchain-based access control for the industrial IoT
CN109117653A (en) A kind of encryption system and method for service transaction system of networking
Dewangan et al. Peer-to-peer trade registration process with blockchain in small and medium enterprises (smes) in e-governance
EP4356562A1 (en) Self-sovereign-identities (ssi) for iot and next internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant