CN112769917B - Owner power alliance chain of cone block chain - Google Patents

Owner power alliance chain of cone block chain Download PDF

Info

Publication number
CN112769917B
CN112769917B CN202011616843.6A CN202011616843A CN112769917B CN 112769917 B CN112769917 B CN 112769917B CN 202011616843 A CN202011616843 A CN 202011616843A CN 112769917 B CN112769917 B CN 112769917B
Authority
CN
China
Prior art keywords
block
chain
cone
authentication
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011616843.6A
Other languages
Chinese (zh)
Other versions
CN112769917A (en
Inventor
李俊
李晶宇
武少华
张琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Texin Huanyu Information Technology Co ltd
Original Assignee
Shanxi Texin Huanyu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanxi Texin Huanyu Information Technology Co ltd filed Critical Shanxi Texin Huanyu Information Technology Co ltd
Priority to CN202011616843.6A priority Critical patent/CN112769917B/en
Publication of CN112769917A publication Critical patent/CN112769917A/en
Priority to PCT/CN2021/120066 priority patent/WO2022142514A1/en
Application granted granted Critical
Publication of CN112769917B publication Critical patent/CN112769917B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Abstract

The invention belongs to the technical field of block chains, and particularly relates to a master right alliance chain of cone block chains, wherein each cone block chain is a cone master right chain, and all cone master right chains are agreed to form a master right alliance chain; information transmission and authentication are carried out among all cone master right chains through a plurality of consensus blocks; and point-to-point data communication is carried out among the cone master weight chains through a standard transmission unit, and broadcast information is sent to the consensus block. The cone alliance chain is formed by the consensus of a plurality of main weight cone block chains, the information transmission and the information authentication of the plurality of consensus blocks among the main weight cone block chains are carried out through the standard transmission unit of the cone block chain, the main weight chain and the alliance chain which are equally free and can be supervised by the government can be built, and the mutual authentication and the communication of the alliance chain can be realized.

Description

Owner power alliance chain of cone block chain
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a master right alliance chain of a cone block chain.
Background
The block chain is essentially an open source distributed account book, is a core technology of other virtual currencies, can efficiently record transactions of buyers and sellers, and ensures that the records are verifiable and permanently stored. Meanwhile, the block chain has the characteristics of decentralization, mediation, information transparency, no tampering, safety and the like. The block chain has the problems of no government supervision, low safety and the like.
Block chains are divided into public, private, and federation chains. We are familiar with the public chain, which refers to a chain of consensus blocks that anyone worldwide can read, send transactions and obtain valid confirmations. Any node of the public chain is open to anyone, and everyone can participate in the calculation in the blockchain, and can download and obtain the data of the complete blockchain, namely all accounts.
The alliance chain is commonly maintained by member nodes in the alliance, the nodes can be added into the alliance network after authorization, and all or part of functions are opened only for the alliance members. Some nodes are designated as bookkeeper in advance, generation of each block is decided by all bookkeeper together, and other nodes can trade but have no bookkeeping right.
The alliance chain has partial decentralization, strong controllability, no default data disclosure, fast transaction speed and the like, but the alliance chain has some defects:
the alliance chain is still highly dependent on the center, the alliance chain is controlled by a plurality of centers, the system is distributed and accounted by a plurality of authoritative organizations, and the nodes work coordinately according to a consensus mechanism. Authentication of the transaction requires a federation internal decision. Each node corresponds to an entity authority, and any entity authority node wants to join the alliance chain and needs to obtain the permission of the alliance chain, which can increase the authority of alliance owner nodes, is not beneficial to the equal transaction and verification of all nodes, and causes the consensus of the alliance chain to lack safety guarantee.
The verification of the existing alliance chain members is determined by the inside of an alliance chain, government supervision is lacked, and mutual communication and authentication are lacked among the existing alliance chains, so that the alliance chain transaction is lack of safety guarantee, and fairness of the alliance chain internal transaction is not facilitated.
Disclosure of Invention
Aiming at the technical problems, the invention provides a master authority alliance chain of a cone block chain, which can solve the problems that the existing alliance chain is lack of security in consensus, the identity authentication of alliance chain members is lack of supervision, the mutual authentication and communication of alliance chains are lack of and the like.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a master authority alliance chain of cone block chains is characterized in that each cone block chain is a cone master authority chain, and all cone master authority chains are in consensus to form a master authority alliance chain; information transmission and authentication are carried out among all cone master right chains through a plurality of consensus blocks; and point-to-point data communication is carried out among the cone master weight chains through a standard transmission unit, and broadcast information is sent to the consensus block.
Dividing all blocks in a main weight cone block chain according to region levels, wherein a human-computer-integrated authentication node block coded hash value, a personal identity authentication node block coded hash value and a legal identity authentication node block coded hash value of a main weight cone block chain base layer respectively correspond to a human-computer-integrated authentication node block coded hash value, a personal identity authentication node block coded hash value and a legal identity authentication node block coded hash value of a storage consensus block; the terminal code of the master weight cone block chain stores the consensus block terminal code.
The consensus blocks of the pyramid block chain include the consensus blocks of the respective master-weight pyramid block chain and the consensus blocks of the master-weight federation chain, including but not limited to the consensus blocks of the two master-weight pyramid block chains.
The information of the standard transmission unit comprises: the method comprises the following steps of cone block chain terminal coding, registered human-computer-integrated authentication node block coding, personal identity authentication node block coding and legal identity authentication node block coding.
After a new block in the main weight cone block chain is generated, the block codes of the block chain common identification blocks of different cone blocks are obtained according to the block codes, and the broadcast information generated by the block is sent to the common identification blocks in other cone block chains.
The information is verified after the common identification blocks in the main weight cone block chain receive the broadcast; the verified information includes: verifying the broadcast block code, the broadcast content, the block content and the administrator information; and finishing verification through the block information and the hash value of the corresponding information.
When any node accesses the ownership alliance chain, the node needs to be authenticated, and the authentication process comprises the following steps:
s1, registering the nodes on the cone block chain, and authenticating the cone block chain by a human-card-machine integrated authentication node block, a personal identity authentication node block and a legal identity authentication node block;
s2, after the node authentication is completed, generating a node block code in the cone block chain, and broadcasting block code information to the common block;
s3, the consensus blocks comprise the consensus block of the master pyramid chain and the consensus block of the non-master pyramid chain; the consensus block receives the broadcast information and stores the coding information, the administrator information, etc. of the node block at the corresponding position.
The bidirectional identity authentication process of the different master weight cone block chain nodes is as follows:
s1, the authentication and authenticated node blocks complete registration on the cone block chain, and the node block coded hash value is stored in the total cone block corresponding to the cone master weight chain;
s2, the authentication node block initiates an authentication request to the authenticated node block, the authentication node block passes the authentication of the local pyramid block chain, and sends the authentication result to the authenticated node block.
S3, the authenticated node block needs to pass the authentication of the body cone block chain, and the authentication result is sent to the authentication node block;
s4, the authentication node block obtains the coded address, the network address and the server identification of the authenticated node block through the total cone block, and the authentication of the authentication node block to the relevant information of the authenticated node block is realized;
s5, similarly, the authenticated node block may also obtain the coded address, the network address and the server identifier of the authentication node block from the master weight cone block chain total block where the authentication node block is located, so as to implement bidirectional authentication between different master weight cone block chain blocks.
Compared with the prior art, the invention has the following beneficial effects:
the cone union chain is formed by the consensus of a plurality of main right cone block chains, the information transmission and the information authentication of a plurality of consensus blocks among the main right cone block chains are carried out through the standard transmission unit of the cone block chain, the main right cone block chain and the main right union chain which are equally free and can be supervised by the government can be constructed, and the mutual verification and the communication of the main right union chain can be realized.
Drawings
Fig. 1 is a schematic view of the overall structure of the present invention.
FIG. 2 is a block diagram of a standard transmission unit of the present invention;
FIG. 3 is a flow chart of the authentication method for accessing the node to the owner authority alliance chain;
FIG. 4 is a diagram of the master federation chain mutual authentication architecture of the present invention;
fig. 5 is a flow chart of the mutual authentication method of the master authority federation chain of the present invention.
FIG. 6 is a schematic view of the cone block structure of the present invention;
FIG. 7 is a schematic view of a pyramidal block chain structure according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1 to 5, in a master authority alliance chain, each cone zone block chain is a cone master authority chain, and all cone master authority chains agree with each other to form a master authority alliance chain; information transmission and authentication are carried out among all cone master right chains through a plurality of consensus blocks; and point-to-point data communication is carried out among the cone master weight chains through a standard transmission unit, and broadcast information is sent to the consensus block.
Dividing all blocks in a main weight cone block chain according to region levels, wherein a human-computer-integrated authentication node block coded hash value, a personal identity authentication node block coded hash value and a legal identity authentication node block coded hash value of a main weight cone block chain base layer respectively correspond to a human-computer-integrated authentication node block coded hash value, a personal identity authentication node block coded hash value and a legal identity authentication node block coded hash value of a storage consensus block; the terminal code of the master weight cone block chain stores the consensus block terminal code.
The consensus blocks of the pyramid block chain include the consensus blocks of the respective master-weight pyramid block chain and the consensus blocks of the master-weight federation chain, including but not limited to the consensus blocks of the two master-weight pyramid block chains.
As shown in fig. 2, the information of the standard transmission unit includes: the method comprises the following steps of cone block chain terminal coding, registered human-computer-integrated authentication node block coding, personal identity authentication node block coding and legal identity authentication node block coding.
After a new block in the main weight cone block chain is generated, the block codes of the block chain common identification blocks of different cone blocks are obtained according to the block codes, and the broadcast information generated by the block is sent to the common identification blocks in other cone block chains.
The information is verified after the common identification blocks in the main weight cone block chain receive the broadcast; the verified information includes: verifying the broadcast block code, the broadcast content, the block content and the administrator information; and finishing verification through the block information and the hash value of the corresponding information.
As shown in fig. 3, when any node accesses the master federation chain, it needs to authenticate the node, and the authentication process includes:
(1) the method comprises the following steps that nodes are registered on a cone block chain, and authentication of an authentication node block, a personal identity authentication node block and a legal identity authentication node block is achieved through a cone block chain and a certificate machine;
nodes include, but are not limited to, personal user blocks, corporate user blocks, and also include some institutions, organizations, and the like.
The identity authentication of the personal user block or the legal user block comprises the following specific implementation steps:
a client is opened by a user of a cone block chain terminal through personal biological identification authentication, and an authentication request is sent to a registered human-computer integrated authentication node block and a personal identity authentication node block;
the ID-card-machine integrated authentication node block authenticates the sent terminal identification, the terminal number and the bound ID card number, and after the ID-card-machine integrated authentication node block passes the authentication, a message that the ID-card-machine integrated authentication passes is sent to the ID authentication node block corresponding to the ID card number;
and the identity authentication node block receives an authentication request sent by the client side of the cone block chain terminal and a message that the authentication of the ID-card-machine integrated authentication node block passes, the cone block chain terminal acquires the biological information of the identity according to the biological information retained by the identity number and compares the biological information with the information retained by the identity authentication node block to perform living body comparison, and after the comparison is successful, the authentication is completed.
(2) After the node authentication is completed, generating a node block code in the cone block chain, and broadcasting block code information to the common block;
(3) the consensus blocks comprise the consensus blocks of the master pyramid chain and the consensus blocks of the non-master pyramid chain; after the common identification block receives the broadcast information, the coding information, the administrator information and the like of the node block are stored at the corresponding position.
As shown in fig. 5, the specific implementation steps of performing bidirectional identity authentication on different master-right cone blockchain nodes are as follows:
(1) the authentication and authenticated node blocks are registered on the cone block chain, and the node block coded hash value is stored in the total cone block corresponding to the master cone chain;
the authentication node block and the authenticated node block are respectively arranged in two cone block chains, the authentication node block codes are stored in the total cone block of the cone block chain of the authentication node block through verification, and the authenticated node block codes are stored in the total cone block of the cone block chain of the authentication node block through verification.
(2) The authentication node block initiates an authentication request for the authenticated node block, the authentication node block passes the authentication of the cone block chain and sends an authentication result to the authenticated node block;
(3) the authenticated node block needs to pass the authorization authentication of the cone block chain, and an authorization authentication result is sent to the authentication node block;
(4) the authentication node block receives the authorization authentication information of the authenticated node block, and the coding address, the network address and the server identification of the authenticated node block are obtained through the total cone block of the cone block chain positioned by the authenticated node block, so that the authentication of the authentication node block to the relevant information of the authenticated node block is realized.
Similarly, the authenticated node block can also obtain the coded address, the network address and the server identifier of the authentication node block from the master weight cone block chain total block where the authentication node block is located, so as to realize the bidirectional authentication between different master weight cone block chain blocks.
For example: a and B are two cone block chain terminal client users respectively, and the mutual authentication steps of the A and B in the cone block chain are as follows:
after a client user of the first pyramid block chain passes through the authentication node block authentication and identity authentication node block authentication of the human-machine integrated authentication node block chain, an authentication two-dimensional code is generated by an authentication result and a timestamp and is sent to the client of the second pyramid block chain terminal;
the client user of the first cone area block chain terminal broadcasts the authentication result to the cone union chain network at the same time, and sends the standard transmission unit to the client user of the second cone area block chain terminal;
the client user login of the B-cone block chain terminal is similar to that of the A, after the authentication of the B-cone block chain is carried out, the authentication two-dimensional code sent by the client user of the A-cone block chain terminal is scanned, the human-certificate-machine-integrated authentication node block code, the personal identity authentication node block code, the legal identity authentication node block code and the terminal code which are registered in the A-cone block chain terminal are obtained, and the coded address, the network address and the server identification of the B-cone block chain terminal are obtained through the total cone block of the A-cone block chain.
Similarly, the client user of the client of the cone area block chain can also be authenticated.
The client user of the first-cone blockchain terminal and the client user of the second-cone blockchain terminal can verify each other, and can also transmit information to each other, perform real-time communication and the like.
If the user is a legal user, the identity authentication node block of the legal user is authenticated through the cone block chain.
In this embodiment, a and b are users of two pyramidal block chains, respectively, or may be some mechanisms, organizations, and the like that access the pyramidal block chains.
For example: and the third is a client user of the owner weight cone zone chain terminal, and the third is a mechanism of the owner weight union chain terminal. The third organization initiates authentication on the third user, and the third organization needs the main weight cone block chain to pass identity authentication and broadcasts an authentication result to the cone union chain network;
receiving the broadcast at the third user of the master right cone block chain, and simultaneously initiating an authorization authentication request to the total cone block of the master right cone block chain where the third user is located;
the third-user-located main right cone block chain verifies the coding information of the block of the T-shaped organization and sends an authorization authentication result to the T-shaped organization;
and the D mechanism of the master cone block chain receives the authorization authentication message, and acquires the coded address, the network address and the server identifier from the total cone block of the cone block chain in which the third user is located, so that the authentication of the D mechanism of the cone alliance chain on the third user is realized.
Similarly, the third user can also realize the authentication of the third organization to obtain the block coding address, the network address and the server identification of the third organization.
The client side C of the pyramidal block chain terminal and the owner authority union chain mechanism can mutually authenticate each other and transmit information and the like in real time.
The consensus blocks of the pyramid block chain in the invention include the consensus blocks of the pyramid block chain and the consensus blocks of the alliance chain, for example, the total pyramid block of the main weight pyramid block chain is a human-computer-integrated authentication node block, the consensus blocks are in consensus with the upper-level and lower-level node blocks in the same column of the main weight pyramid block chain and are in consensus with the human-computer-integrated authentication node block of the total pyramid block of the alliance chain, and the human-computer-integrated authentication node block of the main weight pyramid block chain stores the consensus block codes of the pyramid block chain and the codes of the alliance chain consensus blocks, and the consensus blocks comprise: the hash values of the upper and lower level block codes of the authentication node block integrated with the master weight cone block chain and the testimony machine, the hash value of the block codes of the authentication node block integrated with the testimony machine of the alliance chain, the hash value of the national code of each master weight alliance chain and the like.
The above-mentioned cone blocks and cone block chains are described in detail in a cone block, cone block chain structure and method of patent application No. 202010797084.1, and therefore, the following is briefly described here:
as shown in fig. 6 and 7, the node patches are top-level patches of pyramid patches; the item-dividing unit block is a middle layer block of the cone block, belongs to a classification block of the node block and is a sub-block of the node block; the user tile is the bottom tile of the pyramid tile.
Each sub-block in the pyramid block is composed of a block head and a block body, wherein the block head mainly contains a block code, an associated block hash value, a service network address, a server identification, a time stamp, an administrator information hash value and a block content hash value, and the block body contains administrator information and block content. The administrator information comprises the registration, the change and the logout of an administrator; the block content comprises verification content, associated verification content and other block content.
The user block can apply for a secondary unit block and a secondary user block according to self service contents, such as providing a public platform; the user blocks, the secondary unit blocks and the secondary user blocks form pyramid blocks. There are also some organizations that have no user tiles, or no subentry tiles.
The cone block chain structure comprises a plurality of cone blocks, wherein one cone block is a total cone block, and other cone blocks are divided according to the categories or properties of the cone blocks: cone blocks of the same category or property are positioned in the same row, and node blocks in all the cone blocks on the same row are connected to form a linear chain; forming a plurality of rows of linear chains according to different categories or properties; and the linear chains in different rows intersect with the node blocks in the total cone block to form a cone block chain structure integrally.
Cone blocks in the same row are layered according to the levels and form a private chain according to the association consensus relationship; forming cone union chains by the linear chains in different columns according to a consensus relationship; tapered blocks of the same grade include more than one tapered block of the same grade on the same layer, i.e., the same layer in the same row.
Private chain: mechanisms with the same property are positioned in the same row of the cone block chains, and each cone block forms a private chain according to the consensus relationship; federation chain: mechanisms with different properties are positioned in different rows of the cone block chains, and all cone blocks form a alliance chain according to a consensus relationship; specifically, the method comprises the following steps: may be classified into different levels 3-6 according to the level of rights (or level of membership).
For example: the connection between the education of Shanxi province, the education of the Shuzhou city and the education of the Pinlu district is a private chain; the connection between the education of the Shanxi province, the civil and political bureau of the Shanxi province, the labor bureau of the Shanxi province and the like is a alliance chain.
The hierarchical relationship is from top to bottom: node block, item unit block, user block, secondary unit block, secondary user block, micro block.
The node blocks, the item dividing unit blocks and the user blocks respectively generate administrator and administrator hash values corresponding to the node blocks, the item dividing unit blocks and the user blocks, wherein the node block administrator hash values comprise hash values of lower item dividing unit block administrators, and the item dividing unit block administrator hash values comprise lower user block administrator hash values; information changes in each administrator may form hash values and broadcast over the cone blockchain.
Although only the preferred embodiments of the present invention have been described in detail, the present invention is not limited to the above embodiments, and various changes can be made without departing from the spirit of the present invention within the knowledge of those skilled in the art, and all changes are encompassed in the scope of the present invention.

Claims (7)

1. A master federation chain of pyramid block chains, comprising: each cone block chain is a master cone block chain, and the master cone block chains achieve consensus through respective total cone block nodes to form a master union chain; the information transmission and authentication are carried out among all the main weight cone block chains through a plurality of consensus blocks; point-to-point data communication is carried out among all main weight cone block chain nodes through a standard transmission unit, and broadcast information is sent to the consensus block;
the nodes of different master weight cone block chains carry out bidirectional identity authentication, and the process is as follows:
s1, the authentication and authenticated node blocks complete registration on the cone block chain, and the node block coded hash value is stored in the total cone block corresponding to the cone master weight chain;
s2, the authentication node block initiates an authentication request to the authenticated node block, the authentication node block passes the authentication of the cone block chain, and the authentication result is sent to the authenticated node block;
s3, the authenticated node block needs to authorize and authenticate through the cone block chain where the authenticated node block is located, and an authorization and authentication result is sent to the authentication node block;
s4, the authentication node block receives the authorization authentication message sent by the authenticated node block, and the coding address, the network address and the server identification of the authenticated node block are obtained through the total cone block of the master cone block chain positioned by the authenticated node block, so that the authentication of the authentication node block to the relevant information of the authenticated node block is realized;
s5, the authenticated node block may also obtain the coded address, the network address and the server identifier of the authentication node block from the master weight cone block chain total cone block where the authentication node block is located, so as to implement bidirectional authentication between different master weight cone block chain blocks.
2. The master-rights union chain of pyramidal cube chains, as claimed in claim 1, wherein: dividing all blocks in a master weight cone block chain according to region levels, wherein a human-computer-integrated authentication node block coded hash value, a personal identity authentication node block coded hash value and a legal identity authentication node block coded hash value of a master weight cone block chain total cone block correspond to a human-computer-integrated authentication node block coded hash value, a personal identity authentication node block coded hash value and a legal identity authentication node block coded hash value of a storage consensus block respectively; the terminal code of the master weight cone block chain stores the consensus block terminal code.
3. The master-rights union chain of pyramidal cube chains, as claimed in claim 1, wherein: the consensus blocks of the pyramid block chain include the consensus blocks of the respective master-weight pyramid block chain and the consensus blocks of the master-weight federation chain, including but not limited to the consensus blocks of the two master-weight pyramid block chains.
4. The master-rights union chain of pyramidal cube chains, as claimed in claim 1, wherein: the information of the standard transmission unit comprises: the method comprises the following steps of cone block chain terminal coding, registered human-computer-integrated authentication node block coding, personal identity authentication node block coding and legal identity authentication node block coding.
5. The master federation chain of pyramidal block chains of claim 1, wherein: after a new block in the main weight cone block chain is generated, the block codes of the block chain common identification blocks of different cone blocks are obtained according to the block codes, and the broadcast information generated by the block is sent to the common identification blocks in other cone block chains.
6. The master-rights union chain of pyramidal cube chains, as claimed in claim 1, wherein: the information is verified after the common identification blocks in the main weight cone block chain receive the broadcast; the verified information includes: verifying the broadcast block code, the broadcast content, the block content and the administrator information; and finishing verification through the block information and the hash value of the corresponding information.
7. The owner alliance chain of pyramid block chains as claimed in claim 1, wherein any node needs to authenticate the node when accessing the owner alliance chain, and the authentication step is:
s1, registering the nodes on the cone block chain, and authenticating the cone block chain by a human-card-machine integrated authentication node block, a personal identity authentication node block and a legal identity authentication node block;
s2, if the node authentication is completed, generating a node block code in the cone block chain, and broadcasting block code information to the common block;
s3, the consensus block receives the broadcast message, and stores the coding information and the administrator information of the node block at the corresponding position.
CN202011616843.6A 2020-12-31 2020-12-31 Owner power alliance chain of cone block chain Active CN112769917B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011616843.6A CN112769917B (en) 2020-12-31 2020-12-31 Owner power alliance chain of cone block chain
PCT/CN2021/120066 WO2022142514A1 (en) 2020-12-31 2021-09-24 Sovereign consortium blockchain of cone blockchains

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011616843.6A CN112769917B (en) 2020-12-31 2020-12-31 Owner power alliance chain of cone block chain

Publications (2)

Publication Number Publication Date
CN112769917A CN112769917A (en) 2021-05-07
CN112769917B true CN112769917B (en) 2022-08-02

Family

ID=75697810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011616843.6A Active CN112769917B (en) 2020-12-31 2020-12-31 Owner power alliance chain of cone block chain

Country Status (2)

Country Link
CN (1) CN112769917B (en)
WO (1) WO2022142514A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769917B (en) * 2020-12-31 2022-08-02 山西特信环宇信息技术有限公司 Owner power alliance chain of cone block chain
CN114153375B (en) * 2021-08-13 2022-07-22 北京天德科技有限公司 Block storage system and block storage method based on block chain technology

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019072263A2 (en) * 2018-11-07 2019-04-18 Alibaba Group Holding Limited Facilitating practical byzantine fault tolerance blockchain consensus and node synchronization
CN110245951A (en) * 2019-06-19 2019-09-17 西南交通大学 A kind of alliance's chain principal and subordinate's multichain common recognition method based on tree structure
CN110489493A (en) * 2019-08-27 2019-11-22 山东浪潮人工智能研究院有限公司 A kind of cloudy data center services quality identification based on block chain
CN110572819A (en) * 2019-07-27 2019-12-13 中国人民解放军战略支援部队信息工程大学 Block chain-based multi-domain wireless Mesh network cross-domain authentication method and system
CN111654465A (en) * 2020-04-17 2020-09-11 全球能源互联网研究院有限公司 Power service cross-domain credible authentication system and method based on block chain
CN112148787A (en) * 2020-08-10 2020-12-29 山西特信环宇信息技术有限公司 Cone block, cone block chain structure and method
CN112149073A (en) * 2020-09-25 2020-12-29 山西特信环宇信息技术有限公司 Cone block chain management method and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124502B (en) * 2017-03-31 2021-01-05 北京大学深圳研究生院 Top-level domain name management method and system based on alliance chain
CN107146087A (en) * 2017-04-11 2017-09-08 广东网金控股股份有限公司 A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain
US20200059369A1 (en) * 2017-05-16 2020-02-20 Peking University Shenzhen Graduate School Determining consensus by parallel proof of voting in consortium blockchain
CN108052530B (en) * 2017-11-10 2020-12-11 杭州云象网络技术有限公司 Decentralized CA construction method and system based on alliance chain
CN109510876A (en) * 2018-12-20 2019-03-22 弗洛格(武汉)信息科技有限公司 A kind of alliance's chain sharding method and corresponding alliance's chain based on PBFT
KR102118962B1 (en) * 2019-03-15 2020-06-05 주식회사 코인플러그 Method and server for managing user identity using blockchain network, and method and terminal for verifying user using user identity based on blockchain network
CN110110498A (en) * 2019-05-10 2019-08-09 中南大学 A kind of digital publishing rights based on alliance's chain really weigh method and system
CN112769917B (en) * 2020-12-31 2022-08-02 山西特信环宇信息技术有限公司 Owner power alliance chain of cone block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019072263A2 (en) * 2018-11-07 2019-04-18 Alibaba Group Holding Limited Facilitating practical byzantine fault tolerance blockchain consensus and node synchronization
CN110245951A (en) * 2019-06-19 2019-09-17 西南交通大学 A kind of alliance's chain principal and subordinate's multichain common recognition method based on tree structure
CN110572819A (en) * 2019-07-27 2019-12-13 中国人民解放军战略支援部队信息工程大学 Block chain-based multi-domain wireless Mesh network cross-domain authentication method and system
CN110489493A (en) * 2019-08-27 2019-11-22 山东浪潮人工智能研究院有限公司 A kind of cloudy data center services quality identification based on block chain
CN111654465A (en) * 2020-04-17 2020-09-11 全球能源互联网研究院有限公司 Power service cross-domain credible authentication system and method based on block chain
CN112148787A (en) * 2020-08-10 2020-12-29 山西特信环宇信息技术有限公司 Cone block, cone block chain structure and method
CN112149073A (en) * 2020-09-25 2020-12-29 山西特信环宇信息技术有限公司 Cone block chain management method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的泛在电力物联网身份认证技术研究;刘廷峰等;《网络空间安全》;20190725(第07期);全文 *

Also Published As

Publication number Publication date
WO2022142514A1 (en) 2022-07-07
CN112769917A (en) 2021-05-07

Similar Documents

Publication Publication Date Title
CN112217807B (en) Cone block chain key generation method, authentication method and system
CN102420690B (en) Fusion and authentication method and system of identity and authority in industrial control system
US11100743B1 (en) Blockchain-based election system
CN109962890B (en) Block chain authentication service device and node admission and user authentication method
CN109450877B (en) Block chain-based distributed IDaaS identity unified authentication system
CN105357176B (en) A kind of legal identity management system of network based on electronic legislative identity certificate network mapping certificate
CN109493063A (en) The method of permission control is carried out in a kind of alliance's block chain
CN112769917B (en) Owner power alliance chain of cone block chain
CN110069908A (en) A kind of authority control method and device of block chain
CN112199445B (en) Hierarchical architecture of cone block chain
CN101136750A (en) Network real-name system implementing method
CN101478541A (en) Living creature characteristic authentication method, living creature characteristic authentication system
CN112540926A (en) Resource allocation fairness federal learning method based on block chain
CN112149073B (en) Cone blockchain management method and system
CN101547096B (en) Net-meeting system and management method thereof based on digital certificate
CN103986734B (en) Authentication management method and authentication management system applicable to high-security service system
CN108449325A (en) A kind of block chain authentication method, equipment and the storage device of ID-based cryptosystem
CN206878870U (en) A kind of safe single-sign-on accesses system
EP4254234A1 (en) Digital credential issuing for an entity
CN112491914B (en) Block chain bidirectional authentication method, communication method and system
CN112199729A (en) Verification method and system for cone block chain
CN112822687B (en) Cone block chain mobile terminal authentication method
CN100380904C (en) Trusting method of network information system based on family genes
CN109117653A (en) A kind of encryption system and method for service transaction system of networking
CN112560081B (en) Cone blockchain intelligent contract operation method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant