CN112769963A - Node communication method based on block distributed block chain and electronic equipment - Google Patents
Node communication method based on block distributed block chain and electronic equipment Download PDFInfo
- Publication number
- CN112769963A CN112769963A CN202110370376.1A CN202110370376A CN112769963A CN 112769963 A CN112769963 A CN 112769963A CN 202110370376 A CN202110370376 A CN 202110370376A CN 112769963 A CN112769963 A CN 112769963A
- Authority
- CN
- China
- Prior art keywords
- node
- block
- super
- long
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 60
- 238000000034 method Methods 0.000 title claims abstract description 49
- 230000015654 memory Effects 0.000 claims description 14
- 230000002093 peripheral effect Effects 0.000 claims description 6
- 230000004083 survival effect Effects 0.000 claims description 6
- 230000003287 optical effect Effects 0.000 claims description 5
- 238000013500 data storage Methods 0.000 abstract description 4
- BQCADISMDOOEFD-UHFFFAOYSA-N Silver Chemical compound [Ag] BQCADISMDOOEFD-UHFFFAOYSA-N 0.000 description 26
- 229910052709 silver Inorganic materials 0.000 description 26
- 239000004332 silver Substances 0.000 description 26
- 239000000463 material Substances 0.000 description 21
- 230000005540 biological transmission Effects 0.000 description 14
- 230000033001 locomotion Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 8
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 6
- 238000003032 molecular docking Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 239000006185 dispersion Substances 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000000126 substance Substances 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000002035 prolonged effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 241001061260 Emmelichthys struhsakeri Species 0.000 description 1
- 241000282412 Homo Species 0.000 description 1
- 241000283973 Oryctolagus cuniculus Species 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- JJWKPURADFRFRB-UHFFFAOYSA-N carbonyl sulfide Chemical compound O=C=S JJWKPURADFRFRB-UHFFFAOYSA-N 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000008034 disappearance Effects 0.000 description 1
- 239000000428 dust Substances 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000024703 flight behavior Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 238000007493 shaping process Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 210000003813 thumb Anatomy 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000035899 viability Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1851—Systems using a satellite or space-based relay
- H04B7/18513—Transmission in a satellite or space-based system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
- H04B7/15—Active relay systems
- H04B7/185—Space-based or airborne stations; Stations for satellite systems
- H04B7/1851—Systems using a satellite or space-based relay
- H04B7/18519—Operations control, administration or maintenance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Astronomy & Astrophysics (AREA)
- Aviation & Aerospace Engineering (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention relates to the technical field of block chains, and discloses a node communication method based on a block distributed block chain and electronic equipment. The node communication method comprises the following steps: and controlling the remote navigation node to be deployed in the non-attack area, wherein the remote navigation node carries a specified number of super blocks, the super blocks with different block heights can form a block distributed block chain, and the calling instruction is executed in response to the calling instruction sent by the target node according to the pivot/tip communication mode. Therefore, on the one hand, when communication is performed in an unapproachable area such as space, the hub/tip communication mode is more suitable for such a scenario, which can relatively guarantee communication efficiency, quality and reliability. On the other hand, each remote navigation node is deployed in the non-attack area, so that the super block of each remote navigation node is prevented from being destroyed or tampered because the super block is physically easy to obtain, and the safety of data storage is improved.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a node communication method based on a block distributed block chain and electronic equipment.
Background
The creation of blockchain technology gives humans the ability to create non-tamperable data records, however, current blockchain systems do not fully exploit this ability, as permanent storage and non-tamperability are relative. The protection capability of the physical environment and the supporting facilities thereof, which are limited by the deployment of the nodes, has the hidden danger of being completely destroyed or tampered, and one of the reasons is as follows: all nodes of the traditional block chain system are deployed on the earth and can be physically obtained and accessed, so that the nodes can be completely destroyed or subjected to full-network consistency tampering.
In addition, in the existing blockchain system, each blockchain node is deployed on the earth, and each blockchain node communicates in a Peer-to-Peer (P2P) communication mode based on a high-bandwidth and low-latency communication network. However, when communication is performed in an interplanetary environment, electronic devices are affected by actual environments with low bandwidth, ultra-long delay and poor directionality, and if communication is performed in a P2P communication mode, communication efficiency and reliability between the electronic devices are low.
Disclosure of Invention
An object of the embodiments of the present invention is to provide a node communication method and an electronic device based on a block distributed block chain, which can improve communication efficiency.
In a first aspect, an embodiment of the present invention provides a node communication method based on a block distributed block chain, including:
controlling a remote node to be deployed in an un-attacked area, wherein the remote node carries a specified number of super blocks, and the super blocks with different block heights can form a block distributed block chain;
responding to a calling instruction sent by a target node according to a central/peripheral communication mode;
and executing the calling instruction.
In a second aspect, a storage medium stores computer-executable instructions for causing an electronic device to perform the above-mentioned node communication method based on a block distributed blockchain.
In a third aspect, the present invention provides a computer program product, where the computer program product includes a computer program stored on a non-volatile computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by an electronic device, the electronic device is caused to execute the above-mentioned node communication method based on a block distributed blockchain.
In a fourth aspect, an embodiment of the present invention provides an electronic device, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to enable the at least one processor to execute the above-mentioned node communication method based on the block distributed blockchain.
Compared with the prior art, the invention at least has the following beneficial effects: in the node communication method based on the block distributed block chain provided by the embodiment of the invention, firstly, the remote navigation node is controlled to be deployed in the non-attack area, the remote navigation node carries a specified number of super blocks, and the super blocks with different block heights can form the block distributed block chain. And secondly, responding to a calling instruction sent by the target node according to the central/peripheral communication mode. Again, the call instruction is executed. Therefore, on the one hand, when communication is performed in an unapproachable area such as space, the hub/tip communication mode is more suitable for such a scenario, which can relatively guarantee communication efficiency, quality and reliability. On the other hand, each remote navigation node is deployed in the non-attack area, so that the super block of each remote navigation node is prevented from being destroyed or tampered because the super block is physically easy to obtain, and the safety of data storage is improved. On the other hand, since the super blocks can be stored in a distributed manner and the super blocks with different block heights can form the block distributed block chain, the block distributed block chain provided by the embodiment can be ensured to have the characteristics of decentralization, transparency and non-falsification on the premise of improving the flexibility of the storage blocks. On the other hand, even along with the increase of the service time of the blockchain, the embodiment can balance and coordinate the storage capacity of the accounting node, and avoid the situation that the accounting node is broken down or exits accounting due to the fact that the accounting node stores too many blockdata.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a schematic view of an application scenario of a distributed blockchain system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a node communication method based on a block distributed block chain according to an embodiment of the present invention;
fig. 3a to fig. 3e are schematic structural diagrams of a block distributed blockchain according to an embodiment of the present invention;
fig. 4a is a schematic view of an application scenario of another distributed blockchain system according to an embodiment of the present invention;
fig. 4b is a schematic diagram of a long-range node escape solar system according to an embodiment of the present invention;
FIG. 4c is a schematic diagram of the coordinates of the sun in the galaxy system according to an embodiment of the present invention;
FIG. 4d is a schematic diagram of planning sector areas in the sparse regions of interplanetary substances in various directions according to the embodiment of the present invention;
fig. 4e is a schematic flow chart of the movement direction of each of the long-range nodes on the same side entering the distributed layout area after leaving the solar system according to the transmission sequence;
fig. 4f is a schematic layout diagram of transmitting a long-range node in a sector area according to a transmission sequence according to an embodiment of the present invention;
fig. 4g is a flowchart illustrating a node communication method based on a block distributed blockchain according to another embodiment of the present invention;
fig. 5a is a scene schematic diagram of the long-haul node returning the public key to the target node according to this embodiment;
FIG. 5b is a schematic flow chart of S23 shown in FIG. 2;
FIG. 5c is a schematic view of the process of S233 shown in FIG. 5 b;
FIG. 5d is another schematic flow chart of S53 shown in FIG. 5 b;
fig. 6 is a schematic circuit diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, if not conflicted, the various features of the embodiments of the invention may be combined with each other within the scope of protection of the invention. Additionally, while functional block divisions are performed in apparatus schematics, with logical sequences shown in flowcharts, in some cases, steps shown or described may be performed in sequences other than block divisions in apparatus or flowcharts. The terms "first", "second", "third", and the like used in the present invention do not limit data and execution order, but distinguish the same items or similar items having substantially the same function and action.
Fig. 1 is a schematic view of an application scenario of a distributed blockchain system according to an embodiment of the present invention, as shown in fig. 1, a distributed blockchain system 100 includes a client 11 and a blockchain network 12, where the client 11 is in communication connection with the blockchain network 12, where the communication mode includes a wireless communication mode or a wired communication mode supporting any suitable communication protocol.
The clients 11 are used to communicate with the blockchain network 12 to complete relevant business logic, such as transactions, synchronizing data, retrieving query data, uploading data, and the like. In some embodiments, the client 11 comprises a smartphone, tablet, laptop or desktop computer, or the like.
The blockchain network 12 includes various nodes serving as various service roles in the blockchain system, as shown in fig. 1, the various nodes include a block node 121, a long-range node 122, and a common node 123, and the block node 121, the long-range node 122, and the common node 123 are connected to each other in a communication manner.
The out-block nodes 121 are configured to recognize the super-block commonly, and when the common recognition passes through the super-block, the super-block is written into the distant node 122, where the number of the out-block nodes 121 may be multiple, and the out-block nodes 121 may use any suitable common recognition algorithm to complete the common recognition of the super-block, such as a long-old community common recognition mechanism, a Proof of Work (PoW), a Proof of rights and interests (Proof of behaviour, POS), a Proof of shares authority (release Proof of behaviour, DPoS), a Practical Bypath Fault Tolerance (PBFT), a licensed bypath Fault Tolerance (DBFT), and the like.
The superblocks described herein may be blocks of any suitable data type, any suitable data size, and no undue restrictions are imposed on the data type and/or data size of the superblocks herein.
The remote node 122 is configured to store the super blocks passed by the block-out node 121 in a consensus, and generally, the super blocks stored locally by the remote node 122 have the highest authenticity because the remote node 122 is written into the super blocks earliest and is a node determined by the respective block-out nodes 121 in a consensus algorithm, where the number of the remote nodes 122 may be multiple.
The common node 123 is a node with an accounting function, and can initiate an accounting book transaction and record a block, and can also record a super block from other nodes synchronously to update a local accounting book.
It will be appreciated that in some embodiments, some nodes in the blockchain network 12 may concurrently assume multiple business roles, e.g., the out-of-blockchain node 121 may not only commonly identify superblocks, but may also have accounting or transaction functions, and therefore, in this context, no undue restrictions are made on the business logic that the blockchain node is capable of performing. In some embodiments, a tile link point may comprise a smartphone, tablet, laptop, desktop, or server, among others.
As an aspect of the embodiments of the present invention, an embodiment of the present invention provides a node communication method based on a block distributed block chain. Referring to fig. 2, a block distributed blockchain based node communication method S200 includes:
s21, controlling the long-range nodes to be deployed in the non-attack areas, wherein the long-range nodes carry a specified number of super blocks, and the super blocks with different block heights can form a block distributed block chain;
in the present embodiment, the non-attack area is an area that physically requires a great effort or a sacrifice to capture the distant node, and for example, the non-attack area includes space, the ground, a deep hole, the sea bottom, or the like with respect to the earth.
In this embodiment, the super block includes a block head and a block body, where as described above, the super block may be a block of any suitable data type and any suitable data size, and the block head carries service data, where the service data may be data in any suitable service scenario, and the data content may be content in any form, for example, in a transaction scenario, the service data is transaction data of both parties, and the data content is content of a payer, a payee, a payment amount, and the like, or in order to prevent a certain technical data from being lost and a certain technology cannot be effectively restored, in an important data storage scenario, the service data is important technical data of an industry, and the data content is technical content capable of restoring the industry or a certain technical field.
In this embodiment, the corresponding node packs the service data into candidate blocks, the block output node recognizes the candidate blocks by using a consensus algorithm to obtain super blocks, and then the block output node writes a specified number of super blocks into at least one long-haul node, and the super blocks with different block heights can form a block distributed block chain.
In this embodiment, the block chain network defines the number of super blocks written into the remote node by the block node as a designated number, and the block node writes the designated number of super blocks into the same remote node according to a predetermined rule, where the designated number may be one or more than two, and the block heights of the super blocks written into the same remote node may be different.
In this embodiment, the number of the long-range nodes of the blockchain network may be multiple, and the super blocks with different block heights may be stored in different long-range nodes or in the same long-range node.
It can be understood that the number of the long-haul nodes with the same block height may be one or more than two, and when more than two long-haul nodes are written, the super block can be stored more safely, the risk that a certain long-haul node cannot normally provide the super block due to malicious attack is reduced, and the efficiency of synchronizing the super block is also improved.
In this embodiment, superblocks stored by different remote nodes or superblocks of the same remote node are interlocked to form a block distributed block chain.
For example, referring to fig. 3a, the tele-node 1-1 writes a super block with a block height of 1, the tele-node 2-1 writes a super block with a block height of 2, the tele-node 3-1 writes a super block with a block height of 3, and so on, so that in fig. 3a, each tele-node writes one super block, and the super blocks of the respective tele-nodes form an interlocking relationship with each other, thereby forming a block distributed block chain.
For another example, referring to fig. 3b, the super-block with the block height of 1 is written into each of the tele-navigation node 1-1, the tele-navigation node 1-2, and the tele-navigation node 1-3, the super-block with the block height of 2 is written into each of the tele-navigation node 2-1, the tele-navigation node 2-2, and the tele-navigation node 2-3, and the super-block with the block height of 3 is written into each of the tele-navigation node 3-1, the tele-navigation node 3-2, and the tele-navigation node 3-3, and so on, therefore, in fig. 3b, the super-blocks with the same block height are written into a plurality of tele-navigation nodes, each of the tele-navigation nodes is written into a super-block, and the super-blocks of each of the tele-navigation nodes form an interlocking relationship with.
For example, referring to fig. 3c, the tele-node 1-1 writes super blocks with block heights of 1 and 2, the tele-node 2-1 writes super blocks with block heights of 3 and 4, and the tele-node 3-1 writes super blocks with block heights of 5 and 6, and so on, so that in fig. 3c, each tele-node writes two super blocks with consecutive block heights, and the super blocks of each tele-node and the super blocks of the same tele-node form an interlocking relationship with each other, thereby forming a block-distributed block chain.
For example, referring to fig. 3d, a plurality of remote nodes 1-1 write super blocks with block heights of 1 and 2, a plurality of remote nodes 2-1 write super blocks with block heights of 3 and 4, a plurality of remote nodes 3-1 write super blocks with block heights of 5 and 6, and so on, so in fig. 3d, a plurality of remote nodes write two super blocks with continuous block heights, and the super blocks of each remote node and the super blocks of the same remote node form an interlocking relationship with each other, thereby forming a block distributed block chain.
It is understood that there may be more superblocks written to the distant nodes, and that multiple distant nodes 1-1 write superblocks with block heights of 1,2 and 3, respectively.
It is further understood that the block heights of the super blocks written into the same remote navigation node may be continuous or discontinuous, the block chain network may self-agree on block writing rules, and each of the block output nodes may complete the super block writing according to the block writing rules. As shown in fig. 3e, a plurality of tele-nodes 1-1 write super blocks with block heights of 1 and 3, a plurality of tele-nodes 2-1 write super blocks with block heights of 2 and 4, a plurality of tele-nodes 3-1 write super blocks with block heights of 5 and 7, and so on, so in fig. 3e, a plurality of tele-nodes write two super blocks with discontinuous block heights, and the super blocks of each tele-node and the super blocks of the same tele-node form an interlocking relationship with each other, thereby forming a block distributed block chain.
The existing block chain depends on the timed block output of the accounting content, so that the block is idle and full, and the operation benefit is poor.
In some embodiments, after each of the remote nodes stores a specified number of super blocks, the super blocks are configured in a closed mode in which reception of other blocks is disabled, and the super blocks are in a read-only mode.
The closed mode is a mode that the far-haul node enters a mode of forbidding receiving writing of other blocks after writing a specified number of super blocks, and the read-only mode is a mode that data of the super blocks can only be read but modification, deletion or updating is forbidden.
In some embodiments, after each of the nodes enters the closed mode, although it prohibits writing other blocks, it may also receive writing of auxiliary data other than blocks, for example, the auxiliary data includes address information of other nodes and the block height of the super block.
Therefore, as the far-haul node enters the closed mode, the super blocks can be prevented from being added or deleted due to malicious attack, and the order, the safety and the stability of the block distributed block chain can be maintained. And moreover, the super block enters a read-only mode after being written into the long-range node, so that malicious nodes are prevented from tampering or deleting the super block, and the data stability and the data security of the super block are maintained.
In some embodiments, the number of superblocks with 1 assigned and different block heights are distributed at different nodes to form a block-distributed block chain, i.e. the block chain structure is as shown in fig. 3a, and this block chain structure can improve the real-time performance of uplink on the block, which is beneficial to enhance the security and transparency of the block chain.
For more secure and reliable shaping of the block distributed block chain, please refer to table 1 in some embodiments:
TABLE 1
As shown in table 1, the super block includes a block body including service data and a parent node list, the block header includes a block height, a parent block hash and a block body hash, and the parent node list includes node information of each parent tele-transit node at the same block height.
In this embodiment, the parent node list is a list containing node information of each parent tele-transit node at the same block height, the block height is the arrangement height of the current super block in the block-distributed block chain, the parent block hash is the hash of a block arranged in the block-distributed block chain and in front of the current super block, the block hash is used to anchor each data in the block, in some embodiments, the block hash may be the hash of all data in the block, and may also include the service data hash and the parent node list hash, please refer to table 2,
TABLE 2
As shown in table 2, the service data hash is a hash of the service data in the zone block, and the parent node list hash is a hash of the parent node list in the zone block. Since the block hash is divided into the service data hash and the parent node list hash, when the super block is verified subsequently, the method can be beneficial to other nodes to reliably and safely verify the validity of the super block in a multi-dimensional manner.
As shown in table 1 or table 2, the parent distant node is a distant node where the parent superblock of the current superblock is located, for example, please refer to fig. 3b, the second superblock with block height of 1 is the parent of the first superblock with block height of 2, that is, the second superblock and the first superblock are in a parent-child relationship, so that the distant node 1-1 is the parent distant node of the distant node 2-1.
In some embodiments, since the parent node list includes node information of each parent tele-navigation node at the same block height, when the validity of the current super block is verified at a later stage, the block link point may extract node information of each parent tele-navigation node in the parent node list from the current super block, obtain the parent super block according to the node information of the parent tele-navigation node, calculate a parent block hash of the parent super block, compare the parent block hash with the parent block hash of the current super block, if the parent block hash is consistent with the parent block hash of the current super block, the current super block is legal at the point, and if the parent block hash is inconsistent with the parent block hash, the current super block is illegal. Therefore, by adopting the method, the block distributed block chain can be shaped more safely and reliably.
In some embodiments, the node information of each of the far-voyage nodes includes a node hash and/or a node public key, the node hash of the far-voyage node is used to identify the far-voyage node, the node hash may be a hash of a device serial number of the far-voyage node, and may also be calculated by a character or a character string representing the device information of the far-voyage node according to a hash algorithm, and may further be a hash representing an address of the far-voyage node, and in a later stage, other block link nodes may access the far-voyage node according to the node information of the far-voya. The node public key is used for assisting in verifying the validity of relevant services participated by the long-range node, wherein the node public key of the long-range node can be broadcasted in a block chain network, and all relevant block chain nodes can obtain the node public key of the long-range node.
In some embodiments, the block header of the superblock includes a node signature of the out-of-block node, and subsequent related nodes may verify the validity of the superblock based on the node signature of the out-of-block node.
Typically, the data in the blocks of an existing blockchain is consistent, e.g., in an existing blockchain, both block chain node a1 and block link point a2 hold the same block book, which includes block S with a block height of 100, wherein, the block S with block height 100 at block link point a1 and the block S with block height 100 at block link point a2 are the same, i.e. the data of both blocks are identical, however, because superblocks of the block distributed block chain are stored in different remote nodes in a scattered manner, the remote nodes do not store all blocks on the block chain as in the existing block chain, the block structure cannot effectively reflect the relationship between the current block and a local node or a father node in the block distributed block chain, and the superblocks are easily attacked by subsequent blocks or malicious nodes which cannot be verified with high efficiency.
Thus, in some embodiments, the superblock block further includes a data variable region, the data of the data variable region may not be consistent in each superblock at the same block height, and the data of the data variable region may be variable before superblock linking and may not be variable after superblock linking, for example, superblock B1 is written to distant node C1, which includes data variable region D1. Superblock B2 writes to distant node C2, which includes data variable region D2.
Superblock B3 writes to distant node C3, which includes data variable region D3. The block heights of superblocks B1, B2 and B3 are all 150, the data in data variable region D1 is consistent with the data in data variable region D2, and the data in data variable region D1 is inconsistent with the data in data variable region D3.
Data in data variable region D1 may be modified, updated or deleted before superblock B1 is written to remote node C1, i.e., superblock B1 is linked to the block-distributed blockchain, and after being written to remote node C1, i.e., superblock B1 is linked to the block-distributed blockchain, at which time the data in data variable region D1 is immutable, e.g., superblock B1 is configured to enter a read-only mode. For superblocks B2 and B3, the data change of the data variable region can be deduced according to the reasoning described above, and will not be described herein.
Therefore, the super block is additionally provided with the data variable area, so that the forming relationship of the super block in the block distributed block chain can be more flexibly and comprehensively described, and the use efficiency, the operation efficiency and the safety of the block distributed block chain are improved.
It will be appreciated that the content representation of the data variable regions in each superblock can be logically derived and self-determined by those skilled in the art in light of the disclosure herein.
In some embodiments, the data variable region includes local feature data associated with the local node, the local feature data being used to represent features of the local superblock and/or the local node, wherein the local node may be not only a local long-haul node, but also any role node that maintains the superblock, for example, in a normal node-maintaining superblock, the data variable region includes the local feature data.
In some embodiments, please refer to table 3:
TABLE 3
In table 3, the chunk hash is a hash of the service data, a hash of the parent node list, or a hash calculated by the service data and the parent node list together.
As shown in table 3, the local feature data includes a local node field for indicating local node information for storing the superblock and/or a local block source field for indicating source node information for the superblock.
For example, superblock E1 is stored in regular node F1, and its local node field is used to indicate node information of regular node F1. Superblock E2 is stored at distant node F2, then its local node field is used to represent node information for distant node F2.
Assuming that the regular node F1 synchronizes superblock E2 from the distant node F2, resulting in a local superblock E1, since superblock E1 is sourced from superblock E2, the distant node F2 is the source node of the regular node F1, and thus, the local block source field is used to indicate the node information of the distant node F2.
Further assuming that the superblock E3 is stored in the regular node F3, wherein the regular node F3 synchronizes the superblock E1 from the regular node F1, thereby obtaining the local superblock E3, since the superblock E3 is originated from the superblock E1, the regular node F1 is a source node of the regular node F3, and thus, the local block source field is used to indicate node information of the regular node F1. It will be appreciated that when the local node is a tele-node, the local block source field is an empty field.
Therefore, by adopting the method, when the number of synchronization times of a certain super block is more, each super block can also form a certain degree of interlocking relation based on the local characteristic data, if the data of the local super block is maliciously modified by a certain block chain node, the next block chain node of the super block is synchronized, except for the verification according to the method provided above, the super block can also be verified through the local characteristic data, if the super block is verified to be illegal, the related block chain node having inheritance relation with the super block can be easily locked through the local characteristic data, the investigation is carried out from the related block chain node, and the investigation result is broadcasted in the block chain network, so that the corresponding block chain node can execute corresponding safe operation, and the block distributed block chain can be effectively and safely maintained and operated.
In some embodiments, the local node field comprises a local node hash and/or a local block priority and/or a local node public key and/or a local signature field of the local node.
The local node hash includes a hash of the device information and/or the node address of the local node.
The local block priority is used to indicate the priority of each super block with the same block height stored by the corresponding node, wherein the local block priorities of different super blocks with the same block height at different nodes may be the same or different.
For example, the super block G1 is stored in the far-reaching node H1, the super block G2 is stored in the normal node H2, the super block G3 is stored in the normal node H3, and the super block G4 is stored in the normal node H4, wherein the super block G2 and the super block G3 are obtained by synchronizing the super block G3 of the far-reaching node H3 with the normal node H3 respectively, and the super block G3 is obtained by synchronizing the super block G3 of the normal node H3 with the normal node H3, so that, although the block heights of the super block G3, the super block G3 and the super block G3 are the same, the local block priority of the super block G3 is higher than that of the super block G3 and the super block G3, the local block priority of the super block G3 is lower than that of the super block G3, and the super block G3 needs synchronization with the super block H3, the super-block G1 of the tele-node H1 may be synchronized preferentially.
The local node public key is used for assisting in verifying the validity of a related service participated by the local node, wherein the node public key of the local node can be broadcasted in the block chain network, and the node public key of the local node can be obtained by the related block chain node.
The local signature field is the signature of the local node on the data in the data variable area except the local signature field, and other subsequent block chain nodes can verify whether the data in the data variable area is tampered or not through the local signature field, so that the method is favorable for efficiently and safely checking the data in the data variable area on the premise that the data variable area is added to the super block.
In some embodiments, the local superblock origin field includes an inheritance field for indicating node information of an inheritance node corresponding to the superblock to be inherited and/or a root origin field for indicating node information of a root origin node corresponding to the local superblock, the root origin node being the node that retroactively stores the local superblock earliest.
For example, as described above, for superblock G2 or G3, superblock G1 is the superblock that is inherited, and thus, long haul node H1 is the successor of normal node H2 and normal node H3. Similarly, for superblock G4, superblock G3 is the inherited superblock, so ordinary node H3 is the inherited node of ordinary node H4, and therefore, in superblock G4 of ordinary node H4, the node information written in the inherited field is the node information of ordinary node H3.
For another example, assume that the regular node H5 synchronizes superblock G1 of the distant node H1 to obtain superblock G5. The ordinary node H6 synchronizes the super block G4 of the ordinary node H4 to obtain a super block G6, the ordinary node H7 synchronizes the super block G6 of the ordinary node H6 to obtain a super block G7, and the ordinary node H8 synchronizes the super block G7 of the ordinary node H7 to obtain a super block G8. For the normal node H8, the superblock G8 is a local superblock, the synchronization path of the superblock G8 is G8-G7-G6-G4-G3-G1, and the superblock G1 is stored in the distant node H1, so that the node that stores the superblock G8 retrospectively is the distant node H1, that is, the distant node H1 is the root node, and therefore, in the superblock G8 of the normal node H8, the node information written in the root field is the node information of the distant node H1.
Assuming that the normal node H4 storing the superblock G4 disappears in the blockchain network, for example, the normal node H4 is crashed off-line by malicious attack or lost by physical destruction, and therefore, the superblock G4 also disappears following the disappearance of the normal node H4, and as for the superblock G8, when the normal node H8 traces back to the superblock G6 of the normal node H6, the origin of the superblock G8 cannot be traced back, and therefore, the normal node H8 can trace back that the node storing the superblock G8 earliest is the normal node H6, that is, the normal node H6 is the root node, and therefore, in the superblock G8 of the normal node H8, the node information written in the root field is the node information of the normal node H6.
Therefore, by adding the inheritance field and/or the root field, the synchronization path of the corresponding superblock can be simply, reliably, comprehensively and safely restored under the block distributed storage form, and the block distributed block chain can be more effectively and safely maintained.
In some embodiments, the node information of the inheritance node comprises the inheritance node hash and/or the inheritance node priority and/or the inheritance node public key and/or the local signature field of the inheritance node, and the local signature field of the inheritance node is a signature of the local node on data in the data variable region except the local signature field of the inheritance node. And/or the node information of the root node comprises the hash of the root node and/or the priority of the root node and/or the public key of the root node and/or the local signature field of the root node, and the local signature field of the root node is the signature of the local node on the data except the local signature field of the root node in the data variable region.
S22, responding to a call instruction sent by the target node according to the central/peripheral communication mode;
in a block distributed blockchain, the far-reaching node as a tip uses an autonomous flight mode. In the autonomous flight mode, the command of the central hub to the tip does not comprise the control of the flight behavior, namely, from the beginning of the transmission, the flight of the long-range node is not controlled by the base, but the flight of the long-range node is autonomously controlled by the program.
In this embodiment, a common node and a block-out node deployed on the earth are a Hub, a long-range node is a tip, and in a Hub/tip communication mode (Hub/End communication mode), the Hub is an active side and the tip is a passive side. Under normal conditions, the tips do not communicate with each other and do not actively send information. The central hub sends an instruction to the peripheral, the peripheral executes the instruction and returns or does not return information, and the returned information is the receipt or confirmation of the execution of the instruction.
In this embodiment, the target node is any node in the blockchain network, such as a normal node or a block-out node.
In this embodiment, the call command may be a command for any service logic operation, such as transmitting superblock data or other auxiliary data.
In this embodiment, when the target node sends the call instruction to the distant node, the target node and the distant node do not require connection guarantee according to the space-based communication protocol.
And S23, executing the call instruction.
In general, on the one hand, when communication is performed in an unapproachable area such as space, the hub/tip communication mode is more suitable for such a scenario, which can relatively guarantee communication efficiency, quality and reliability. On the other hand, each remote navigation node is deployed in the non-attack area, so that the super block of each remote navigation node is prevented from being destroyed or tampered because the super block is physically easy to obtain, and the safety of data storage is improved. On the other hand, since the super blocks can be stored in a distributed manner and the super blocks with different block heights can form the block distributed block chain, the block distributed block chain provided by the embodiment can be ensured to have the characteristics of decentralization, transparency and non-falsification on the premise of improving the flexibility of the storage blocks. On the other hand, even along with the increase of the service time of the blockchain, the embodiment can balance and coordinate the storage capacity of the accounting node, and avoid the situation that the accounting node is broken down or exits accounting due to the fact that the accounting node stores too many blockdata.
In some embodiments, the non-attack area includes space, and the present embodiment may transmit each long-range node to space by controlling the deployment of each long-range node to the non-attack area, so that each long-range node continuously moves away from the transmission place.
For example, when the distant navigation node is deployed in space, in order to adapt to the change of the scene, the embodiment of the present invention provides another structural diagram of a block distributed block chain, as shown in fig. 4a, taking the earth as an example, the block distributed block chain 400 includes a ground node 41, a docking station node 42 and a distant navigation node 43, and the concepts of "day" and "ground" referred to herein are relative to the earth, but do not prevent the extension to other celestial bodies in other occasions.
The ground node 41 is a node deployed on the earth and is responsible for tracking of the business's organization uplink, station-parking node 42 and long-range node 43, data inspection of the space-based data, and operation management of the blockchain. The ground-based node 41 is divided into a ground-based operation node and a ground-to-earth synchronization node. The ground-based operation node is responsible for the operation of the ground-based data organization system, and the geosynchronous node is responsible for the communication and operation with the docking station node 42 and the long-range node 43. Communication between the ground nodes 41 is performed through a ground network, and the communication mode includes P2P network communication.
It will be appreciated that the role of the ground based node 41 may include out-of-block and/or ordinary nodes that are compatible with the role functionality of the out-of-block and/or ordinary nodes.
With the earth as the center, a celestial body with proper space safety is designated as a posthouse (station), and a space-based node moves to the vicinity of the posthouse to be stopped and become a satellite or land, and the node is a docking node 42. The station node 42 is responsible for the construction of a replica of an off-site base and provides a relay for the long-range node 43.
The node which takes the earth as the center and continuously performs centrifugal motion outwards is a long-range node 43, and the track of the long-range node 43 can be determined according to the carried task. The long-range node 43 continuously navigates and continuously moves away from the earth, and is not bound near any celestial body. The possibility that the long-range nodes 43 are completely destroyed or intensively tampered is extremely low due to dispersion and no capture by any celestial body, and the optimal data viability is guaranteed.
Referring to fig. 4b, fig. 4b shows a solar system, the solar system 40 includes various celestial bodies centered on the sun 44, wherein the distant node 43 takes the earth 45 as a transmitting ground, and after the transmission, the distant node 43 starts to move away from the earth 45 continuously, and finally the distant node 43 can escape the solar system, so that the distant node 43 carries a super block to escape the solar system 40, and the super block is difficult to capture, thereby physically isolating the possibility of tampering.
When the distant nodes 43 fly off the earth into space, a reference coordinate system is needed to describe and calculate the relationship between the distant nodes 43, and the reference coordinate system can be an earth equatorial plane, a solar ecliptic plane (an orbital plane of the earth revolving around the sun), a silver disc plane, a lunar super-star system plane or a laniake super-star system plane.
In some embodiments, the plane of the silver disk in the galaxy system is used as the reference coordinate system, referring to fig. 4c, the plane of the silver disk is a plane including the radial X-axis of the silver disk, and the normal direction of the plane of the silver disk is the Y-axis. When each far-range node is launched to the space, the present embodiment can control each far-range node to move towards the interstellar material sparse area, wherein the interstellar material sparse area is an outer space area pointed by the normal direction of the silver disc plane. In general, the galaxy is relatively concentrated in the interplanetary region of the two arms.
In this embodiment, the interstellar material sparse area is an area where interstellar materials are relatively rare, and the long-range node is sent towards the interstellar material sparse area, so that the interaction or collision between the long-range node and space materials such as stars and cosmic dust can be avoided, and the survival time of the long-range node in space is prolonged.
In some embodiments, when each of the tele-navigation nodes is controlled to move towards the interstellar material sparse area, the embodiment may control each of the tele-navigation nodes to move towards the interstellar material sparse area according to a dispersion layout rule, so that the movement directions of each of the tele-navigation nodes are different from each other, and therefore, the method may reduce the probability of collision among the tele-navigation nodes, and improve the survival time of the tele-navigation nodes.
In some embodiments, the interstellar material sparse regions include a positive interstellar material sparse region with the silver disk positively directed and a negative interstellar material sparse region with the silver disk negatively directed, the silver disk positive normal being the silver river spiral arm right hand spiral thumb direction. With continued reference to FIG. 4c, the silver disk positive direction Y + points to the positive interplanetary material sparse region and the silver disk negative direction Y-points to the negative interplanetary material sparse region.
In some embodiments, when each of the tele-navigation nodes is controlled to move towards the interstellar material sparse region according to the distributed layout rule, in this embodiment, one of every two tele-navigation nodes adjacent to each other in the emission time may be classified into a first emission group, the other tele-navigation node may be classified into a second emission group, the emission direction of the first emission group is the positive interstellar material sparse region, the emission direction of the second emission group is the negative interstellar material sparse region, and according to the distributed layout rule, the tele-navigation nodes in each emission group are controlled to move towards the corresponding interstellar material sparse regions according to the emission time, so that the movement directions of the tele-navigation nodes on the same side are different.
For example, the far-ranging node Z1 is adjacent to the transmission time of the far-ranging node Z2, the far-ranging node Z3 is adjacent to the transmission time of the far-ranging node Z4, the far-ranging node Z5 is adjacent to the transmission time of the far-ranging node Z6, and the far-ranging node Z7 is adjacent to the transmission time of the far-ranging node Z8, so that the embodiment can classify the far-ranging node Z1, the far-ranging node Z3, the far-ranging node Z5, and the far-ranging node Z7 into a first transmission group, and classify the far-ranging node Z2, the far-ranging node Z4, the far-ranging node Z6, and the far-ranging node Z8 into a second transmission group. Subsequently, when the long-range nodes are transmitted, the embodiment sequentially controls the long-range node Z1, the long-range node Z3, the long-range node Z5 and the long-range node Z7 to move towards the forward interstellar substance sparse area according to the transmission time of each long-range node, and also controls the moving directions of the long-range node Z1, the long-range node Z3, the long-range node Z5 and the long-range node Z7 in the forward interstellar substance sparse area to be different.
Similarly, in the embodiment, according to the emission time of each long-range node, the long-range node Z2, the long-range node Z4, the long-range node Z6 and the long-range node Z8 are sequentially controlled to move towards the negative interstellar material sparse area, and the moving directions of the long-range node Z2, the long-range node Z4, the long-range node Z6 and the long-range node Z8 in the negative interstellar material sparse area are also controlled to be different.
Therefore, the method can reduce the collision probability among the remote nodes on the premise of increasing the transmitting number of the remote nodes.
In some embodiments, each of the sparse regions of interplanetary material includes a dispersion layout region, which is a sector region formed by radially deflecting the silver disk at the position of the sun by a preset angle from the normal direction of the silver disk to a designated silver disk, wherein the designated silver disk is customized by a user in a radial direction, for example, the designated silver disk is in a radial direction away from the center of the galaxy system.
Referring to fig. 4d, in the forward sparse area of interstellar material, the normal 4d2 of the silver disc where the sun 4d1 is located is deflected 15 degrees toward the designated radial 4d3 of the silver disc to form a sector area 4d 4. Similarly, in a negative interplanetary sparsity region, it may also form a sector.
In some embodiments, the present embodiment controls the long-range nodes in each emission group to move into the distributed layout area after leaving the solar system according to the distributed layout rule, so that the movement direction of each long-range node is different.
For example, as described above, the embodiment can control the long range node Z1, the long range node Z3, the long range node Z5, and the long range node Z7 in the first transmitting set to move into the distributed layout area after sequentially leaving the solar system, and the moving direction of each long range node in the distributed layout area is different.
In some embodiments, according to the scattering layout rule, when the long-range nodes in each emission group move into the scattering layout area after leaving the solar system, the movement direction of each long-range node on the same side entering the scattering layout area after leaving the solar system can be determined according to the emission sequence, and the included angle between the movement direction and the normal direction of the silver disc meets the bisection series condition. And then controlling each long-range node to be transmitted into the scattered layout area according to the movement direction.
In some embodiments, the emission sequence is {1,2,3 … … M }, i ∈ M, i and M are positive integers, and referring to fig. 4e, determining, according to the emission sequence, a moving direction of each of the navigable nodes on the same side entering the decentralized layout area after leaving the solar system includes:
s401, assigning i = 1;
s402, judging whether i is larger than M, if so, executing S403, and if not, executing S404;
s403, stopping operation;
s404, judging whether i is equal to 1, if so, executing S405, and if not, executing S406;
s405, taking the sun as an angular point, making a first straight line parallel to the normal direction of the silver disc through the angular point, controlling a first long-range node to leave the solar system, entering a scattered layout area towards the direction of the first straight line, assigning a value of i = i +1, and returning to S402;
s406, judging whether i is equal to 2, if so, executing S407, and if not, executing S408;
s407, making a second straight line intersecting the silver disc at a preset angle in the normal direction by passing through the corner point, controlling a second long-range node to leave the solar system, entering a scattered layout area towards the direction of the second straight line, optionally selecting one point in the first straight line as a first end point, making the first end point as a straight line parallel to the radial direction of the silver disc to intersect with the second straight line, making the intersection point be a second end point, and assigning a value of i = i +1 to the second end point, and returning to S402;
s408, judging whether the longest sub-line segment is equal to the shortest sub-line segment in the vector line segments, if so, executing S49, and if not, executing S410;
s409, selecting a bisection midpoint in the sub-line segment closest to the first end point, controlling the ith long-range node to leave the solar system, then entering a scattered layout region towards the direction of an ith straight line formed by the bisection midpoint and the angular point, assigning a value of i = i +1, and returning to S402;
s410, selecting a bisection midpoint in the longest sub-line segment closest to the first end point, controlling the ith long-range node to leave the solar system, then entering a scattered layout area towards the direction of an ith straight line formed by the bisection midpoint and the angular point, assigning a value of i = i +1, and returning to S402.
In this embodiment, the bisecting midpoint is used to bisect each sub-line segment in half.
In the present embodiment, for example, referring to fig. 4f, it is assumed that the transmission sequence of the first transmission set is {1,2,3 … … 8}, i.e., M = 8.
When the first long-range node is launched, because i =1 and i is less than M, the sun is taken as an angular point R0, a first straight line L1 parallel to the normal direction of the silver disc is made through an angular point R0, and the first long-range node is controlled to leave the solar system and then enter the scattered layout area towards the direction of the first straight line L1.
When the second long-range node is launched, because i =2 and i is less than M, the passing corner point R0 makes a second straight line L2 which intersects the normal direction of the silver disc by 15 degrees, after the second long-range node leaves the solar system, the second long-range node is controlled to enter a scattered layout area towards the direction of a second straight line L2, any point in the first straight line L1 is used as a first end point R1, a first end point R1 makes a straight line which is parallel to the radial direction of the silver disc and intersects the second straight line L2, the intersection point is made to be a second end point R2, the first end point R1 to the second end point R2 are vector line segments R1R2, and the value is 3=2+ 1.
When the third long-range node is launched, since i =3 and i < M, it is determined whether the longest sub-line segment and the shortest sub-line segment are equal in the vector line segment, and since the longest sub-line segment and the shortest sub-line segment are both the vector line segment R1R2, that is, the longest sub-line segment and the shortest sub-line segment are equal, a bisection midpoint R3 is selected from the sub-line segments closest to the first endpoint R1 (that is, the vector line segment R1R 2), and after the third long-range node is controlled to leave the solar system, the third long-range node enters a distributed layout region in the direction of a third straight line L3 formed by the bisection midpoint R3 and the corner R0, and is assigned with a.
When the fourth far-driving node is transmitted, i =4, i is less than M, whether the longest sub-line segment is equal to the shortest sub-line segment is judged in the vector line segment, and since the longest sub-line segment is equal to the shortest sub-line segment, a bisection midpoint R4 is selected from the sub-line segments (namely line segments R1R 3) closest to the first end point R1, and after the fourth far-driving node is controlled to leave the solar system, the fourth far-driving node enters a scattered layout region towards a fourth straight line L4 formed by the bisection midpoint R4 and the corner R0 and is assigned with a value of 5=4+ 1.
When the fifth long-range node is launched, since i =5 and i < M, it is determined whether the longest sub-line segment is equal to the shortest sub-line segment in the vector line segments, and since the longest sub-line segment (i.e., the line segment R2R 3) is not equal to the shortest sub-line segment, i.e., the line segment R1R4 or R3R3, the bisecting midpoint R5 is selected from the longest sub-line segment (i.e., the line segment R2R 3) closest to the first end R1, and after the fifth long-range node is controlled to leave the solar system, the fifth long-range node enters a distributed layout region in the direction of a fifth straight line L5 formed by the bisecting midpoint R5 and the corner R0, and is assigned 6=5+ 1. And by analogy, gradually transmitting 8 long-range nodes to the scattered layout area. Therefore, by adopting the method, the probability of collision between the distant nodes can be reduced, and the survival time of the distant nodes can be prolonged.
Finally, as to what technical means are adopted to transmit the long-range node to the outer space and what technical means are adopted to control the motion direction of the long-range node in the outer space, the applicant thinks that:
on 5.9.1977, NASA (national aerospace agency) launched traveler number 1 (equivalent to a distant node). On day 25/8/2012, traveler # 1 strays out of the solar system into interstellar space, indicating that the person has the ability to walk out of the solar system. In 2017, 12 and 2, the traveler successfully ignites the number 1 again, which shows that the human has the ability to communicate and command across the interstellar space. In 2020, NASA new generation Mars probe vehicle ' resolute ' number takes on ' Optimus prime ' number carrier rocket ' number to lift off, marking human entering into the Mars registration era.
In CLEP (Chinese lunar exploration project), Chang' e No. 1 was completed at 11 and 7 months in 2007. In 2013, the moon in 12 and 14 days is successfully descended to the moon in No. 3 and the rabbit moon rover is released. And 6, 2018, 5, month and 21, respectively, and the method comprises the following steps of (1) enabling a stretchpad bridge relay satellite to enter an orbit (a relay node around a ground mooring station). In 2018, the success of the high-latitude moon-falling south pole moon with the number of Chang-E4 in 12 and 8 months indicates that the human enters the era of omnibearing docking of moon (moon-based docking station node).
Thus, the applicant believes that: the above related art progress shows that human science and technology is sufficient to support the solution provided by the embodiment of the present invention at present or in the near future, and the core idea of the present invention is that: the distributed block chain of blocks is used for storing data dispersedly, and a carrier for protecting the data is deployed in the non-attack area, and how to adopt any technical means to control the movement of the long-range node is not the focus of the text.
In some embodiments, referring to fig. 4g, the method S200 for node communication based on block distributed blockchains further includes:
s24, when detecting that the long-range node reaches the preset position of the non-attack area, generating a key pair, wherein the key pair comprises a private key and a public key;
and S25, controlling the long-distance node to send the public key to the target node.
In this embodiment, because the private key and the public key of the long-range node are easily maliciously attacked or physically easily captured when being generated in the earth and other places of emission, the key pair is generated by controlling the long-range node to reach the preset position of the non-attacking area, the difficulty of the leaked key pair of the long-range node is increased in the physical distance, so that the information safety in the later period is ensured, and the situation that the information is maliciously intercepted because the key pair is leaked is avoided.
In some embodiments, the predetermined location of the non-aggressable region is a hollow sphere region with a 3-minute optical path to 1-hour optical path from the launch site, for example, referring to fig. 5a, the long-range node 51 launches from the earth 52, and after the long-range node 51 crosses the mars orbit of the mars 53, the long-range node 51 generates a key pair and returns the public key of the key pair to the target node 54.
In some embodiments, the call command includes an encrypted name and encrypted data, and referring to fig. 5b, S23 includes:
s231, decrypting the encrypted name by using the public key;
s232, judging whether the decrypted encrypted name is the name of the node;
s233, if yes, encrypting data is executed;
and S234, if not, discarding the calling instruction.
In this embodiment, the ground node uses a name calling method, does not address through IP, directly calls a node name, encrypts the node name i by using the node public key p to obtain an encrypted name K, and sends the encrypted name to the long-range node. And the remote navigation node receives the information and decrypts the encrypted name K by using the public key p, if the decrypted encrypted name i is the name of the node, namely the foundation node calls the remote navigation node, the remote navigation node executes encrypted data, and if not, the calling instruction is discarded. By adopting the method, the long-range node can be reliably called, and the communication quality and efficiency can be ensured on the premise of the ultra-long physical distance.
In some embodiments, the encrypted data includes an encryption key and an encrypted text, please refer to fig. 5c, S233 includes:
s2331, decrypting the encrypted key by using the public key to obtain a symmetric key;
s2332, decrypting the encrypted text by using the symmetric key to obtain original data;
and S2333, executing the original data.
In this embodiment, when the ground node sends a call instruction, a one-time-use symmetric key a is first generated according to a symmetric encryption algorithm, then a public key p is encrypted by using the symmetric key a to obtain an encryption key a, and the original data is encrypted by using the symmetric key a to obtain an encrypted text D. When the long-range node decrypts the encryption key, the public key p is used for decrypting the encryption key to obtain a symmetric key a, the symmetric key a is used for decrypting the encrypted text D to obtain original data, and finally the long-range node can execute the original data, wherein the original data comprises instructions, instruction parameters, sensitive data and the like. After the original data is executed, if the result needs to be returned, the long-range node signs the content of the result by using a private key, encrypts the content by using a symmetric key a and sends the encrypted content back to the ground node. And after receiving the message, the ground node decrypts the message by using the symmetric key a, knows the execution condition, verifies the signature, confirms that the message is sent by the correct long-range node, and completes the operation. By adopting the method, the symmetric encryption algorithm and the asymmetric encryption algorithm are combined, on one hand, the processing efficiency of the encrypted data can be ensured, and on the other hand, the security and the reliability of encryption can be ensured.
It will be appreciated that the symmetric encryption algorithm comprises any suitable symmetric encryption algorithm, such as a quantum key distribution algorithm.
Referring to table 4, according to the Call-Name Protocol (Call-Name Protocol), the data structure of the Call instruction is as follows:
TABLE 4
As shown in table 4, the call instruction further includes a timestamp and an information survival time, before performing S233, referring to fig. 5d, S23 includes:
s235, determining the current time of receiving the call instruction;
s236, calculating the current information duration according to the current time and the timestamp;
s237, judging whether the current information duration is less than or equal to the information survival duration, if so, entering S233, otherwise, executing S238;
s238, if not, discarding the call instruction.
Therefore, by adopting the method, the reliable and orderly communication between the long-range node and the foundation node can be ensured.
Referring to fig. 6, fig. 6 is a schematic circuit diagram of an electronic device according to an embodiment of the present invention. As shown in fig. 6, the electronic device 600 includes one or more processors 61 and a memory 62. In fig. 6, one processor 61 is taken as an example.
The processor 61 and the memory 62 may be connected by a bus or other means, such as the bus connection in fig. 6.
The memory 62 is used as a non-volatile computer readable storage medium for storing non-volatile software programs, non-volatile computer executable programs, and modules, such as program instructions/modules corresponding to the node communication method of the block distributed blockchain in the embodiment of the present invention. The processor 61 implements the node communication method based on the block distributed blockchain provided by the above method embodiment and the functions of each module or unit of the above apparatus embodiment by running the nonvolatile software program, instructions and modules stored in the memory 62.
The memory 62 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 62 may optionally include memory located remotely from the processor 61, and these remote memories may be connected to the processor 61 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The program instructions/modules are stored in the memory 62 and when executed by the one or more processors 61, perform the method for node communication based on the blockchain distributed block according to any of the above-described method embodiments.
Embodiments of the present invention further provide a storage medium storing computer-executable instructions, which are executed by one or more processors, for example, one processor 61 in fig. 6, so that the one or more processors can execute the node communication method based on the block distributed block chain in any method embodiment.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program stored on a storage medium, and the computer program includes program instructions, where the program instructions, when executed by an electronic device, cause the electronic device to execute any one of the node communication methods based on the block distributed blockchain.
The above-described embodiments of the apparatus or device are merely illustrative, wherein the unit modules described as separate parts may or may not be physically separate, and the parts displayed as module units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network module units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; within the idea of the invention, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. A node communication method based on a block distributed block chain is characterized by comprising the following steps:
controlling a remote node to be deployed in an un-attacked area, wherein the remote node carries a specified number of super blocks, and the super blocks with different block heights can form a block distributed block chain;
responding to a calling instruction sent by a target node according to a central/peripheral communication mode;
and executing the calling instruction.
2. The method of claim 1, wherein the non-aggressable region comprises space, and wherein the controlling the deployment of the tele-scopic node in the non-aggressable region comprises: and transmitting each long-range node to the space, so that each long-range node continuously moves away from the transmitting place.
3. The method of claim 1, further comprising:
when detecting that the long-range node reaches a preset position of the non-attack area, generating a key pair, wherein the key pair comprises a private key and a public key;
and controlling the long-range node to send the public key to the target node.
4. The method of claim 3, wherein the predetermined location of the non-offensive area is a hollow sphere region having a 3 minute optical path to a1 hour optical path from the launch site.
5. The method of claim 3, wherein the call instruction comprises an encrypted name and encrypted data, and wherein executing the call instruction comprises:
decrypting the encrypted name using the public key;
judging whether the decrypted encrypted name is the name of the node;
if yes, executing the encrypted data;
if not, the calling instruction is discarded.
6. The method of claim 5, wherein the encrypted data comprises an encryption key and an encrypted text, and wherein performing the encrypted data comprises:
decrypting the encrypted key by using the public key to obtain a symmetric key;
decrypting the encrypted text by using the symmetric key to obtain original data;
executing the raw data.
7. The method of claim 5, wherein the call instruction further comprises a timestamp and a message time-to-live, and wherein executing the call instruction further comprises, prior to executing the encrypted data:
determining a current time at which the call instruction is received;
calculating the current information duration according to the current time and the timestamp;
judging whether the current information duration is less than or equal to the information survival duration;
if yes, entering a step of executing the encrypted data;
if not, the calling instruction is discarded.
8. The method according to any one of claims 1 to 7, wherein each of said remote nodes, after storing a specified number of super blocks, is configured in a closed mode in which reception of other blocks is disabled, said super blocks being in a read-only mode.
9. A storage medium storing computer-executable instructions for causing an electronic device to perform the method for node communication based on a block distributed blockchain according to any one of claims 1 to 8.
10. An electronic device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of node communication based on a block distributed blockchain according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110370376.1A CN112769963B (en) | 2021-04-07 | 2021-04-07 | Node communication method based on block distributed block chain and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110370376.1A CN112769963B (en) | 2021-04-07 | 2021-04-07 | Node communication method based on block distributed block chain and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112769963A true CN112769963A (en) | 2021-05-07 |
CN112769963B CN112769963B (en) | 2021-07-09 |
Family
ID=75691394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110370376.1A Active CN112769963B (en) | 2021-04-07 | 2021-04-07 | Node communication method based on block distributed block chain and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112769963B (en) |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169144A (en) * | 2017-06-17 | 2017-09-15 | 南京中蓝数智信息技术有限公司 | Block chain distribution account book storage method and server |
CN108243258A (en) * | 2018-02-06 | 2018-07-03 | 江涛 | A kind of block chain data synchronous system based on satellite transmission |
CN108366137A (en) * | 2018-05-28 | 2018-08-03 | 北京奇虎科技有限公司 | The method and root DNS that domain name is handled based on block chain |
CN108734029A (en) * | 2018-05-23 | 2018-11-02 | 陈萍 | A kind of approaches to IM and platform based on block chain and interspace file system |
CN109087409A (en) * | 2018-07-13 | 2018-12-25 | 网云区块链(深圳)有限公司 | A kind of data processing, information acquisition method, electronic equipment and storage medium |
CN109245993A (en) * | 2018-09-07 | 2019-01-18 | 中链科技有限公司 | Instant communication method and device based on block chain |
KR101918446B1 (en) * | 2018-03-16 | 2019-01-29 | 윤경민 | Double-secured Block-chain Certification System and its method |
CN109728896A (en) * | 2018-12-26 | 2019-05-07 | 广州云趣信息科技有限公司 | A kind of incoming call certification and source tracing method and process based on block chain |
CN110612676A (en) * | 2017-05-01 | 2019-12-24 | Wfs科技有限公司 | Communication network |
CN110855676A (en) * | 2019-11-15 | 2020-02-28 | 腾讯科技(深圳)有限公司 | Network attack processing method and device and storage medium |
WO2020055087A1 (en) * | 2018-09-14 | 2020-03-19 | 주식회사 비지트 | Parallel blockchain-based information management and operation system |
CN111629902A (en) * | 2017-12-20 | 2020-09-04 | 莫戈公司 | Outer space digital logistics system |
CN112084522A (en) * | 2020-09-28 | 2020-12-15 | 深圳市腾盟技术有限公司 | Data storage method, device, equipment and storage medium |
CN112118124A (en) * | 2020-08-03 | 2020-12-22 | 西安电子科技大学 | Block chain construction method, system, storage medium, computer equipment and application |
-
2021
- 2021-04-07 CN CN202110370376.1A patent/CN112769963B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110612676A (en) * | 2017-05-01 | 2019-12-24 | Wfs科技有限公司 | Communication network |
CN107169144A (en) * | 2017-06-17 | 2017-09-15 | 南京中蓝数智信息技术有限公司 | Block chain distribution account book storage method and server |
CN111629902A (en) * | 2017-12-20 | 2020-09-04 | 莫戈公司 | Outer space digital logistics system |
CN108243258A (en) * | 2018-02-06 | 2018-07-03 | 江涛 | A kind of block chain data synchronous system based on satellite transmission |
KR101918446B1 (en) * | 2018-03-16 | 2019-01-29 | 윤경민 | Double-secured Block-chain Certification System and its method |
CN108734029A (en) * | 2018-05-23 | 2018-11-02 | 陈萍 | A kind of approaches to IM and platform based on block chain and interspace file system |
CN108366137A (en) * | 2018-05-28 | 2018-08-03 | 北京奇虎科技有限公司 | The method and root DNS that domain name is handled based on block chain |
CN109087409A (en) * | 2018-07-13 | 2018-12-25 | 网云区块链(深圳)有限公司 | A kind of data processing, information acquisition method, electronic equipment and storage medium |
CN109245993A (en) * | 2018-09-07 | 2019-01-18 | 中链科技有限公司 | Instant communication method and device based on block chain |
WO2020055087A1 (en) * | 2018-09-14 | 2020-03-19 | 주식회사 비지트 | Parallel blockchain-based information management and operation system |
CN109728896A (en) * | 2018-12-26 | 2019-05-07 | 广州云趣信息科技有限公司 | A kind of incoming call certification and source tracing method and process based on block chain |
CN110855676A (en) * | 2019-11-15 | 2020-02-28 | 腾讯科技(深圳)有限公司 | Network attack processing method and device and storage medium |
CN112118124A (en) * | 2020-08-03 | 2020-12-22 | 西安电子科技大学 | Block chain construction method, system, storage medium, computer equipment and application |
CN112084522A (en) * | 2020-09-28 | 2020-12-15 | 深圳市腾盟技术有限公司 | Data storage method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112769963B (en) | 2021-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuzmin et al. | Blockchain-base structures for a secure and operate network of semi-autonomous unmanned aerial vehicles | |
US10547454B2 (en) | Managing in-flight transfer of parcels using blockchain authentication | |
EP3438903B1 (en) | Hierarchical network system, and node and program used in same | |
KR102026580B1 (en) | A control system for unmanned moving vechicle using blockchain and a control method thereof | |
US9600553B1 (en) | Distributed replication in cluster environments | |
Falco | When satellites attack: Satellite-to-satellite cyber attack, defense and resilience | |
CN106464343A (en) | Satellite constellation | |
KR102039852B1 (en) | A communication control system for unmanned moving vechicle using blockchain and a communication method thereof | |
JP2022507706A (en) | Satellite operation service management system, satellite operation service management device and satellite operation service management method | |
Kumar et al. | Blockchain for securing aerial communications: Potentials, solutions, and research directions | |
Bradbury et al. | Identifying attack surfaces in the evolving space industry using reference architectures | |
JP7523609B2 (en) | Space traffic management system, space traffic management device, satellite business device, and space information recorder | |
Lele et al. | Analysing China's Digital And Space Belt And Road Initiative | |
CN112769963B (en) | Node communication method based on block distributed block chain and electronic equipment | |
Ibrahim et al. | Literature review of blockchain technology in space industry: Challenges and applications | |
CN104426975A (en) | Method, equipment and system for data synchronization | |
CN114281887B (en) | Data storage method based on block distributed block chain and electronic equipment | |
Mital et al. | Blockchain application within a multi-sensor satellite architecture | |
KR102493780B1 (en) | System and method for monitoring the ground using hybrid unmanned airship | |
Hyland-Wood et al. | Blockchain properties for near-planetary, interplanetary, and metaplanetary space domains | |
CN112765683B (en) | Block data structure of block chain, storage medium and electronic equipment | |
CN112765682B (en) | Block data structure of block distributed block chain, storage medium and electronic equipment | |
CN109032585A (en) | The artificial intelligence Writing method of digital satellite optics load imaging source program | |
KR102169840B1 (en) | Method for ensuring the trust of selling probability based items | |
Graczyk et al. | Sanctuary lost: a cyber-physical warfare in space |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |