CN115632788A - Dynamic access method and device for nodes in alliance chain and electronic equipment - Google Patents

Dynamic access method and device for nodes in alliance chain and electronic equipment Download PDF

Info

Publication number
CN115632788A
CN115632788A CN202211234419.4A CN202211234419A CN115632788A CN 115632788 A CN115632788 A CN 115632788A CN 202211234419 A CN202211234419 A CN 202211234419A CN 115632788 A CN115632788 A CN 115632788A
Authority
CN
China
Prior art keywords
node
chain
dynamic
dynamic access
access request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211234419.4A
Other languages
Chinese (zh)
Inventor
姜国仁
阮安邦
王佳帅
魏明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Octa Innovations Information Technology Co Ltd
Original Assignee
Beijing Octa Innovations Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Octa Innovations Information Technology Co Ltd filed Critical Beijing Octa Innovations Information Technology Co Ltd
Priority to CN202211234419.4A priority Critical patent/CN115632788A/en
Publication of CN115632788A publication Critical patent/CN115632788A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/121Timestamp

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

In the technical scheme of the embodiment of the application, if a node dynamic access request initiated by a dynamic block chain node to be added to a alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added to the alliance chain, and a timestamp of the received node dynamic access request is added and annotated in the node dynamic access request; each existing block chain link point in the alliance chain verifies the received node dynamic access request with the receiving time stamp attached to the received node dynamic access request so as to generate a corresponding node dynamic access request authentication result message; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication result message generated by all the existing block link points in the alliance chain so as to determine whether to allow the dynamic block link nodes to be added into the alliance chain, thereby effectively realizing the dynamic capacity expansion of the alliance chain.

Description

Dynamic access method and device for nodes in alliance chain and electronic equipment
Technical Field
The present application relates to the field of alliance chain technologies, and in particular, to a dynamic access method and apparatus for nodes in an alliance chain, and an electronic device.
Background
Block chains are widely used due to their unique traceability and non-tamper-ability, and belong to a hot platform for data storage sharing. For the union link in the block chain, the number of nodes is small, the processing speed is high, and the transaction cost is low. However, because the number of nodes in the federation chain is small and congestion is likely to occur, how to implement dynamic expansion of the federation chain becomes a technical problem to be solved urgently so as to meet an application scenario with a strong interaction requirement.
Disclosure of Invention
Based on the above problem, the embodiments of the present application provide a method and an apparatus for dynamic access of a node in a federation chain, and an electronic device.
The embodiment of the application discloses the following technical scheme:
according to a first aspect of the embodiments of the present application, a method for dynamic access of a node in a federation chain is provided, where the method includes:
judging whether a node dynamic access request initiated by a dynamic block chain node to be added to the alliance chain is monitored in real time;
if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add a timestamp of the received node dynamic access request into the node dynamic access request;
verifying the received node dynamic access request with the receiving timestamp attached thereto by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message;
and judging whether to respond to the node dynamic access request according to node dynamic access request authentication result messages generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain.
Optionally, that each existing block link point in the federation chain verifies the received node dynamic access request with the receiving timestamp attached thereto to generate a corresponding node dynamic access request authentication result message includes: acquiring main body information of a node dynamic access request received by each block chain link point in the alliance chain; for each existing blockchain node in the alliance chain, using the main body information of the node dynamic access request received by the node dynamic access node as a key of a key-value pair, and using the receiving timestamp as the value of the key-value pair to generate a plurality of key-value pairs; and verifying the received node dynamic access request with the receiving timestamp according to the plurality of key value pairs to generate a corresponding node dynamic access request authentication result message.
Optionally, the determining, according to the node dynamic access request authentication result messages generated by all existing block link points in the federation chain, whether to respond to the node dynamic access request to determine whether to allow the dynamic block link point to be added to the federation chain includes: generating a node dynamic access request authentication map according to node dynamic access request authentication result messages generated by all block link points in the alliance chain; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication map so as to determine whether to allow the dynamic block link point to be added into the alliance chain.
Optionally, the method for dynamically accessing a node in a federation chain further includes: in response to allowing the dynamic block link point to be added to the federated chain and the dynamic block link point being successfully added to the federated chain, the dynamic block link point generates a data synchronization request to synchronize data stored on all block chain nodes already in the federated chain onto the dynamic block chain node.
Optionally, the method for dynamically accessing a node in a federation chain further includes: in response to successfully synchronizing the data stored on all existing block chain nodes in the alliance chain to the dynamic block chain node, the dynamic block chain node generates an identity consensus request, broadcasts the identity consensus request to all existing block chain nodes in the alliance chain, performs trusted identification on the dynamic block chain node by all existing block chain nodes in the alliance chain, and generates a trusted value of the dynamic block chain node to determine whether to allocate the identity consensus to the dynamic block chain node.
Optionally, the method for dynamically accessing a node in a federation chain further includes: in response to assigning a consensus identity to the dynamic block link points, the number of nodes in the federation chain is recalculated and a new view of federation chains is generated and updated to the block link points in the federation chain having a master node identity.
Optionally, the method for dynamically accessing a node in a federation chain further includes: and performing view consistency verification on the new alliance chain view, and judging whether the block chain link point with the main node identity needs to be replaced.
Optionally, the performing view consistency verification on the new federation chain view to determine whether the block link point with the master node identity needs to be replaced includes: performing trusted calculation on all block chain link points in the alliance chain to obtain a trusted degree value; and performing view consistency verification on the new alliance chain view according to the credibility value so as to judge whether the block link point with the master node identity needs to be replaced.
Optionally, the performing view consistency verification on the new federation chain view according to the trustworthiness value to determine whether the block link point with the master node identity needs to be replaced includes: generating a credibility binary tree according to all the credibility values, wherein the distance between adjacent tree nodes along the trunk direction from the tree root to the tree top in the credibility binary tree represents the approximation degree of the credibility value from small to large; comparing the credibility binary tree with the credibility value of the master node, and judging whether the block link point with the master node identity needs to be replaced; and if the trustworthiness degree value of the master node is greater than the height of the trustworthiness degree binary tree, not replacing the block chain link point with the master node identity, otherwise, replacing the block chain link point with the master node identity.
According to a second aspect of the embodiments of the present application, there is provided a dynamic access apparatus for a node in a federation chain, including:
a first program unit, configured to determine whether a node dynamic access request initiated by a dynamic block chain node to be added to the federation chain is monitored in real time;
a second program unit, configured to, if a node dynamic access request initiated by a dynamic block link node to be added to the federation chain is monitored, receive, by all existing block link points in the federation chain, the node dynamic access request initiated by the dynamic block link node to be added to the federation chain, and add and annotate, in the node dynamic access request, a timestamp of the received node dynamic access request;
a third program unit, configured to verify, at each existing block link point in the federation chain, the received node dynamic access request with the receiving timestamp attached thereto, so as to generate a corresponding node dynamic access request authentication result message;
a fourth program unit, configured to determine, according to a node dynamic access request authentication result message generated by all existing block chain link points in the federation chain, whether to respond to the node dynamic access request, so as to determine whether to allow the dynamic block chain link point to be added to the federation chain.
Optionally, wherein the third program unit is further configured to: acquiring main body information of a node dynamic access request received by each block chain link point in the alliance chain; for each existing blockchain node in the alliance chain, using the main body information of the node dynamic access request received by the node dynamic access node as a key of a key-value pair, and using the receiving timestamp as the value of the key-value pair to generate a plurality of key-value pairs; and verifying the received node dynamic access request with the receiving timestamp according to the plurality of key value pairs to generate a corresponding node dynamic access request authentication result message.
Optionally, wherein the fourth program unit is further configured to: generating a node dynamic access request authentication map according to node dynamic access request authentication result messages generated by all block link points in the alliance chain; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication map so as to determine whether to allow the dynamic block link point to be added into the alliance chain.
Optionally, the apparatus further comprises: a first data generating unit, configured to, in response to allowing the dynamic block link point to be added to the federation chain and the dynamic block link point being successfully added to the federation chain, generate a data synchronization request by the dynamic block link point to synchronize data stored on all block chain nodes already in the federation chain to the dynamic block chain node.
Optionally, the apparatus further comprises: and a second data generation unit, configured to, in response to successful synchronization of data stored in all existing block chain nodes in the alliance chain to the dynamic block chain node, generate a consensus identity request by the dynamic block chain node, broadcast the consensus identity request to all existing block chain nodes in the alliance chain, perform trusted identification on the dynamic block chain node by all existing block chain nodes in the alliance chain, and generate a trusted value of the dynamic block chain node to determine whether to allocate a consensus identity to the dynamic block chain node.
Optionally, the apparatus further comprises: and a third data generation unit, configured to, in response to the dynamic block link point being assigned with a consensus identity, recalculate the number of nodes in the federation chain and generate a new federation chain view, and update to the block link point having a master node identity in the federation chain.
Optionally, the apparatus further comprises: and the judgment generation unit is used for carrying out view consistency verification on the new alliance chain view and judging whether the block chain link point with the master node identity needs to be replaced.
Optionally, the judgment generation unit is further configured to: performing trusted calculation on all block chain link points in the alliance chain to obtain a trusted degree value; and according to the credibility value, carrying out view consistency verification on the new alliance chain view so as to judge whether the block chain link point with the master node identity needs to be replaced.
Optionally, the judgment generation unit is further configured to: generating a credibility binary tree according to all the credibility values, wherein the distance between adjacent tree nodes along the trunk direction from the tree root to the tree top in the credibility binary tree represents the approximation degree of the credibility value from small to large; comparing the credibility binary tree with the credibility value of the master node, and judging whether the block link point with the master node identity needs to be replaced; and if the trustworthiness value of the master node is greater than the height of the trustworthiness binary tree, not replacing the block link point with the master node identity, otherwise, replacing the block link point with the master node identity.
According to a third aspect of the embodiments of the present application, there is provided an electronic device, including a memory and a processor, where the memory stores an executable program, and the processor executes the executable program to perform the following steps:
judging whether a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored in real time;
if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add a timestamp of the received node dynamic access request into the node dynamic access request;
verifying the received node dynamic access request with the receiving timestamp attached thereto by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message;
and judging whether to respond to the node dynamic access request according to node dynamic access request authentication result messages generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain.
In the technical scheme of the embodiment of the application, whether a node dynamic access request initiated by a dynamic block link node to be added to the alliance link is monitored in real time is judged; if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add and note a timestamp of the received node dynamic access request in the node dynamic access request; verifying the received node dynamic access request with the receiving timestamp attached thereto by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication result message generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain, thereby effectively realizing dynamic capacity expansion of the alliance chain.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the description below are only some embodiments of the present application, and for those skilled in the art, other drawings may be obtained according to these drawings without inventive labor.
Fig. 1 is a schematic flowchart of a dynamic access method for a node in a federation chain according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a dynamic access apparatus for nodes in a federation chain according to an embodiment of the present application;
fig. 3 is another schematic structural diagram of a dynamic access apparatus for a node in a federation chain according to an embodiment of the present application;
FIG. 4 is a schematic structural diagram of an electronic device in an embodiment of the present application;
fig. 5 is a schematic diagram of a hardware structure of an electronic device in an embodiment of the present application.
Detailed Description
It is not necessary for any particular embodiment of the present application to achieve all of the above advantages simultaneously.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
In the technical scheme of the embodiment of the application, whether a node dynamic access request initiated by a dynamic block link node to be added to the alliance link is monitored in real time is judged; if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add a timestamp of the received node dynamic access request into the node dynamic access request; verifying the received node dynamic access request with the receiving timestamp attached thereto by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication result message generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain, thereby effectively realizing dynamic capacity expansion of the alliance chain.
Fig. 1 is a schematic flowchart of a dynamic access method for a node in a federation chain according to an embodiment of the present application; as shown in fig. 1, it includes:
s101, judging whether a node dynamic access request initiated by a dynamic block chain node to be added to the alliance chain is monitored in real time;
in this embodiment, a monitoring node may be configured to perform step S101.
S102, if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain link points in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add and note a timestamp of the received node dynamic access request in the node dynamic access request;
in this embodiment, the specific form of the timestamp is not limited. For example, the time stamp is encrypted and added to the dynamic access request of the node.
S103, verifying the received node dynamic access request with the receiving timestamp attached thereto by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message;
s104, judging whether to respond to the node dynamic access request according to the node dynamic access request authentication result message generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain.
Optionally, each existing block link point in the federation chain verifies the received node dynamic access request with the receiving timestamp attached thereto to generate a corresponding node dynamic access request authentication result message, including: acquiring main body information of a node dynamic access request received by each block chain link point in the alliance chain; for each existing blockchain node in the alliance chain, using the main body information of the node dynamic access request received by the node dynamic access node as a key of a key-value pair, and using the receiving timestamp as the value of the key-value pair to generate a plurality of key-value pairs; and verifying the received node dynamic access request with the receiving timestamp according to the plurality of key value pairs to generate a corresponding node dynamic access request authentication result message.
In this embodiment, based on the key value pair, a resource space of data storage may be saved, and management of the node dynamic access request may be efficiently implemented.
Optionally, the determining, according to the node dynamic access request authentication result messages generated by all existing block link points in the federation chain, whether to respond to the node dynamic access request to determine whether to allow the dynamic block link point to be added to the federation chain includes: generating a node dynamic access request authentication map according to node dynamic access request authentication result messages generated by all block link points in the alliance chain; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication map so as to determine whether to allow the dynamic block link point to be added into the alliance chain.
In this embodiment, the dynamic access request authentication graph of the node can quickly determine whether to respond to the dynamic access request of the node, thereby improving the efficiency of algorithm execution.
Optionally, the method for dynamically accessing a node in a federation chain further includes: in response to allowing the dynamic block link point to be added to the federated chain and the dynamic block link point being successfully added to the federated chain, the dynamic block link point generates a data synchronization request to synchronize data stored on all block chain nodes already in the federated chain onto the dynamic block chain node.
In this embodiment, based on the data synchronization request generated by the dynamic blockchain node, the data stored in all the blockchain nodes in the federation chain may be synchronized to the dynamic blockchain node in real time.
Optionally, the method for dynamically accessing a node in a federation chain further includes: in response to successfully synchronizing the data stored on all existing block chain nodes in the alliance chain to the dynamic block chain node, the dynamic block chain node generates an identity consensus request, broadcasts the identity consensus request to all existing block chain nodes in the alliance chain, performs trusted identification on the dynamic block chain node by all existing block chain nodes in the alliance chain, and generates a trusted value of the dynamic block chain node to determine whether to allocate the identity consensus to the dynamic block chain node.
In this embodiment, the trusted value of the dynamic block chain node is generated by performing trusted identification on the dynamic block chain node, so that it is ensured that the nodes participating in the consensus are trusted, and the security of data is further ensured.
Optionally, the method for dynamically accessing a node in a federation chain further includes: in response to assigning a consensus identity to the dynamic block link points, the number of nodes in the federation chain is recalculated and a new view of federation chains is generated and updated to the block link points in the federation chain having a master node identity.
In this embodiment, by responding to the fact that the consensus identity is allocated to the dynamic block link point, dynamic update of the federation chain view can be achieved, and timeliness of the federation chain view according to the next consensus is guaranteed.
Optionally, the method for dynamically accessing a node in a federation chain further includes: and performing view consistency verification on the new alliance chain view, and judging whether the block chain link point with the master node identity needs to be replaced.
Optionally, the performing view consistency verification on the new federation chain view to determine whether the block link point with the master node identity needs to be replaced includes: performing trusted calculation on all block link points in the alliance chain to obtain a trusted degree value; and according to the credibility value, carrying out view consistency verification on the new alliance chain view so as to judge whether the block chain link point with the master node identity needs to be replaced.
In this embodiment, view consistency verification is performed on the new alliance chain view according to the trustworthiness value, so that the authority of the block link point with the identity of the master node is guaranteed, and the security of dynamic node entry is improved.
Optionally, the performing view consistency verification on the new federation chain view according to the trustworthiness value to determine whether the block link point with the master node identity needs to be replaced includes: generating a credibility binary tree according to all the credibility values, wherein the distance between adjacent tree nodes along the trunk direction from the tree root to the tree top in the credibility binary tree represents the approximation degree of the credibility value from small to large; comparing the credibility binary tree with the credibility value of the master node, and judging whether the block link point with the master node identity needs to be replaced; and if the trustworthiness degree value of the master node is greater than the height of the trustworthiness degree binary tree, not replacing the block chain link point with the master node identity, otherwise, replacing the block chain link point with the master node identity.
In this embodiment, based on the comparison between the trustworthiness binary tree and the trustworthiness value of the master node, it may be quickly determined whether the block link point having the master node identity needs to be replaced.
Fig. 2 is a schematic structural diagram of a dynamic access apparatus for a node in a federation chain according to an embodiment of the present application; as shown in fig. 2, it includes:
a first program unit 201, configured to determine whether a node dynamic access request initiated by a dynamic block chain node to be added to the federation chain is monitored in real time;
a second program unit 202, configured to, if a node dynamic access request initiated by a dynamic block chain node to be added to the federation chain is monitored, receive, by all existing block chain nodes in the federation chain, the node dynamic access request initiated by the dynamic block chain node to be added to the federation chain, and add, to the node dynamic access request, a timestamp of the received node dynamic access request;
a third program unit 203, configured to verify, at each existing block link point in the federation chain, the received node dynamic access request with the receiving timestamp attached thereto, so as to generate a corresponding node dynamic access request authentication result message;
a fourth program unit 204, configured to determine, according to node dynamic access request authentication result messages generated by all block link points in the federation chain, whether to respond to the node dynamic access request, so as to determine whether to allow the dynamic block link point to be added to the federation chain.
Optionally, the third program element 203 is further configured to: acquiring main body information of a node dynamic access request received by each block chain link point in the alliance chain; for each existing blockchain node in the alliance chain, using the main body information of the node dynamic access request received by the node dynamic access node as a key of a key-value pair, and using the receiving timestamp as the value of the key-value pair to generate a plurality of key-value pairs; and verifying the received node dynamic access request with the receiving timestamp according to the plurality of key value pairs to generate a corresponding node dynamic access request authentication result message.
Optionally, the fourth program unit 204 is further configured to: generating a node dynamic access request authentication map according to node dynamic access request authentication result messages generated by all block link points in the alliance chain; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication map so as to determine whether to allow the dynamic block link point to be added into the alliance chain.
Fig. 3 is a schematic structural diagram of a dynamic access apparatus for a node in a federation chain according to an embodiment of the present application; as shown in fig. 3, on the basis of the above embodiment of fig. 2, the dynamic access device for nodes in a federation chain of this embodiment is characterized in that:
optionally, the apparatus further comprises: a first data generating unit 205, configured to, in response to the dynamic block link point being allowed to be added into the federation chain and being successfully added into the federation chain, generate a data synchronization request by the dynamic block link point to synchronize data stored on all block chain nodes already in the federation chain onto the dynamic block chain node.
Optionally, the apparatus further comprises: a second data generating unit 206, configured to, in response to successfully synchronizing data stored on all existing block chain nodes in the federation chain to the dynamic block chain node, generate a consensus identity request by the dynamic block chain node, and broadcast the consensus identity request to all existing block chain nodes in the federation chain, so as to perform trusted identification on the dynamic block chain node by all existing block chain nodes in the federation chain, and generate a trusted value of the dynamic block chain node, so as to determine whether to allocate a consensus identity to the dynamic block chain node.
Optionally, the apparatus further comprises: a third data generating unit 207, configured to, in response to the dynamic blockchain node being assigned with a consensus identity, recalculate the number of nodes in the federation chain and generate a new federation chain view, and update to a blockchain node in the federation chain having a master node identity.
Optionally, the apparatus further comprises: and a judgment generating unit 208, configured to perform view consistency verification on the new federation chain view, and judge whether the block link point with the master node identity needs to be replaced.
Optionally, the judgment generation unit 208 is further configured to: performing trusted calculation on all block chain link points in the alliance chain to obtain a trusted degree value; and according to the credibility value, carrying out view consistency verification on the new alliance chain view so as to judge whether the block chain link point with the master node identity needs to be replaced.
Optionally, the judgment generation unit 208 is further configured to: generating a credibility binary tree according to all the credibility values, wherein the distance between adjacent tree nodes along the trunk direction from the tree root to the tree top in the credibility binary tree represents the approximation degree of the credibility value from small to large; comparing the credibility binary tree with the credibility value of the master node, and judging whether the block link point with the master node identity needs to be replaced; and if the trustworthiness degree value of the master node is greater than the height of the trustworthiness degree binary tree, not replacing the block chain link point with the master node identity, otherwise, replacing the block chain link point with the master node identity.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application; as shown in fig. 4, it includes a memory 301 and a processor 302, the memory stores an executable program, and the processor executes the executable program and executes the following steps:
judging whether a node dynamic access request initiated by a dynamic block chain node to be added to the alliance chain is monitored in real time;
if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add and note a timestamp of the received node dynamic access request in the node dynamic access request;
verifying the received node dynamic access request with the receiving timestamp attached thereto by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message;
and judging whether to respond to the node dynamic access request according to node dynamic access request authentication result messages generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain.
FIG. 5 is a schematic diagram of a hardware structure of an electronic device in an embodiment of the present application; as shown in fig. 5, the hardware structure of the electronic device may include: the electronic device 400 comprises a computing unit 401 which may perform various suitable actions and processes according to a computer program stored in a Read Only Memory (ROM) 402 or a computer program loaded from a storage unit 406 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for the operation of the device 400 can also be stored. The computing unit 401, ROM 402, and RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
A number of components in the electronic device 400 are connected to the I/O interface 405, including: an input unit 406, an output unit 407, a storage unit 408, and a communication unit 409. The input unit 406 may be any type of device capable of inputting information to the electronic device 400, and the input unit 406 may receive input numeric or character information and generate key signal inputs related to user settings and/or function controls of the electronic device. Output unit 407 may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, a video/audio output terminal, a vibrator, and/or a printer. The storage unit 404 may include, but is not limited to, a magnetic disk, an optical disk. The communication unit 409 allows the electronic device 400 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunications networks, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication transceivers, and/or chipsets, such as bluetooth (TM) devices, wiFi devices, wiMax devices, cellular communication devices, and/or the like.
Computing unit 401 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 401 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 401 executes the respective methods and processes described above. For example, in some embodiments, the above steps may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 40. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 400 via the ROM 402 and/or the communication unit 409. In some embodiments, the computing unit 401 may be configured to perform the above steps in any other suitable manner (e.g., by means of firmware).
The electronic device of the embodiments of the present application exists in various forms, including but not limited to:
(1) Mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, and smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(5) And other electronic devices with data interaction functions.
It should be noted that, in this specification, each embodiment is described in a progressive manner, and the same and similar parts between the embodiments are referred to each other, and each embodiment focuses on differences from other embodiments. In particular, the apparatus and system embodiments, because they are substantially similar to the method embodiments, are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are merely illustrative, and the modules illustrated as separate components may or may not be physically separate, and the components suggested as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (19)

1. A dynamic access method for nodes in a alliance chain is characterized by comprising the following steps:
judging whether a node dynamic access request initiated by a dynamic block chain node to be added to the alliance chain is monitored in real time;
if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add a timestamp of the received node dynamic access request into the node dynamic access request;
verifying the received node dynamic access request with the receiving timestamp attached thereto by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message;
and judging whether to respond to the node dynamic access request according to node dynamic access request authentication result messages generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain.
2. The method for dynamically accessing nodes in a federation chain according to claim 1, wherein each existing block link point in the federation chain verifies the received node dynamic access request with the receiving timestamp attached thereto to generate a corresponding node dynamic access request authentication result message, including: acquiring main body information of a node dynamic access request received by each block chain link point in the alliance chain; for each existing blockchain node in the alliance chain, using the main body information of the node dynamic access request received by the node dynamic access node as a key of a key-value pair, and using the receiving timestamp as the value of the key-value pair to generate a plurality of key-value pairs; and verifying the received node dynamic access request with the receiving timestamp according to the plurality of key value pairs to generate a corresponding node dynamic access request authentication result message.
3. The method according to claim 1, wherein the determining whether to respond to the node dynamic access request according to the node dynamic access request authentication result message generated from all existing block chain nodes in the federation chain to determine whether to allow the dynamic block chain node to be added to the federation chain comprises: generating a node dynamic access request authentication map according to node dynamic access request authentication result messages generated by all block link points in the alliance chain; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication map so as to determine whether to allow the dynamic block link point to be added into the alliance chain.
4. The dynamic access method for nodes in a federation chain as claimed in claim 1, wherein said dynamic access method for nodes in a federation chain further comprises: in response to allowing the dynamic block link point to be added to the federated chain and the dynamic block link point being successfully added to the federated chain, the dynamic block link point generates a data synchronization request to synchronize data stored on all block chain nodes already in the federated chain onto the dynamic block chain node.
5. The dynamic access method of alliance-link nodes as claimed in claim 4, wherein said dynamic access method of alliance-link nodes further comprises: in response to successfully synchronizing the data stored in all the existing block chain nodes in the alliance chain to the dynamic block chain node, the dynamic block chain node generates an identity consensus request, broadcasts the identity consensus request to all the existing block chain nodes in the alliance chain, performs trusted identification on the dynamic block chain node through all the existing block chain node points in the alliance chain, and generates a trusted value of the dynamic block chain node to determine whether to allocate the identity consensus to the dynamic block chain node.
6. The dynamic access method for nodes in a federation chain as claimed in claim 5, wherein said dynamic access method for nodes in a federation chain further comprises: in response to assigning a consensus identity to the dynamic block link points, the number of nodes in the federation chain is recalculated and a new view of federation chains is generated and updated to the block link points in the federation chain having a master node identity.
7. The dynamic access method of a federated node as claimed in claim 6, wherein the dynamic access method of a federated node further comprises: and performing view consistency verification on the new alliance chain view, and judging whether the block chain link point with the main node identity needs to be replaced.
8. The dynamic access method for nodes in a alliance chain as claimed in claim 7, wherein the performing view consistency verification on the new alliance chain view to determine whether the block chain node with a master node identity needs to be replaced comprises: performing trusted calculation on all block chain link points in the alliance chain to obtain a trusted degree value; and according to the credibility value, carrying out view consistency verification on the new alliance chain view so as to judge whether the block chain link point with the master node identity needs to be replaced.
9. The method according to claim 7, wherein the performing view consistency verification on the new view of a federation chain to determine whether the block link point having a master node identity needs to be replaced according to the trustworthiness value comprises: generating a credibility binary tree according to all the credibility values, wherein the distance between adjacent tree nodes along the trunk direction from the tree root to the tree top in the credibility binary tree represents the approximation degree of the credibility value from small to large; comparing the credibility binary tree with the credibility value of the master node, and judging whether the block link point with the master node identity needs to be replaced; and if the trustworthiness value of the master node is greater than the height of the trustworthiness binary tree, not replacing the block link point with the master node identity, otherwise, replacing the block link point with the master node identity.
10. A dynamic access device for nodes in a federation chain, comprising:
a first program unit, configured to determine whether a node dynamic access request initiated by a dynamic block chain node to be added to the federation chain is monitored in real time;
a second program unit, configured to, if a node dynamic access request initiated by a dynamic block link node to be added to the federation chain is monitored, receive, by all existing block link points in the federation chain, the node dynamic access request initiated by the dynamic block link node to be added to the federation chain, and add and annotate, in the node dynamic access request, a timestamp of the received node dynamic access request;
a third program unit, configured to verify, at each existing block link point in the federation chain, the received node dynamic access request with the receiving timestamp attached thereto, so as to generate a corresponding node dynamic access request authentication result message;
a fourth program unit, configured to determine, according to a node dynamic access request authentication result message generated by all existing block chain link points in the federation chain, whether to respond to the node dynamic access request, so as to determine whether to allow the dynamic block chain link point to be added to the federation chain.
11. A dynamic access arrangement of nodes in a federation chain as recited in claim 10, wherein said third program unit is further configured to: acquiring main body information of a node dynamic access request received by each block chain link point in the alliance chain; for each existing blockchain node in the alliance chain, using the main body information of the node dynamic access request received by the node dynamic access node as a key of a key-value pair, and using the receiving timestamp as the value of the key-value pair to generate a plurality of key-value pairs; and verifying the received node dynamic access request with the receiving timestamp according to the plurality of key value pairs to generate a corresponding node dynamic access request authentication result message.
12. A dynamic access device of a federation node in a chain as recited in claim 10, wherein said fourth program unit is further configured to: generating a node dynamic access request authentication map according to node dynamic access request authentication result messages generated by all block link points in the alliance chain; and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication map so as to determine whether to allow the dynamic block link point to be added into the alliance chain.
13. The dynamic access device of a node in a federation chain of claim 10, the device further comprising: a first data generating unit, configured to, in response to allowing the dynamic block link point to be added into the federation chain and the dynamic block link point is successfully added into the federation chain, generate a data synchronization request by the dynamic block link point to synchronize data stored on all block chain nodes already in the federation chain onto the dynamic block chain node.
14. The dynamic access device of a federation node in chain of claim 13, the device further comprising: and a second data generation unit, configured to, in response to successful synchronization of data stored in all existing block chain nodes in the alliance chain to the dynamic block chain node, generate a consensus identity request by the dynamic block chain node, broadcast the consensus identity request to all existing block chain nodes in the alliance chain, perform trusted identification on the dynamic block chain node by all existing block chain nodes in the alliance chain, and generate a trusted value of the dynamic block chain node to determine whether to allocate a consensus identity to the dynamic block chain node.
15. The dynamic access device of a federation node in chain of claim 14, the device further comprising: and a third data generation unit, configured to, in response to the dynamic block link point being assigned with a consensus identity, recalculate the number of nodes in the federation chain and generate a new federation chain view, and update to the block link point having a master node identity in the federation chain.
16. The dynamic access device of a federation node in chain of claim 15, wherein the device further comprises: and the judgment generation unit is used for carrying out view consistency verification on the new alliance chain view and judging whether the block chain link point with the main node identity needs to be replaced.
17. The dynamic access device of a node in a federation chain of claim 16, wherein the determination generating unit is further configured to: performing trusted calculation on all block chain link points in the alliance chain to obtain a trusted degree value; and according to the credibility value, carrying out view consistency verification on the new alliance chain view so as to judge whether the block chain link point with the master node identity needs to be replaced.
18. The dynamic access device of a node in a federation chain of claim 16, wherein the determination generating unit is further configured to: generating a credibility binary tree according to all the credibility values, wherein the distance between adjacent tree nodes along the trunk direction from the tree root to the tree top in the credibility binary tree represents the approximation degree of the credibility value from small to large; comparing the credibility binary tree with the credibility value of the master node, and judging whether the block link point with the master node identity needs to be replaced; and if the trustworthiness degree value of the master node is greater than the height of the trustworthiness degree binary tree, not replacing the block chain link point with the master node identity, otherwise, replacing the block chain link point with the master node identity.
19. An electronic device, comprising a memory and a processor, wherein the memory stores an executable program, and the processor executes the executable program to perform the following steps:
judging whether a node dynamic access request initiated by a dynamic block chain node to be added to the alliance chain is monitored in real time;
if a node dynamic access request initiated by a dynamic block chain node to be added into the alliance chain is monitored, all existing block chain nodes in the alliance chain receive the node dynamic access request initiated by the dynamic block chain node to be added into the alliance chain, and add a timestamp of the received node dynamic access request into the node dynamic access request;
verifying the received node dynamic access request with the receiving timestamp attached to the node dynamic access request by each existing block link point in the alliance chain to generate a corresponding node dynamic access request authentication result message;
and judging whether to respond to the node dynamic access request according to the node dynamic access request authentication result message generated by all the existing block chain link points in the alliance chain so as to determine whether to allow the dynamic block chain link points to be added into the alliance chain.
CN202211234419.4A 2022-10-10 2022-10-10 Dynamic access method and device for nodes in alliance chain and electronic equipment Pending CN115632788A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211234419.4A CN115632788A (en) 2022-10-10 2022-10-10 Dynamic access method and device for nodes in alliance chain and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211234419.4A CN115632788A (en) 2022-10-10 2022-10-10 Dynamic access method and device for nodes in alliance chain and electronic equipment

Publications (1)

Publication Number Publication Date
CN115632788A true CN115632788A (en) 2023-01-20

Family

ID=84905381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211234419.4A Pending CN115632788A (en) 2022-10-10 2022-10-10 Dynamic access method and device for nodes in alliance chain and electronic equipment

Country Status (1)

Country Link
CN (1) CN115632788A (en)

Similar Documents

Publication Publication Date Title
CN110601849B (en) Trusted timestamp adding method and device and storage medium
US20230037932A1 (en) Data processing method and apparatus based on blockchain network, and computer device
CN112118239B (en) Block chain consensus method and device, electronic equipment and storage medium
CN110177124A (en) Identity identifying method and relevant device based on block chain
CN111461720B (en) Identity verification method and device based on blockchain, storage medium and electronic equipment
CN111711655A (en) Block chain-based electronic data evidence storing method, system, storage medium and terminal
CN112134883A (en) Method and device for quickly authenticating trust relationship between nodes based on trusted computing and related products
CN111786785A (en) Block chain-based power distribution Internet of things node switching method and device
CN110990790A (en) Data processing method and equipment
CN112202765B (en) Block chain common identification block method, block chain system, electronic device and storage medium
CN115632788A (en) Dynamic access method and device for nodes in alliance chain and electronic equipment
CN115269056A (en) Encryption module plug-in method and device based on class loader and related product
CN115270161A (en) Encryption method and device based on encryption plug-in and related product
CN115391801A (en) Method and device for updating encryption module in block chain system and related products
CN112131602B (en) Method, device and related product for quickly expanding trust relationship between nodes based on trusted computing
CN114092101A (en) Transaction verification method and device, storage medium and electronic equipment
CN115622712A (en) Dynamic quitting method and device for nodes in alliance chain and electronic equipment
CN113919511A (en) Federal learning method and device
CN115617907A (en) Channel allocation method and device for league chain cross-chain and electronic equipment
CN114172668B (en) Group member management method and system based on digital certificate
CN115618411A (en) Access method and device for shared data in alliance chain and electronic equipment
CN115906150A (en) Method and device for accessing sensitive data in alliance chain and electronic equipment
CN115629900A (en) View processing method and device in alliance chain and electronic equipment
CN115632787A (en) Management method and device for node authority in alliance chain and electronic equipment
CN115618382A (en) Storage method and device for shared data in alliance chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination