CN117692128A - Three-level dense chain architecture - Google Patents

Three-level dense chain architecture Download PDF

Info

Publication number
CN117692128A
CN117692128A CN202410150733.7A CN202410150733A CN117692128A CN 117692128 A CN117692128 A CN 117692128A CN 202410150733 A CN202410150733 A CN 202410150733A CN 117692128 A CN117692128 A CN 117692128A
Authority
CN
China
Prior art keywords
server
node
nodes
accounting
organization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410150733.7A
Other languages
Chinese (zh)
Other versions
CN117692128B (en
Inventor
刘鑫宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bovis Digital Technology Co ltd
Original Assignee
Bovis Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bovis Digital Technology Co ltd filed Critical Bovis Digital Technology Co ltd
Priority to CN202410150733.7A priority Critical patent/CN117692128B/en
Publication of CN117692128A publication Critical patent/CN117692128A/en
Application granted granted Critical
Publication of CN117692128B publication Critical patent/CN117692128B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a three-level secret chain architecture, which comprises a server, a user pool and nodes, wherein the server, the user pool and the nodes are all provided with a plurality of nodes; the server is used for organizing work, communication among the servers is subjected to hash encryption, organizing list information is abstracted into account book information, and the account book information is time stamped and stored in the server; the server is also used for calling the user pool user and distributing the accounting task to the extracted nodes; the node for obtaining task accounting is used for completing the task of storing the account book, marking the node belongs to the organization list after the time stamp is added and hash encryption is carried out. The invention can transfer the calculation force of a large amount of personal nodes consumed in the original architecture to the server for calculation, saves the calculation force of the personal node synchronous account book, and can prevent different attack modes including 51% attack, thereby ensuring the safety.

Description

Three-level dense chain architecture
Technical Field
The invention relates to the technical field of blockchain, in particular to a three-level dense chain architecture.
Background
As shown in fig. 1 and fig. 2, in the existing blockchain technology, the security of data assets is ensured by a distributed account book storage mode, and an accounting person obtains the accounting qualification based on the efficiency of decoding hash by calculation force, although the account book is stored in a distributed mode and accounts are checked among nodes, the security of a block can be improved to a certain extent, an attacker can still obtain account book information in a node intrusion mode, and when the account book authority of a certain directional transaction is mastered to exceed 51%, the attacker can still tamper the account book information.
Moreover, the existing block technology occupies a large amount of calculation power, extremely pursues the architecture thought of conscious morphological decentralization, excludes the powerful calculation capability of the centralization server, and results in low calculation efficiency.
Disclosure of Invention
The invention aims to provide a three-level secret chain architecture which can transfer the calculation force of a large number of personal nodes consumed in the original architecture to a server for calculation, save the calculation force of a personal node synchronous account book and prevent different attack modes including 51% attack, thereby ensuring the safety.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
three-level close chain framework, its characterized in that: the system comprises a server, a user pool and nodes, wherein the server, the user pool and the nodes are all provided with a plurality of servers;
the server is used for organizing work, communication among the servers is subjected to hash encryption, organization list information is abstracted into account information, a timestamp is added, and the account information is stored in the server; the server is also used for calling the user pool user and distributing the accounting task to the extracted nodes;
the node for obtaining task accounting is used for completing the task of storing the account book, marking the node belongs to the organization list after the time stamp is added and hash encryption is carried out.
Further, when the server calls the node account book, after decoding the list through the server with the organized list and the organizing authority, the billing node is informed to check, and after checking, the billing node presents the result information to the server.
Further, after the accounting node returns to the user pool, each node in the user pool synchronizes account information.
Preferably, the information transmitted between the servers includes partial organization information or partial organization information fragments, and the organization list is obtained after decoding by at least two servers.
Preferably, the decimation is a random decimation.
Preferably, the server with the organization authority is a server randomly designated through a discrete algorithm after the server obtains the organization list.
Preferably, the server does not have the right to modify the result after the accounting node finishes accounting.
The beneficial effects of the invention are as follows:
1. the invention can transfer a large amount of personal node calculation force consumed in the original architecture to the server for calculation, for example, the consensus calculation is saved, and the calculation force of the personal node synchronous account book is saved.
2. The server can obtain a complete organization list only after the organization rights are decoded by a plurality of servers, and the attack object is prevented from being positioned by an attacker in the way.
3. After the server obtains the complete organization list, a server is randomly designated to obtain the organization rights through a discrete algorithm, and the attacker cannot obtain the organization rights through managing rights and executing rights cutting of the list.
4. The server can only obtain the result information after the node checks the account, but does not modify the authority of the result after the node completes the check, so that an attacker cannot modify the result from an intermediate link.
5. The account book information is transferred in a user pool of the user participating in the account book, and the users are grouped through the user pool, so that the purpose of crossing accounts is achieved, and an attacker cannot lock the account book position.
6. The middle layer of the user pool exists, so that an attacker needs to attack all servers and all user pools to acquire all node information, but key generation rules of different server nodes and user pools are different even running environments, and the difficulty of attack all servers and all user pools is greatly increased.
Drawings
FIG. 1 is a node relationship diagram of a prior art manner of acquiring billing qualifications based on computational power.
Fig. 2 is a schematic diagram of an information transfer rule of a hash decoding by calculation in the prior art.
Fig. 3 is a schematic diagram of the present invention.
Fig. 4 is a diagram of the user pool ledger synchronization of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings, in order to make the objects, technical solutions and advantages of the present invention more apparent.
As shown in FIG. 3, the three-level secret chain architecture disclosed by the invention comprises a server, a user pool and nodes, wherein the server, the user pool and the nodes are all provided with a plurality of.
Wherein: the servers are responsible for organizing work, communication among the servers is subjected to hash encryption, organizing list information is abstracted into account book information, and the account book information is directly stored in a server node after being time stamped.
The server has authority to invoke different user pool users and assign billing tasks to the extracted nodes.
Each node obtaining the task completes the task of storing the account book, marks the time stamp, carries out hash encryption and acknowledges that the node belongs to the list.
When the server needs to call the node account book, the server with the organized list and the organizing authority informs the accounting node to check after decoding the list, and after checking the account, the node presents the result information to the server.
In particular, the server can obtain the complete organization list only after the organization rights are decoded by a plurality of servers. After the server obtains the complete organization list, a server is randomly designated to obtain the organization authority through a discrete algorithm. The server can only obtain the result information after accounting by the accounting node, and does not modify the authority of the result after accounting by the node.
As shown in FIG. 4, after the accounting node returns to the user pool, each node in the user pool may synchronize ledger information. The pool of non-participating users need not be synchronized.
The invention combines the calculation power of the server into the calculation network while pursuing the decentralization thought, but the decentralization server only carries out organization work, and the accounting and checking actions are still distributed in the nodes, so that the decentralization design thought is still satisfied.
The prior blockchain technology screens a plurality of nodes with accounting qualification through calculation force to account, the invention randomly extracts a plurality of user nodes from a plurality of user pools through a server to account, and the design can endow the server with organization information, so that the accounting nodes do not need to acquire qualification through calculation force, thereby greatly saving calculation force on a chain. The design can ensure that when an attacker attacks the nodes, the attacker cannot acquire the organization information, so that other nodes participating in accounting cannot be found, an attack object cannot be locked, and when the attacker attacks the server, the organization information can be acquired, but the specific transaction information cannot be locked, thereby realizing the aim of greatly improving the calculation efficiency under the decentralization design thought, preventing different attack modes including 51% attack, and further ensuring the security.
Of course, the present invention is capable of other various embodiments and its several details are capable of modification and variation in light of the present invention by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (7)

1. Three-level close chain framework, its characterized in that: the system comprises a server, a user pool and nodes, wherein the server, the user pool and the nodes are all provided with a plurality of servers;
the server is used for organizing work, communication among the servers is subjected to hash encryption, organization list information is abstracted into account information, a timestamp is added, and the account information is stored in the server; the server is also used for calling the user pool user and distributing the accounting task to the extracted nodes;
the node for obtaining task accounting is used for completing the task of storing the account book, marking the node belongs to the organization list after the time stamp is added and hash encryption is carried out.
2. The three-level chain architecture of claim 1, wherein: when the server calls the node account book, the server with the organization list and the organization authority decodes the list, notifies the accounting node to check, and the accounting node presents the result information to the server after checking.
3. The three-level chain architecture according to claim 1 or 2, characterized in that: after the accounting node returns to the user pool, each node in the user pool synchronizes account information.
4. The three-level chain architecture of claim 1, wherein: the information transmitted between the servers comprises partial organization information or partial organization information fragments, and the organization list is obtained after decoding by at least two servers.
5. The three-level chain architecture of claim 1, wherein: the extraction is random extraction.
6. The three-level chain architecture of claim 2, wherein: the server with organization authority is a server which is randomly designated by a discrete algorithm after the server obtains an organization list.
7. The three-level chain architecture of claim 2, wherein: the server does not have the right to modify the results after accounting nodes complete accounting.
CN202410150733.7A 2024-02-02 2024-02-02 Three-stage chain sealing system Active CN117692128B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410150733.7A CN117692128B (en) 2024-02-02 2024-02-02 Three-stage chain sealing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410150733.7A CN117692128B (en) 2024-02-02 2024-02-02 Three-stage chain sealing system

Publications (2)

Publication Number Publication Date
CN117692128A true CN117692128A (en) 2024-03-12
CN117692128B CN117692128B (en) 2024-04-16

Family

ID=90128583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410150733.7A Active CN117692128B (en) 2024-02-02 2024-02-02 Three-stage chain sealing system

Country Status (1)

Country Link
CN (1) CN117692128B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650291A (en) * 2018-03-26 2018-10-12 南京思利华信息科技有限公司 A kind of GPU task common recognition method and device based on calculation power
CN108711056A (en) * 2018-05-16 2018-10-26 四川大学 A kind of retrospective block catenary system and method for centralization
CN108717630A (en) * 2018-05-19 2018-10-30 上海分布信息科技有限公司 One kind going out block method and its realizes system
CN109658099A (en) * 2018-12-20 2019-04-19 莆田市烛火信息技术有限公司 A kind of account book bookkeeping methods based on block chain
CN109889625A (en) * 2019-03-19 2019-06-14 全链通有限公司 Access method, equipment and the computer readable storage medium of server
CN110322352A (en) * 2019-07-09 2019-10-11 深圳市炳德区块链技术有限公司 A kind of account book foundation and querying method, electronic equipment based on block chain
CN110348248A (en) * 2019-07-16 2019-10-18 山西智博睿星科技有限公司 Distributed book keeping operation power generation method in a kind of block chain technology
US20200059369A1 (en) * 2017-05-16 2020-02-20 Peking University Shenzhen Graduate School Determining consensus by parallel proof of voting in consortium blockchain
CN111160784A (en) * 2019-12-30 2020-05-15 北京工业大学 Product management method based on block chain
CN111949395A (en) * 2020-07-16 2020-11-17 广州玖的数码科技有限公司 Block chain-based shared computing power data processing method, system and storage medium
US20200394183A1 (en) * 2019-06-12 2020-12-17 Subramanya R. Jois System and method of executing, confirming and storing a transaction in a serverless decentralized node network
CN112734576A (en) * 2021-01-19 2021-04-30 广东工业大学 Block chain consensus system and method
CN113256297A (en) * 2021-07-02 2021-08-13 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain and readable storage medium
WO2022027531A1 (en) * 2020-08-03 2022-02-10 西安电子科技大学 Blockchain construction method and system, and storage medium, computer device and application
CN116132058A (en) * 2022-12-29 2023-05-16 中移动信息技术有限公司 Block chain consensus method, apparatus, device and computer readable storage medium
CN117170853A (en) * 2022-05-25 2023-12-05 中移动信息技术有限公司 Block chain transaction method and device and electronic equipment

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200059369A1 (en) * 2017-05-16 2020-02-20 Peking University Shenzhen Graduate School Determining consensus by parallel proof of voting in consortium blockchain
CN108650291A (en) * 2018-03-26 2018-10-12 南京思利华信息科技有限公司 A kind of GPU task common recognition method and device based on calculation power
CN108711056A (en) * 2018-05-16 2018-10-26 四川大学 A kind of retrospective block catenary system and method for centralization
CN108717630A (en) * 2018-05-19 2018-10-30 上海分布信息科技有限公司 One kind going out block method and its realizes system
CN109658099A (en) * 2018-12-20 2019-04-19 莆田市烛火信息技术有限公司 A kind of account book bookkeeping methods based on block chain
CN109889625A (en) * 2019-03-19 2019-06-14 全链通有限公司 Access method, equipment and the computer readable storage medium of server
US20200394183A1 (en) * 2019-06-12 2020-12-17 Subramanya R. Jois System and method of executing, confirming and storing a transaction in a serverless decentralized node network
CN110322352A (en) * 2019-07-09 2019-10-11 深圳市炳德区块链技术有限公司 A kind of account book foundation and querying method, electronic equipment based on block chain
CN110348248A (en) * 2019-07-16 2019-10-18 山西智博睿星科技有限公司 Distributed book keeping operation power generation method in a kind of block chain technology
CN111160784A (en) * 2019-12-30 2020-05-15 北京工业大学 Product management method based on block chain
CN111949395A (en) * 2020-07-16 2020-11-17 广州玖的数码科技有限公司 Block chain-based shared computing power data processing method, system and storage medium
WO2022027531A1 (en) * 2020-08-03 2022-02-10 西安电子科技大学 Blockchain construction method and system, and storage medium, computer device and application
CN112734576A (en) * 2021-01-19 2021-04-30 广东工业大学 Block chain consensus system and method
CN113256297A (en) * 2021-07-02 2021-08-13 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain and readable storage medium
CN117170853A (en) * 2022-05-25 2023-12-05 中移动信息技术有限公司 Block chain transaction method and device and electronic equipment
CN116132058A (en) * 2022-12-29 2023-05-16 中移动信息技术有限公司 Block chain consensus method, apparatus, device and computer readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
IMAN VAKILINIA等: "Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network", 2019 15TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 27 February 2020 (2020-02-27) *
何伯昌: "面向电子政务的区块链共识机制研究与应用", 中国优秀硕士学位论文全文数据库, 20 March 2023 (2023-03-20) *

Also Published As

Publication number Publication date
CN117692128B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CN100586058C (en) J2EE middleware criterion based tolerant inbreak application server and tolerant inbreak method
WO2018209542A1 (en) Consensus method for decentralized domain name system
Islam et al. A review on blockchain security issues and challenges
Xu et al. K-time modifiable and epoch-based redactable blockchain
Popova et al. Research of a possibility of using blockchain technology without tokens to protect banking transactions
CN112199726A (en) Block chain-based alliance trust distributed identity authentication method and system
CN103023657A (en) Security verification system based on distributed network transaction
CN112818332A (en) Password management service platform for intelligent manufacturing
Tian A note on the fundamental limits of coded caching
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN112330443A (en) Public credit information system based on block chain
CN117692128B (en) Three-stage chain sealing system
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
CN113256470A (en) Weapon equipment management system and method based on block chain
CN101364866A (en) Entity secret talk establishing system based on multiple key distribution centers and method therefor
Wang Research on development method of application system based on blockchain
CN103581202B (en) The trade company of identity-based authentication platform makes board cross-certification method
CN112527898B (en) Security calculation method, device, computer and storage medium
Xu et al. Precision Poverty Alleviation Methods in the Agricultural Field Based upon Wireless Communication Networks and Blockchain
Xu Three-party Authentication Protocol Based on Riro for Mobile RFID System
Wang et al. Data privacy protection method of internet of things based on blockchain technology
CN113706106A (en) Government affair cooperation system constructed based on block chain
Schwartz Identity management and privacy: A rare opportunity to get it right
Zhang et al. Application of block chain technology in power information asset lifecycle management
Chen Research on application of computer network technology in electronic information engineering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant