GB2620155A - Computer-implemented system and method - Google Patents
Computer-implemented system and method Download PDFInfo
- Publication number
- GB2620155A GB2620155A GB2209533.5A GB202209533A GB2620155A GB 2620155 A GB2620155 A GB 2620155A GB 202209533 A GB202209533 A GB 202209533A GB 2620155 A GB2620155 A GB 2620155A
- Authority
- GB
- United Kingdom
- Prior art keywords
- transaction
- blockchain
- block
- transactions
- resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims description 232
- 238000010200 validation analysis Methods 0.000 claims abstract description 142
- 238000012545 processing Methods 0.000 claims abstract description 136
- 238000003860 storage Methods 0.000 claims abstract description 64
- 238000005065 mining Methods 0.000 claims abstract description 61
- 238000004364 calculation method Methods 0.000 claims abstract description 28
- 230000008569 process Effects 0.000 claims description 54
- 238000012795 verification Methods 0.000 claims description 42
- 238000012546 transfer Methods 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 4
- 238000013515 script Methods 0.000 description 57
- 230000006870 function Effects 0.000 description 45
- 238000013459 approach Methods 0.000 description 24
- 238000013475 authorization Methods 0.000 description 23
- 238000004891 communication Methods 0.000 description 22
- 230000000694 effects Effects 0.000 description 17
- 230000008901 benefit Effects 0.000 description 15
- 230000007246 mechanism Effects 0.000 description 15
- 230000000644 propagated effect Effects 0.000 description 11
- 230000001276 controlling effect Effects 0.000 description 9
- 230000009471 action Effects 0.000 description 7
- 239000003550 marker Substances 0.000 description 7
- 238000012790 confirmation Methods 0.000 description 6
- 230000006872 improvement Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 230000001902 propagating effect Effects 0.000 description 5
- 238000012360 testing method Methods 0.000 description 5
- 239000003795 chemical substances by application Substances 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000000977 initiatory effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000009467 reduction Effects 0.000 description 3
- 238000013468 resource allocation Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002708 enhancing effect Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000003139 buffering effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000001343 mnemonic effect Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000013138 pruning Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2228—Indexing structures
- G06F16/2246—Trees, e.g. B+trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2379—Updates performed during online database operations; commit processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Distributing blockchain-related operations across multiple processing resources including operations such as block and/or transaction validation, mining tasks such as Proof-of-Work calculations, identification and searching of blockchain-related data, and efficient load balancing across the multiple resources used for performance of such operations. Tasks relating to a given type of blockchain operation e.g. validation or mining may be outsourced or delegated to one or more dedicated resources. The individual blockchain functionalities may be separated out and performed by different resources which can be located anywhere and/or controlled by non-related, trustless entities, This allows a portion of data derived from a blockchain to identify and/or allocate processing storage resource, derived from data comprising an unspent transaction output where a portion of the transaction is included in the Merkle path of a block.
Description
COMPUTER-IMPLEMENTED SYSTEM AND METHOD
FIELD
This disclosure relates generally to improved methods and systems for processing and/or 5 management of data records and/or the format and/or content of such records. The disclosure is particularly suited, but not limited, to use in respect of transactions effected over or using a blockchain network, determining storage allocation, pre and/or post mining validation of blockchain transactions, SPV checks etc. Advantages include, but are not limited to, improvements in security and resilience, efficiency or reduction of speed 10 and resource requirements, novel approaches to validation, distribution of blockchainrelated tasks and operations, and the balancing of processor-based resources that have not been possible with prior art arrangements. This leads to blockchain-implemented arrangements that have not been previously possible.
BACKGROUND
While the Bitcoin protocol and network may be referred to herein for the purpose of providing illustrative context for implementation, the disclosure is not limited to use with the Bitcoin blockchain and alternative protocols and implementations fall within its scope.
A blockchain is a peer-to-peer, electronic ledger which is implemented as a computer-based decentralised, distributed system made up of blocks which in turn are made up of transactions. Each transaction is a data structure that encodes the transfer of control of a digital asset between participants in the blockchain system, and includes at least one input and at least one output. Each block contains a hash of the previous block so that blocks become chained together to create a permanent, unalterable record of all transactions which have been written to the blockchain since its inception.
In order for a transaction (Tx) to be written to the blockchain, it must be validated. Network nodes (miners) perform work to ensure that each transaction is valid, with invalid transactions rejected from the network. Software clients installed on the nodes perform this validation work on an unspent transaction output (UTXO) by executing its locking and unlocking scripts. If execution of the locking and unlocking scripts evaluate to TRUE, the transaction is valid and the transaction is written to the blockchain. Thus, in order for a transaction to be written to the blockchain, it must be i) validated by the first node that receives the transaction -if the transaction is validated, the node relays it to the other nodes in the network i.e. it is propagated; ii) added to a new block built by a miner; and iii) mined, i.e. added to the public ledger of past transactions. Once the transaction is stored in the blockchain as a UTXO, a user can transfer control of the associated cryptocurrency to another address associated with an input in another transaction that is subsequently written to the blockchain. This is often done using a digital wallet which stores the public and private key pairs associated with the user's cryptocurrency. There are various forms of known cryptocurrency wallet, including the SPV wallet (Simplified Payment Verification). SPV techniques allow users and merchant nodes to perform local verification based on only partial information that is relevant to a particular transfer. SPV is discussed in more detail below.
However, it is known that the volume of transactions will increase and improvements in the ability to rapidly determine the validity of an unspent transaction output (UTXO) are required. Current techniques for validation tasks can require significant resources and time due to the need to download and store blocks, maintain large UTXO pools and perform the necessary processing tasks for verification. Many users are either unable to meet such requirements or would prefer not to, possibly as they do not need to. Thus, there is a need for a faster, more efficient verification model which addresses at least these challenges (and others) without compromising security or requiring adaption of the existing protocol. Moreover, the means for verification must be scalable.
In addition to validation, other blockchain-related operations such as mining could benefit from a solution which enhances efficiency and facilitates scalability. For example, it is well known that mining-related tasks such as Proof-of-Work calculations are extremely 30 processor and energy intensive and are typically handled by expensive, dedicated machines which are specialise in performing the PoW task. Many users are unable to operate such equipment on a large enough scale to be able to compete effectively for the right to mine the next block. Others may simply not wish to be a miner, preferring instead to concentrate on other types of operation. Therefore, it would be advantageous if they could outsource this PoW calculation to other entities, either within or outside their own organisation and possibly located anywhere in the world, in a trustless manner. The would allow utilisation of mining resources in geographic locations which can provide environmentally friendly energy sources.
Such an improved solution has now been devised.
SUMMARY
Embodiments of the disclosure provide improved blockchain-related methods, devices and systems. In accordance with one form of wording, such embodiments provide 15 solutions for identifying and/or allocating the processing and/or storing of data associated with a UTXO that includes and/or enables validation.
Allocation and/or identification is based on a portion of data derived from a whole or at least a portion of a blockchain transaction e.g. the portion of data derived comprises transaction data, which can be an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. The data can additionally or alternatively comprise transaction data for determining the at least a portion of a transaction is included in the Merkle path of a blockchain block.
Moreover, a record of at least a portion of a transaction, which can be held in an allocated and/or identified resource, can comprise at least one of transaction data, a status flag, verification information, reference to at least one previous record e.g., the location, signatures and authorization data.
Configuring the record can improve the methods herein that comprise: the validation of transactions: the allocation and/or identification of a processing and/or storage resource. The record contents enable improvements in security and resilience, efficiency or reduction of speed and resource requirements when used, said use including verification of the transaction to which the record relates.
In accordance with one form of wording, such embodiments provide solutions for validating or mining blockchain transactions and/or partial or entire blockchain blocks. In accordance with additional or alternative forms of wording, they provide secure solutions for controlling, managing and/or enhancing the efficiency, resource requirements, speed and/or resilience of known approaches to processing of blockchain transactions. Embodiments also enable scalability of blockchain-implemented solutions, providing improved methods and technical architectures for electronic transfer of digital resources. Embodiments may also comprise methods for enabling and/or controlling calculation/generation of a Proof-of-Work for a blockchain block in a distributed and/or parallelised fashion. Embodiments of the disclosure may comprise methods and systems as described, illustrated and claimed herein in respect of the section entitled "Distributed Mining". Such embodiments may comprise techniques for authorising, controlling, establishing authorisation of, or otherwise formulating a request for generation of a Proof-of-Work (PoW) for a blockchain block that comprises a particular plurality (set) of transactions. Preferably, the set includes a transaction which comprises at least one portion of control data that a Proof-of-Work provider can use to determine whether or not the requested PoW effort should be initiated, undertaken and/or fulfilled. This may be called the "control transaction" (TX0). The request may also comprise data that the PoW provider can use to determine that TX0 is included in the plurality of transactions. In a preferred embodiment, this may comprise at least one or more of: a Merkle proof, the control transaction (TX0) and/or the root of the Merkle tree that represents the set of transactions. The PoW provider can process the request to ensure that a) the control transaction is included in the set and/or b) comprises the at least one portion of control data that can be used, in conjunction with at least one pre-specified rule, criteria or requirement, to determine whether or not the requested PoW effort should be initiated, undertaken and/or fulfilled.
In combination, the PoW requester and the PoW provider may provide a distributed blockchain mining node. Embodiments provide the ability to separate, distribute and parallelise the various functions and tasks involved in validating and/or mining blockchain transactions.
Embodiments of the disclosure provide improved blockchain-related methods, devices and systems. In accordance with one form of wording, such embodiments provide solutions for allocating the task of storing information associated with a UTXO that includes and/or enables validation. Following allocation, information e.g. at least a portion of the UTXO and/or the transaction (Tx) can be stored on one or more of a plurality of resources, which can be distributed.
Additionally or alternatively, the resources can be accessed to retrieve (i) confirmation of the validity of a UTXO and/or the associated transaction and/or (ii) data that enables the validity of the UTXO and/or the associated transaction to be determined.
In accordance with additional or alternative forms of wording, the embodiments provide secure solutions for controlling, managing and/or enhancing the efficiency, resource requirements, speed and/or resilience of known approaches to processing of blockchain transactions. Embodiments also enable scalability of blockchain-implemented solutions, providing improved methods and technical architectures for electronic transfer of digital resources.
Embodiments of the disclosure may be implemented in part or entirety by a variety of apparatus. These may be hardware and/or software-based apparatus, including (but not limited to) one or more virtual machines, servers, GPU-based computing resources, or 30 multiprocessor systems. Additionally, or alternatively, embodiments may comprise one or more digital wallets. Importantly, though, embodiments provide mechanisms for distributed processing of blockchain-related validation tasks. The coordination, management and control of distributed processes is known to be inherently technical in nature because it requires a holistic understanding of the interaction between the hardware and software components involved, and implementations of such distributed solutions extend beyond the technically trivial.
Embodiments may comprise solutions which enable or facilitate the efficient identification and/or allocation of a resource, which at least one of stores and validates information associated with each UTXO and/or transaction. Embodiments support the scaling of the systems and methods described herein by balancing the distribution of the information across the resources. Not only can this balance the distribution of information across resources, but the utilisation can be balanced e.g. accessibility of the information by users, which can inhibit bottlenecks.
Embodiments can comprise distribution of validation tasks across multiple processing resources, which we will refer to as "validators" for convenience. A validator may comprise a single processing resource or may comprise a plurality of related processing resources which can be viewed collectively as a validating resource.
In one example, when a block of transactions needs to be validated and/or downloaded, its Merkle tree may be decomposed into one or more smaller segments, each comprising a tree structure having its own root and representing a subset of the transactions in the block. These segments can then be allocated to different validators. Each validator is operative to perform the necessary processing tasks on the subset of transactions that have been assigned to it.
The allocation of tree segments to validators can be performed in a variety of ways, but in accordance with one advantageous embodiment, a binary indexing system can be used in 30 which the leading digits of the randomly generated, double-hashed Merkle root is used to assign a given segment to a validator (or group/cluster of validators) having a matching binary identifier. This provides a simple, efficient and quick mechanism for load balancing across the plurality of validators.
Allocation for processing and/or storing information associated with a UTXO can also be implemented based on a portion of data derived from a blockchain. Using this data, a resource is allocated and/or identified for processing and/or storing UTXO information. The methods used for identification/allocation support even distribution of information across a plurality of resources and/or scalability because it is based on pseudorandom data obtained from the blockchain. When information about a UTXO is required, the resource can be accessed to retrieve at least one of (i) confirmation of the validity of a UTXO and/or the associated transaction, (ii) data that enables the validity of the UTXO and/or the associated transaction to be determined, and (iii) an indication and/or proof of validation that the resource, or a validator, has performed.
In one or more embodiments, a validator may comprise or have access to a repository that records data relating to work that it has performed and/or data that it has processed. In one embodiment, this may include a database comprising unspent transaction outputs (UTX0s) that have been assigned to a given validator for processing. Recall that in the traditional model, all UTX05 on the blockchain are tracked by nodes in a database called a UTXO pool.
Each full node has its own, complete copy of the UTXO pool for the blockchain. In accordance with the present disclosures, (i) each validator can have its own UTXO pool that tracks UTX0s of transactions that have been assigned to it for validation, and/or (ii) a system, such as a node, can allocate the processing and/or storage of information to a resource based on a portion of data derived from a blockchain e.g. said data derived from said transaction and/or UTXO, said information providing an indication of the validity of the UTXO and/or enabling the validity to be determined e.g. using WV techniques.
Therefore, information associated with a (blockchain) transaction e.g. a UTXO, is stored as a record. The record can be stored in an allocated resource. The record can comprise at least some or all of the blockchain transactions in a blockchain block. The record can be used to provide, at least, information for determining the validity of a transaction. The record can comprise data that enables determination of a Merkle proofs and/or a Simplified Payment Verification (SPV) e.g. the record can be used to verify that a given transaction(s) are in a given block.
Advantages of such a distributed storage methods e.g. a transaction or UTXO storage, identification and allocation of resources e.g. pools include, but are not limited to, scalability, an assurance of data integrity, improved speed and efficiency, and incorporation of, and support for, a variety of validation techniques such as SPV. Embodiments can comprise one, some or all of the above noted aspects in combination to form a distributed system in which various components perform specific, dedicated functions related to blockchain activities or applications.
BRIEF DESCRIPTION OF THE DRAWINGS
To assist understanding of embodiments of the present disclosure and to show how such embodiments may be put into effect, reference is made, by way of example only, to the 20 accompanying drawings in which: Figure 1 is a schematic block diagram of a system for implementing a blockchain.
Figure 2 schematically illustrates some examples of transactions which may be recorded in a blockchain.
Figure 3 provides an illustration of a general Merkle tree structure as known in the art.
Figure 4 illustrates how a Merkle root can be derived from a set of blockchain 30 transactions, as known in the art.
Figure 5 provides an example of how a Merkle tree can be divided into subsets (or "segments") which may then be allocated to respective validation resources in accordance with an embodiment of the disclosure.
Figure 6 illustrates an alternative example to Figure 5 of how a Merkle tree may be divided into logical segments.
Figure 7 illustrates, at system level, a distributed validation node in accordance with an
illustrative embodiment of the disclosure.
Figure 8 is a flow chart showing, at high level, the steps involved in an illustrative method of the disclosure.
Figure 9 is a diagram showing the example system of Figure 7 in more detail.
Figure 10 is a schematic diagram of an example of the invention, including the identification and/or allocation of a resource that generates, stores or maintains a database of information associated with a transaction e.g. an unspent transaction output 20 (UTXO) and/or a transaction (Tx) containing a UTXO.
Figures 11(a) to 11(d) are tables indicating examples of values derived from portions of data that are used to identify determine an allocated resource.
Figure 12 is a schematic of a system including a node, intermediary switch and allocated resources, said resources having optional validators.
Figure 13 is a schematic illustration of two transactions, which have a position within a Merkle Tree of a blockchain block, said transactions having an allocated resource, and the 30 allocated resources hold corresponding records.
Figure 14 provides a high-level overview of an embodiment of the disclosure with relation to the "distributed mining" aspect of the disclosure, and enumerated clause set 7.
Figure 15 provides an illustration of the traditional approach to validation and mining activities that are performed by a node on a blockchain network, as known in the art.
Figure 16 shows an illustration of how the traditional tasks of Figure 2 can be distributed across different entities in accordance with an embodiment of the disclosure.
Figure 17 shows an example of typical tasks performed by a PoW requester in accordance with an embodiment of the disclosure.
Figure 18 shows an example of typical tasks performed by a PoW provider in accordance 15 with an embodiment of the disclosure.
Figure 19 illustrates a distributed mining node in accordance with an illustrative embodiment of the disclosure.
Figure 20 provides an illustration of a wider system in accordance with an embodiment of the disclosure, in which the system of figure 9 forms one possible component.
DETAILED DESCRIPTION
We now describe example embodiments of various aspects of the disclosure for the purpose of illustration, without limitation, and with reference to the accompanying Figures.
The disclosure provides embodiments which enable improved validation, mining, storage, search, processing and distribution of data stored in, or utilised by, a blockchain-related 30 system. This system can include various components which provide different functionalities. These functionalities combine to form an improved blockchain-based solution.
In particular, embodiments disclosed and described herein and illustrated in Figure 20 5 form a system 2000 that comprises multiple components (700, 19.1000, 1100 and/or 2100) which can be used to advantage in combination with each other and which play a role in distributed process of blockchain-related data.
From one perspective, the disclosure provides a means for processing and/or storing information in relation to an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO can be implemented using different systems and methods, which can be configured and/or executed individually. Described below are examples of a 'UTXO database' and 'block validation', each of which allocate tasks to resources e.g. distributed resources, said tasks including storing and/or validating one or more transactions.
Examples of allocating/identifying a resource in which information e.g. a record is allocated to a resource described below in relation to a 'UTXO database'. Also described below are examples of validating transactions, and the techniques/management of validation e.g. 'block validation'.
Additionally or alternatively to the examples of 'allocation' and/or 'validation', at least one example includes generating, storing, processing, accessing and/or maintaining a record of at least a portion of a transaction (Tx). The information stored in relation to a transaction i.e. the record, can be used to at least support the validation of the transaction. By way of example, the record can include transaction data for determining the at least a portion of a transaction is included in the Merkle path of a blockchain block.
In light of the teaching herein features of the examples can be combined.
RECORDS
Features disclosed in this section may be implemented in hardware and/or software so as to form a record storage component 2100 as shown in the system 2000 of Figure 20. Figure 13 illustrates two transactions derived from a blockchain 150. An example of a 5 method herein at least one of generates, stores, processes, accesses and maintains a record of at least a portion of a transaction (Tx) in one of a plurality of resources 1104. The allocation and/or identification of the resource corresponding to each transaction is described below in relation to the UTXO database, which uses, by way of example, hash-table techniques for allocation. The resource 1104 can be one of a plurality of resources 10 making up a database.
Figure 13 illustrates two Merkle Trees, built using the set of transactions in a block, to determine a Merkle root that is included in the block header. Each of the transactions, Tx n and Txn+i are part of the respective Merkle Trees, as described below in relation to Figure 4, at least.
A record comprises transaction data for determining the at least a portion of a transaction e.g. Tx n or Txn+i is included in the Merkle path of a blockchain block (B). Alone or in combination with the examples taught herein, the record holds data that enables efficient and cost effective reference and/or retrieval of information associated with a transaction. In particular, the information held in the record enables a third party wishing to verify a transaction to identify the allocated resource in which associated records are held, and retrieve transaction data for determining the at least a portion of the transaction is included in the Merkle path of a blockchain block (B). For example, the record holds a Merkle proof that the transaction is part of the Merkle tree that determined the Merkle root of the block in which the transaction is recorded.
The record can hold a set of data associated with the transaction. The records can, for example, be abbreviated and/or include concatenated data for efficient storage. The 30 information in the record can be configured for reference. For example, the record can comprise a data catalogue. The data catalogue can be structured e.g. indexed, for selective identification and/or retrieval of information associated with the transaction. The data catalogue can hold a set of transaction data e.g. a Merkle proof that enables simplified payment verification (SPV).
The record, which can include a data catalogue, can be managed by the resource and/or a validator 1106. The record functions to hold information that can be stored/associated with a transaction e.g. a UTXO, for at least one of validation, status indication, holding signatures and transactional states. By way of example, a record can include at least a portion of script defining an "OP_PUSH_TX" to place conditions upon a transaction. The record, therefore, can provide a catalogue or library of information associated with a transaction.
The output of the transaction can be an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO of a blockchain block. The record is not limited to the output of a transaction, as suggested by the UTXO and OP_PUSH_TX records, and the at least a portion of a transaction (Tx) can include the output, input and/or any other parameters of the transaction.
The record can be stored in any suitable type of digital storage resource. For example, a database of any suitable known type can be used. The database can include a plurality of resources 1104 and/or validators 1106. A record can include a blockchain transaction (TXO) comprising at least one data item (D). Additionally or alternatively a record can include at least one further blockchain transaction (TX1) necessary for confirming whether the blockchain transaction (TX1) is (or is not) included in the Merkle path of a blockchain block (B).
The record, which can be a data catalogue, can be stored in a database or spread across a plurality of databases. The databases in themselves can be distributed across a plurality 30 of resources 1104. The storage of records e.g., information and/or data as taught herein can be applied to and/or support the efficient allocation, referencing and accessing of records associated with nodes e.g., a Metanet node, and the associated Metanet protocol.
The following applications are incorporated herein by reference in their entirety: - PCT/IB2019/059793, which relates to indexing and structuring nodes - PCT/IB2019/059795, which supports mapping of categories to mnemonics e.g. cataloging.
- PCT/IB2019/059791, which supports searching a locating resources.
-PCT/IB2019/059803, which supports wallets, blockchain search systems, block explorers etc. that enables a user to search for/access/view/write/retrieve a portion of data that's included in a Metanet node e.g. a transaction, and can identify a Metanet node based on its Metanet index.
- PCT/IB2019/060226; PCT/IB2019/059807, which supports splitting data over multiple nodes.
- PCT/IB2019/059808, which supports splitting records over multiple transaction inputs and multiple transaction outputs, in particular node attributes.
- PCT/IB2019/059809, in which an atomic swap e.g. a conditional exchange is established between two or more parties.
Using the database and/or record and/or information can comprise generating, maintaining, providing, updating, storing, accessing or processing: i) the database; and/or ii) the data/record/information that is stored within, or in association with, the database. The database is stored in or across one or more resources, and the data, record, or information that is stored within the database is processed and/or stored in an allocated resource (1104).
Additionally or alternatively to the record comprising transaction data for determining whether the at least a portion of a transaction (Tx) is included in the Merkle path of a 30 blockchain block (B), the record can hold a Merkle path from the transaction (TXO) to a root of a Merkle tree for the blockchain block (B). The Merkle path can comprise at least the minimum blockchain transactions necessary to establish or verify that the blockchain transaction (TXO) is included in the blockchain block (B). The records herein provide an efficient and effective means for validating a transaction. In combination with the allocation and identification of a resource in which the record is held and/or the validation techniques herein, an improved system for managing and/or using transaction data. Transactions can be derived from a blockchain block.
The blockchain transaction (TXO) can be used alone or in combination with the at least one further blockchain transaction (TX1) to verify that the blockchain transaction (TXO) is included in the Merkle path of the blockchain block (B). The data item (D), which can be part of the record or information stored in the allocated resource, can be at least one of: stored in association with a script in the transaction; and stored as metadata within the transaction. Overall, the record comprises validation data required to validate a transaction e.g., an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
The blockchain block can be stored on or in association with: a blockchain ledger; and/or an off-chain storage resource.
The record can comprise a history of at least one preceding transaction i.e. transaction data for at least one preceding transaction. The history can include a transaction of an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. The at least one preceding transaction can be the previous transaction to the last transaction.
The record further can comprise a history of the allocated resources that processed and/or stored at least the previous transaction. The record can include a link to the allocated resource holding the previous transaction. The record can hold a history of a plurality of preceding transactions of the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
In this way, the history enables a third party using the record to retrieve the latest transaction and, if required, efficiently identify the previous transaction without performing a further look-up or search. The history can provide a back-catalogue or set of shortcuts to key records, data or information. The history can include at least one of: a set of transaction data for determining a Merkle proof of the plurality of preceding transactions; a link to the respective allocated resources that processed and/or stored the plurality of preceding transactions.
With reference to Figure 13, a first transaction Tx, is followed by a second transaction Tx,n. In the example, the first and second transaction have associated records stored in different allocated resources 1104, although they could both be stored at different addresses in the same allocated resource. The record of the second transaction can include, at least, a link to the address of the first transaction in an allocated resource. The record of the second transaction can include, at least in part, a record of the transaction data of the first transaction. The record of the second transaction can include a record of transaction data for a plurality of preceding transactions.
The record can comprise a flag and/or status indication of the transaction data e.g. the or 20 each input of the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. By way of example, the indications can be one of 'seen', 'in-block' and 'double-spend', thus providing an efficient reference to the status of transaction data.
The record can hold any number of transaction data information and/or supplementary data e.g. validation data. Using the record provides an alternative to searching, identifying and processing transaction data that is on-chain. The record can consolidate key data thus minimising the computational cost of using transactions and performing operations using a blockchain and blockchain blocks. The record can further comprises at least one of: a Merkle Tree of the block in which said transaction (Tx) is recorded; the Merkle root the block in which said transaction (Tx) is recorded; a Merkle path, which enables the determination of the value for the Merkle root for the block in which said transaction (Tx) is recorded, from a hash of said transaction (Tx); a Merkle proof; a block identifier (block_ID) associated with the blockchain block; a transaction identifier (TxID) associated with a transaction (Tx) in the plurality of blockchain transactions within the blockchain block; a function of the block identifier (block_ID) and the transaction identifier (TxID); a concatenation of the block identifier (block_ID) and the transaction identifier (TxID); a digital signature; an authentication code; and a signature message for determining a transactional state.
1 0 The allocated resource for processing and/or storage of the record can be identified and/or allocated using a portion of data derived from a blockchain to identify and/or allocate a resource, wherein said data from which the portion of data is derived comprises transaction data e.g. the unspent transaction output (UTXO) and/or the transaction (Tx) containing a UTXO.
The examples herein, and the associated systems, enable using a database comprising at least one record, the at least one record comprising: a blockchain transaction (TXO) comprising at least one data item (D); and at least one further blockchain transaction (TX1) necessary for confirming that the blockchain transaction (TX1) is included in the Merkle path of a blockchain block (B).
Using the database comprises generating, maintaining, providing, updating, storing, accessing or processing: the database; and/or data that is stored within, or in association with, the database. The record can further comprise a Merkle path from the transaction (TXO) to a root of a Merkle tree for the blockchain block (B). The Merkle path can comprise at least the minimum blockchain transactions necessary to establish or verify that the blockchain transaction (TXO) is included in the blockchain block (B).
The methods herein can use the blockchain transaction (TXO) and the at least one further blockchain transaction (TX1) to verify that the blockchain transaction (TXO) is included in the Merkle path of the blockchain block (B).
Said data item (D) can be stored in association with a script in the transaction; and/or can be stored as metadata within the transaction.
The transaction can further comprise at least one of: a transaction ID (TxID); a protocol flag; a discretionary public key (DPK); and a discretionary transaction ID (DTxID).
The above-mentioned records e.g. information and data associated with a transaction, derived from the transaction or in connection with the transaction can be stored in an allocated resource using the methods described below.
UTXO DATABASE
Features disclosed in this section may be implemented in hardware and/or software so as to form a resource allocation component 1100 as shown in the system 2000 of Figure 20. Figures 10 to 12 illustrate, respectively, stages of a method in which data is derived from a blockchain, tables used for allocation to a resources 1104 and an illustration of a system 1100 for implementing the method. System 1100 may form a sub-system or component of larger system 2000 of Figure 20.
In accordance with this aspect of the disclosure, data is obtained from a peer-to-peer (P2P) network 106 and/or a blockchain 150. At s1000 data can be obtained or retrieved e.g. by requesting and obtaining one of more blocks from the blockchain 150. Retrieving can include downloading at least part of a blockchain block that comprises a plurality of blockchain transactions. Retrieving or otherwise obtaining data e.g. obtaining, copying or reading data from blockchain block is required when data is required to establish a stored and/or process historical e.g. already recorded in a block 151 transaction data related to an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. UTXO currently in the mempool or future transactions and UTXO can be received via a connection to the network e.g. by implementing a node 104 that receives transactions broadcast on the network.
Overall, therefore, the system 1100 of Figure 12 uses a portion of data derived from a blockchain, and determines a key and allocates a corresponding resource that will store information associated with said data e.g. information associated with an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. To be clear, information associated with the data derived from the blockchain is to be stored in a resource for efficient and cost effective reference. The data can include an unspent 1 0 transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. A portion of that data is used to determine a key, which in turn determines an allocated resource that will store information about said data. In this context, the term "key" can be used in the sense of an "index", rather than in the sense of a cryptographic key. The terms "index" or "identifier" can be substituted for "key".
The data from which the portion of data is derived comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. At s1002, a portion of said data is used to identify or allocate a corresponding resource 1104 e.g. an allocated resource. At s1004, the resource 1104 operates to at least one of generate, store and maintain a database of information, wherein said information includes data associated with the UTXO and/or transaction. The information can comprise an indication of the validity of the UTXO and/or enabling the validity to be determined e.g. using SPV techniques. The information about the data can include, by way of example, details of the block from which it was obtained e.g. the block ID, the Merkle path of the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO, the status of the validity of all UTX05 within a transaction.
The resource 1104 can operate to store information that can be used by others to validate UTXO and/or process the data to generate an indication e.g. a flag that indicates 30 the validity. Additionally or alternatively, the resource 1104 can delegate the determination of the validity of a transaction or UTXO at 51006 to a validator 1106. Storing and/or processing at least a portion of the UTXO and/or the transaction (Tx) can be implemented: in the allocated resource e.g. the resource 1104 actively manages the information and maintains the database associated with each UTXO therein e.g. the resource can self-govern; and/or by the allocated resource e.g. the resource acts as a controller and functions as a system 1100 managing sub-resources to store and/or process the information; and/or in association with the allocated resource e.g. the resource 1104 operates as part of the system 1100, as shown in Figure 12, in which, by way of non-limiting example, a node 104 provides transaction and UTXO information to a switch 1102 e.g. a router, that operates to determine which resource 1104 from amongst a plurality of resources is allocated the task of generating, holding and/or storing UTXO information in a database. Overall, a resource can implement and perform one of more of the operations in Figure 10. Figure 12 illustrates a system 1100 having components to perform the operations of Figure 10 individually.
In one example, the task of holding information associated with a UTXO is allocated to one resource from a group of resources in the system 1100. Figure 12, by way of example, illustrates 8 resources, each of which share the information from the UTXO between them. The system, however, can hold any number of resources and is scalable e.g. the system can have 16, 256 or 1024 resources. Each resource, therefore, is allocated a range of UTXO to process, store and/or maintain.
A portion of the data from an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO can be retrieved and/or received and parsed. Parsing determines which resource is allocated the task of storing information. The parsing can be performed by the resource 1104 or the switch 1102. At least one of the node 104, switch 1102 and resource 1104 can derive the portion of data from the blockchain. When parsing is performed by the node104 or switch 1102, information is directed to the allocated resource. Identification and/or allocation to the processing and/or storage resource can be performed by the node and/or switch, which function as an intermediary. They are connected to a plurality of allocated resources, said node or switch operating as a manager of many resources 1104 that determines which resource looks after which UTXO/Tx. When parsing is performed by the resource 1104 it processes said data and/or stores information derived from said data, or stores data associated with said data, or takes no action if it is not responsible for the UTXO.
When the allocation of the resource 1104 is determined, e.g. it is determined where information associated with a UTXO/Tx will be held, the resource 1104 can perform the operation of s1004 and generate, store and/or maintain information associated with an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. The resource 1104 can process data received to determine the validity of a UTXO/Tx e.g. s1006 or delegate that task to a validator 1106. The resource 1104 and/or the validator 1106 can validate, at least in part, the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
The data that is obtained from the peer-to-peer (P2P) network 106 and/or a blockchain 150. The data can be obtained by a node 104 and/or a switch 1102, which then allocates the data to a resource, or data can be obtained by the resource 1104 itself, which searches and parses data according to the range of UTXO/Tx it is allocated. The data obtained can includes at least one of: a UTXO identifier; a hash of the UTXO script; the transaction identification (TXID).
The data obtained relates to a UTXO or transaction having a UTXO functions to provide a key (i.e. index or identifier) that identifies and/or allocates a resource where corresponding information is to be stored, maintained or generated. The key is determined either directly, by using a portion of the data e.g. the key determines the allocated resource, or indirectly, by processing e.g. hashing a portion of the data such that the resulting hash determines the allocated resource.
The key is used to determine which resource 1104 will hold corresponding information associated with the key. The resource, therefore, holds a data structure e.g. a database or hash table that implements an associate array. In other words, data associated with a UTXO and/or transaction is used to determine a key, and said key is used to determine a resource that holds information associated with the UTXO and/or transaction. Not only does the data and key enable a resource to be allocated, but the information stored can be retrieved by using the key to look-up and access said information.
At least one of the data, the key, and the resulting hash comprises at least one of: an 10 alphanumeric number; and a binary number. The number is used to determine the allocated resource.
By way of example, the portion of data comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. An input to a transaction includes: a transaction ID, which references the transaction that contains the UTXO being spent; an output index e.g. Vout, which identifies which UTXO for that transaction is referenced; a scriptSig, which satisfies the conditions placed on the UTXO, for unlocking it; and a sequence number.
A potential recipient of the UTXO needs to validate the UTXO before the transaction spending said UTXO is compiled and broadcast. Known techniques for validation are slow, resource heavy and computationally expensive. By using a portion of data from the UTXO and/or the associated transaction information that validates or enables validation of the UTXO can be stored in a resource. Using a portion of data that is unique to the UTXO a key can be determined, which subsequently determines in which allocated resource the associated information can be stored, and subsequently be retrieved from.
Using the transaction identification (TxID) as a non-limiting example, the TxID is commonly referred to in its hexadecimal form, and can also be represented as a binary 30 number. Figures 11(a) to (d) are tables indicating how a portion of the data can be used to determine an allocated resource. The portion of data e.g. TxID can be parsed directly or processed e.g. hashed. In Figure 11(a), the TxID is parsed such that the first 3 digits of the TxID in binary form are selected as a key, and the resource allocated according to the binary value e.g. information associated with a TxID having a binary number with '101' as the first three digits is allocated for storage/processing in allocated resource '6'. Using the first three digits binary enables one of eight resources to be determined, while Figure 11(c) indicates how taking the first four digits from a TxID in binary form supports allocation between 16 resources e.g. information associated with a TxID beginning with binary number with '1011' as the first four digits is allocated for storage/processing in allocated resource '12'. Alternatively, the hexadecimal value of the TxID can be used, as indicated in Figure 11(b), in which a single hex value maps to a resource e.g. 'c' to '13', and in Figure 11(d), in which a range of hex values are allocated a resource e.g. information associated with a TxID beginning '76' is allocated to resource '8'.
Alternatively, a portion of the data can be processed e.g. hashed, to produce a hexadecimal or binary number, so the portion of data and subsequent determination of a key to identify/allocate the resource 1104 is not limited to the TxID.
The portion of data selected from a transaction or its UTXO, or the processed value e.g. hashed value, is pseudorandom. The allocation to resources is load balanced i.e. the portion of data that is used to determine a key for allocating a resource is pseudorandom and distributes processing and/or storage between the plurality of resources. It follows that information associated with the transaction/UTX0 is distributed across the plurality of resources. The balancing of allocation between the resources minimises the risk of some processing resources lying idle while others become overloaded and thus risk degradation of performance or even failure. The resilience, performance and/or efficiency of the system 1100 is improved.
The data, and portion of data, therefore, can be used to (i) determine the allocated resource, and thereafter (ii) provide a reference for identifying the resource and/or information associated with the data within the resource e.g. within a database.
It follows that the portion of data is derived from a blockchain, and determines a key and corresponding resource that will store information associated with said data i.e. information associated with an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
An actor seeking verification of the validity of a UTXO can use a portion of the UTXO and/or transaction holding said UTXO to identify a resource holding information that can be used to determine the validity of the UTXO and/or transaction. The information can include a flag or marker is associated with the and indicates whether the UTXO is locked or unlocked e.g. invalid or valid e.g. suitable for inclusion in a subsequent transaction.
The information can additionally or alternatively include records of the UTXO and/or transaction holding said UTXO that enable an actor to efficiently and independently validate the UTXO.
Records can include, at least in part, at least one of: a Merkle Tree of the block in which said transaction (Tx) is recorded; the Merkle root the block in which said transaction (Tx) is recorded; a Merkle path, which enables the determination of the value for the Merkle root for the block in which said transaction (Tx) is recorded, from a hash of said transaction (Tx); a Merkle proof; a block identifier (block_ID) associated with the blockchain block; a transaction identifier (TxID) associated with a transaction (Tx) in the plurality; of blockchain transactions within the blockchain block; a function of the block identifier (block_ID) and the transaction identifier (TxID); and a concatenation of the block identifier (block_ID) and the transaction identifier (TxID).
The resource can include information and records required to determine the validity of a UTXO. Additionally or alternatively, the resource can itself, or via validation s1006 by a validator 1106, generate records that validate and/or support the validation of UTXO. The resource 1104 and/or the validator 1106 can at least one of: validate and/or verifying said UTXO; perform at least part of a Simplified Payment Verification (SPV) process for said UTXO; confirm whether a given blockchain transaction (Tx) is contained within the blockchain block; generate a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier (TxID) in a header of the blockchain block; and determine a Merkle proof for said UTXO.
By providing a means for identifying an allocated resource 1104 from a UTXO/transaction, and storing information required to validate said UTXO in said resource, an alternative method for validating a UTXO is provided that is efficient and scalable. No longer does a node need to hold a complete copy of the blockchain, and additional information is no longer required to support transactions e.g. SPV-based exchanges and wallets, the system 1100 and the resources 1104 therein provide rapid and scalable support.
Overall, the system 1100 comprises a resource 1104 that operates to provide a UTXO repository for generating, storing and/or maintaining information and/or records associated with a plurality of unspent transaction outputs (UTX0s), each associated with a transaction (Tx) in a plurality of blockchain transactions (TXs) of a blockchain block. The resource can record, search and/or process information and/or records by using a portion of data derived from a blockchain to identify and/or allocate said resource, wherein said data from which the portion of data is derived comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
The system 1100 can include a node 104 and/or a switch 1102 for receiving and/or processing an unspent transaction output (UTXO) for inclusion in a transaction. The node and/or switch can support the resource and determine allocation to a resource amongst a plurality of resources. The allocated resource then holds validation data e.g. information and/or records for the UTXO.
After receiving a UTXO for inclusion in a transaction e.g. as part of payment or the transfer of a digital asset, validation information and/or records can be requested and/or obtained by an actor from the allocated resource.
Upon the actor accessing the information and/or records from the allocated resource that actor can at least one of: validate the UTXO and/or the transaction (Tx) containing said UTXO; and/or determine the validity of the UTXO and/or the transaction (Tx) containing said UTXO. Validation, by at least one of the resource 1104, validator 1106 and the actor can comprise: validating and/or verifying at least one blockchain transaction; and/or ii) performing a Simplified Payment Verification (SPV) process; and/or iii) confirming whether a given blockchain transaction (Tx) is contained within the blockchain block; and/or iii) generating a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier (TxID) in a header of the blockchain block.
Thereafter, following validation of the UTXO, said actor or a further actor can prepare and/or transmit a transaction (Tx) having said UTXO as an input.
A node 104 can be configured to at least one of generate, store and maintain a UTXO resource for recording, searching and/or processing a plurality of unspent transaction outputs (UTX0s), wherein said node processes a portion of data derived from a blockchain to identify and/or allocate a processing and/or storage resource. The data from which the portion of data is derived comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
BLOCK VALIDATION
Traditionally, nodes in a blockchain network maintain a global ledger of all transactions on the blockchain. The global ledger is a distributed ledger and each node may store a 30 complete or partial copy of the global ledger. Transactions by a node affecting the global ledger are verified by other nodes so that the validity and integrity of the global ledger is maintained. The details of implementing and operating a blockchain network, such as one using the Bitcoin protocol, will be appreciated by those ordinarily skilled in the art.
Each transaction typically has one or more inputs and one or more outputs. Scripts embedded into the inputs and outputs specify how and by whom the outputs of the transactions can be accessed. The output of a transaction may be an address to which control of a value is transferred as a result of the transaction. That value is then associated with that output address as an unspent transaction output (UTXO). A subsequent transaction may then reference that address as an input in order to obtain control or ownership of that value.
As noted above, using the Bitcoin network and protocol as our example, mining nodes compete in a race to create the next block in the blockchain. To assemble a block, a miner will build the block as a set of transactions from the pool of unconfirmed transactions (the "mempool"). It then attempts to complete a proof of work (PoW) puzzle with respect to the block it has assembled. If it manages to complete the PoW prior to receiving notice that any other miner has succeeded in generating its own block and completing its PoW, then the miner propagates its block by sending it to peer nodes on the network. Those nodes validate the block and then send it further on in the network to other nodes. If the miner receives notice that another block has been completed prior to finishing its own PoW, then the miner abandons its efforts and begins trying to build the next block.
Thus, fast propagation of blocks helps to avoid wasted effort (and associated energy) on behalf of miners and validating nodes. By providing a solution which enables faster validation and thus propagation of blocks, the present invention provides an enhanced network performance. It reduces the amount of computing time and effort required, and thus the amount of energy required by the network. It provides a network which is more efficient in terms of resources and time. It provides, ultimately, an improved (blockchain) network.
In current implementations of blockchain, such as the Bitcoin network, each node that receives a block first validates the block before sending it to other nodes. The time taken to validate a block slows propagation of the block through the network. Note that some implementations of blockchain, including evolutions of existing protocols, may provide for block validation by only a subset of nodes rather than each node in the network; however, block validation at most nodes is still likely to be a feature of any blockchain implementation to prevent invalid blocks from propagating through the network.
Validating a block involves confirming that the block meets prescribed criteria set by the applicable blockchain protocol. Example criteria applicable to the Bitcoin protocol may include functions such as CheckBlock and CheckBlockHeoder. In addition to confirming that the block itself conforms to prescribed criteria, each transaction within the block may be assessed for compliance with transaction-level criteria. As an example, the transaction-level criteria applied in the Bitcoin protocol may include the functions Accept ToMemoryPool, CheckTransoction and Checkinputs.
Specific examples of block-level criteria, based on the Bitcoin protocol, may include: * The block data structure is syntactically valid.
* The block header hash is less than the target difficulty (enforcing the proof of work).
* The block timestamp is less than two hours in the future (allowing for time errors).
* The block size is within acceptable limits.
* The first transaction (and only the first) is a coinbase generation transaction.
* All transactions within the block are valid.
Specific examples of transaction-level criteria, based on the Bitcoin protocol, may include: * The transaction's syntax and data structure must be correct.
* Neither the list of inputs nor of outputs are empty.
* Each output value x, as well as the total of all outputs, must be within the range 0 <x < 21.106.
* None of the inputs have null hash.
* nLockTime is less than or equal to INT MAX.
* The transaction size in bytes is greater than or equal to a minimum and less than a maximum.
* The number of signature operations is less than the signature operation limit.
* The unlocking script scriptSig can only push numbers on the stack, and the locking script scriptPubkey must match isStandard forms.
* For each input, if the referenced output exists in any other transaction in the pool, the transaction must be rejected.
* For each input, if the referenced output transaction is a coinbase output, it must have at least COINBASE MATURITY (100) confirmations.
* For each input, the referenced output must exist and cannot already be spent.
* Using the referenced output transactions to get input values, check that each input value, as well as the sum, are in the allowed range of values x, i.e. 0< x< 21.106.
* A matching transaction in the pool, or in a block in the main branch, must exist.
* The sum of input values must be equal to or more than the sum of output values.
* The transaction fee must be sufficient to gain entry to an empty block.
* The unlocking scripts for each input must validate against the corresponding output locking scripts.
These example criteria are illustrative and should not be interpreted as sufficient or necessary to all embodiments as the prescribed criteria may differ in different protocols and may change over time for a given protocol if changes are made to the protocol. In general, transaction-level validation criteria are those prescribed characteristics which a transaction must have to be considered valid under the applicable blockchain protocol. Similarly, the block-level validation criteria are those prescribed characteristics which a block must have to be considered valid under the applicable blockchain protocol.
In accordance with the present application methods and devices are described that speed up block validation so as to facilitate faster propagation of blocks in the network.
In one aspect, the present application describes a node structured to validate blocks by performing at least transaction-level validation of individual transactions in parallel and/or in a distributed fashion. However, certain transaction-level criteria may not be evaluated in parallel. For example, the uniqueness of UTX05 may be evaluated on a serial basis. In such cases, the distributed validation node of the present disclosure may be structured or arranged to confirm the uniqueness of the referenced inputs (UTX0s) of the transactions prior to allocating the sets of transactions among a set of two or more parallel processors for validation of the remaining transaction-level criteria.
In particular, embodiments of the present disclosure provide improved verification and security solutions for processing related or associated data records that are stored in a tree structure. The tree can be a binary tree or a mesh structure. As known in the art, tree structures can be decomposed into smaller trees (which may be referred to herein as tree "segments", "subsets" or "portions"), where each segment comprises a subset of the data records in the overall tree and has its own root. Advantageously, embodiments of the disclosure utilise this feature to provide methods and systems for distribution and parallelisation of processing of the related data records across multiple processing resources.
In our example embodiment, the plurality of data records comprises blockchain transactions which are related because they form nodes within a Merkle tree. The Merkle tree has a root which has been, or can be, included in a header of a block of the transactions in accordance with a blockchain protocol, such that the root provides a path that can be followed to every leaf (i.e. transaction ID (TxID)) within the tree. In our example, the blockchain protocol is, or is derived from, the Bitcoin protocol although other protocols fall within the scope of the disclosure.
In one example, processing of the plurality of transactions comprises validating at least a portion of a blockchain block that comprises the plurality of blockchain transactions and the root of the Merkle tree for the block. These examples are non-limiting and techniques disclosed herein may be utilized in respect of non-blockchain related data, and/or in respect of other processes besides validation. For example, embodiments may be used to stored, structure, search and/or maintain any type of data record that can be represented in a Merkle tree. Databases and other known storage resources may be utilized instead of, or as well as, the blockchain ledger.
In another example embodiment, processing of the plurality of transactions comprises downloading at least a portion of a blockchain block that comprises the plurality of blockchain transactions and the root of the Merkle tree for the block.
For completeness, and with reference to Figures 3 and 4, we now provide a discussion of Merkle trees and their use in representing blocks of blockchain transactions.
MERKLE TREES
With reference to Figure 3, Merkle Trees are hierarchical data structures that enable secure verification of collections of data. In a Merkle tree, each node in the tree has been given an index pair (0) and is represented as NO,j). The indices i,j are simply numerical labels that are related to a specific position in the tree.
A feature of the Merkle tree is that the construction of each of its nodes is governed by 30 the following equations 11(D1) = j NO,]) { k) II N (k + 1,])) ' where and H is a cryptographic hash function.
An example of a binary Merkle tree constructed according to these equations is shown in Figure 3. As shown, we can see that the i = j case corresponds to a leaf node, which is simply the hash of the corresponding ith packet of data Di. The i j case corresponds to an internal or parent node, which is generated by recursively hashing and concatenating child nodes until one parent (the Merkle root) is found.
For example, the node N(0,3) is constructed from the four data packets Do, ... ,B3 as N(0,3) = 1-10(0,1) II N(2,3)) = 11-4N(0,0) II N(1,1)) II 1-0(2,2) II N(3,3))1 = [11(11(D0) II 11(D1)) II 11(1-1(D2) II 11(D3))].
The tree depth M is defined as the lowest level of nodes in the tree, and the depth in of a node is the level at which the node exists. For example, m00 = 0 and micar = M, where 20 M = 3 in Figure 3.
For Merkle trees in Bitcoin and some other blockchains, the hash function is double SHA256, which is to apply the standard hash function SHA-256 twice: 11(x) = 5HA256(SHA256(x)).
The primary function of a Merkle tree is to verify that some data packet Di is a member of a list or set of N data packets V E [D0, ...,DN_Jj. The mechanism for verification is known as a Merkle proof and involves obtaining a set of hashes known as the Merkle path for a given data packet Di and Merkle root R. The Merkle proof for a data packet is simply the minimum list of hashes required to reconstruct the root R by way of repeated hashing and concatenation, often referred to as the 'authentication proof'.
A proof of existence could be performed trivially if all packets Do, ...,DN_1 and their order are known to the prover. This does however require a much larger storage overhead than the Merkle proof, as well as requiring that the entire data set is available to the prover. The comparison between using a Merkle proof and using the entire list is shown in the table below, where we have used a binary Merkle tree and assumed that the number of data blocks N is exactly equal to an integer power 2.
The following table shows the relationship between the number of leaf nodes in a Merkle tree and the number of hashes required for a Merkle proof (or Merkle proof).
Merkle tree No. data packets 32 256 1024 1048576 N = 2m No. hashes required for proof of existence 5 8 10 20 M = log2 N b In this simplified scenario -where the number of data packets is equal to the number of leaf nodes -we find that the number of hash values required to compute a Merkle proof scales logarithmically. It is clearly far more efficient and practical to compute a Merkle proof involving log2 N hashes than to store N data hashes and compute the explicit proof.
If, given a Merkle root R, we wish to prove that the data block Do belongs to the ordered list D E {Do, ..., DN_i} represented by!? we can perform a Merkle proof as follows Obtain the Merkle root R from a trusted source.
Obtain the Merkle proof 1-' from a source. In this case, F is the set of hashes: = {N(1,1), N(2,3), N(4,7)}.
Compute a Merkle proof using D1 and r as follows: a. Hash the data block to obtain: /V(0,0) = H(D0).
b. Concatenate with N(1,1) and hash to obtain: N(0,1) = 1-10/(0,0) II N(1,1)).
c. Concatenate with N(2,3) and hash to obtain: N(0,3) = 110/(0,1) II N(2,3)).
d. Concatenate with N(4,7) and hash to obtain the root: N(0,7) = 110/(0,3) II R' = N(0,7).
e. Compare the calculated root R' with the root R obtained in (i): 1. If R' = R, the existence of Do in the tree and therefore the data set D is confirmed.
2. If R' # R, the proof has failed and Do is not confirmed to be a member of D. This is an efficient mechanism for providing a proof of existence for some data as part of the data set represented by a Merkle tree and its root. For example, if the data Do corresponded to a blockchain transaction and the root R is publicly available as part of a 20 block header then we can quickly prove that the transaction was included in that block.
SPV
Simplified Payment Verification (SPV) takes advantage of these features of the Merkle tree, as first set out in section 8 of Satoshi Nakamoto's 2008 whitepaper "Bitcoin: A Peer-to-Peer Electronic Cash System". In a SPV-based exchange of cryptocurrency between Alice and Bob, both parties use the same type of SPV wallet. The SPV wallet stores the user's private and public keys, unspent transactions and block headers which uniquely identify the blocks so they can be located on the blockchain. As explained, a block header comprises fields of data which provide a unique summary or fingerprint of the entire block's contents as well as a field that provides the Merkle root for that block. The Merkle root is generated by repeatedly hashing together pairs of transaction IDs (TxIDs) from the block until a single hash is finally arrived at. The Merkle root provides an efficient and secure mechanism for verifying that a transaction is part of a block because it allows users such as wallets and merchant nodes to locally verify a particular transaction without downloading the whole 5 blockchain. This is advantageous for users who do not need or wish to run a full node but simply need to perform a localised check that a certain transaction is in a particular block e.g. parties such as merchants and customers who wish to perform a transfer between them. In summary, SPV enables such a user to search a Merkle tree having a given root to check (i.e. verify) whether a particular transaction is included in a particular blockchain 10 block without them having to download and store the entire blockchain.
Therefore, SR/ wallets provide at least the advantage that power and storage constrained devices such as phones and laptops are able to operate within the Bitcoin ecosystem because it only needs to confirm that a transaction has been verified (hence the name "simplified payment verification") rather than performing a full check of the blockchain as per other forms of wallet. Since an SRI wallet only downloads block headers without including any of the transactions, this significantly reduces the storage space, energy and processing resources required for verification. SPV wallets are particularly suited for use with embodiments of the disclosure for reasons explained below, and we use the term "verification" herein to include SPV checks.
BLOCKS OF TRANSACTIONS
Figure 4 schematically illustrates an example of a blockchain block. Each block contains a block header and a set of transactions. The block header includes, amongst other things, a hash of the previous block header, i.e. a hash of the block header of the block upon which the current block is built. The block header also includes a Merkle root of a Merkle tree built using the set of transactions. Each transaction is first hashed (e.g. double-hashed) to generate a transaction identifier (TxID) of that transaction. The transaction identifiers are then used as the leaf nodes of the Merkle tree. Pairs of transaction identifiers are then concatenated and hashed to form a respective inner node of a first inner level of the Merkle tree. Pairs of inner nodes of the first inner level are then concatenated and hashed to form a respective inner node of a second inner level of the Merkle tree. The process of concatenating and hashing pairs of inner nodes is repeated until only a single hash remains: the Merkle root. This Merkle root is sometimes referred to as the block Merkle root.
We now turn to embodiments of the disclosure, with reference in particular to Figures 5, 6 and 7.
IDENTIFYING SEGMENTS OF A BLOCK'S MERKLE TREE Suppose that a particular party e.g., Alice wishes to validate some transactions. In accordance with an embodiment of the disclosure, at least one subset of transactions is identified wherein the subset forms and/or is represented by a segment of the overall Merkle tree for the block. Thus, the block of transactions can be logically segmented into a plurality of segments based on the block's Merkle tree, each segment comprising a subset of the block's transactions and each segment having its own root node (or "root hash"). This common root hash is sometimes referred to below as a "segment hash" to distinguish it from the root hash of the entire block. Transactions on the same level (i.e., the lowest level, sometimes referred to as the "leaf level" or "leaf layer") within a tree segment are siblings. All transactions in a given segment share a common root node for that segment. The common root node may belong to the adjacent level of the Merkle tree, i.e., the level immediately above the lowest level. Alternatively, the common root node may belong to a higher level. In general, the common root node may belong to any level of the Merkle tree between the lowest level and the Merkle root.
Breaking the block down into smaller parts based on its Merkle tree provides significant technical advantages, including the ability to quickly and efficiently allocate transactions across multiple validators. For example, as the bitcoin protocol uses binary trees it is possible to implement binary allocations across multiple machines. By using a small binary marker as an indexing system for the segments, each segment's position in the overall Merkle tree can be calculated quickly, enabling the segments to be put back together after validation has been completed, reconstructing the complete Merkle tree for the block. This binary indexing approach is discussed in more detail below.
Various techniques can be used for identification of the segments, but in accordance with one approach the number of segments may be determined by the number of available validators in the system. For example, in a system having four validators, the Merkle tree may be split into four segments; if there are eight validators, the Merkle tree may be dissected into eight segments and so forth. Identification of the segments for a given Merkle tree can be performed or influenced by a controlling entity, illustrated by controller 702 of Figure 7.
The points explained above are further illustrated with reference to Figures 5 and 6, in which Figure 5 illustrates an example of how a Merkle tree may be divided into separate portions 502 to be allocated to validators. In the example of Figure 5, each arrow represents a respective transaction that is hashed to form a respective transaction identifier, which is used at a respective leaf node of the Merkle tree. The top of the Merkle tree is the block Merkle root. In this example, the block of transactions represented by the Merkle tree contains 32 transactions. However, it will be appreciated that this is merely an illustrative example and in general the Merkle tree may contain any number of transactions, depending on the number of transactions in the block. As shown, the Merkle tree is divided into four portions 502a-d, indicated by the dashed line boxes. Each portion 502 is linked by a respective common inner node (inner hash) 504 of the Merkle tree, which is indicated by the solid line circles. Each portion 502 represents eight transactions. In this example, the common inner nodes 504 belong to the fourth level of the Merkle tree. According to the embodiments described herein, each respective portion 502 (or rather the transactions that form and/or represent a portion) is allocated to a respective validator for processing, e.g. for validating of the transactions that belong to the respective portion 502.
Figure 6 illustrates another example of how a Merkle tree may be divided into portions 602. The Merkle tree in Figure 6 is the same as that of Figure 5. Now, in this example, the Merkle tree is divided into eight portions 602a-h, with each portion 602 representing four transactions. In this example, the common inner nodes 604 belong to the third level of the Merkle tree. The Merkle tree of Figures 5 and 6 could instead be divided into more (e.g. sixteen) or less (e.g. two) portions 502, 602. In general, a Merkle tree formed from a set of transactions of a block may be divided into any number of portions 502, 602, where each portion includes a minimum of two transactions.
ALLOCATION OF SEGMENTS TO RESEPCTIVE VALIDATION RESOURCES
Following their identification, the subsets of transactions are distributed across a plurality of validation resources, which may also be referred to as "validators" for ease of reference. A plurality of validators is shown as resources A to D (704a to 704d) in Figures] and 9. The allocation process may be directed or influenced by a dedicated unit such as component 904 as shown in Figure 9, without limitation.
Each validator (704a to 704d) can comprise one or more processing resources. Therefore, at least one of the validators in a plurality of validators (704a to 704d) may be or comprise at least one of the following: one or more virtual machines, one or more servers, one or more GPU-based computing resources, one or more threads and/or one or more multiprocessor systems etc.. Essentially, any of the plurality of validators can be made up of any type(s) or combinations of processing resource, each capable of validating one or more transactions which are associated with each other by a segment of the block's Merkle tree. The plurality of validators (704a to 704d) and other system components form a collective resource or entity 700, which we will refer to as a "(distributed) validation node".
Preferably, distribution comprises allocating each of the segments to a respective validator within the plurality of validators. The validators may be arranged, at least, to: * operate on the one or more transactions which make up the segment(s) that have been allocated to them * validate one or more transactions to verify that they conform to the blockchain protocol, and/or * validate that they can be identified in an existing repository such as the blockchain ledger or a database of known, registered or spent transactions.
The validators' activities, and allocation of the subsets to the different validators, may be directed by a controller. Figure 7 shows controller 702 allocating subsets of transactions A to D for respective tree segments to validators 704a to 704d respectively. The system-level controller 702 coordinates the activities of systems or devices 704a to 704d within the distributed validation node, and may control or influence tasks such as identification of tree segments with the block's Merkle tree, allocation of the identified segments to respective validators, reordering of validated tree segments into a complete Merkle tree for the block, and/or ordering transactions within the reconstructed block.
One or more of the validators may comprise at least one coordinating entity arranged to act as a controller at the validator level. Thus, any or all of validators 704a to 704d may comprise at least one controller component of its own. This lower-level controller may influence or direct operations such as the allocation of tasks or subtasks to one or more processing resources within the validator, reconstruction of the Merkle tree for a given segment, or interaction with other system components e.g. other validators or higher level controllers, UTXO pools, wallets etc. In turn, the processing resources themselves may be further decomposed into smaller systems, one or more of which may comprise a controller and one or more processing resources of its own. In this way, the system may comprise a hierarchical architecture in which segment validation is performed by validating entities comprising one or more processing resources for performing the validation tasks and one or more controllers for coordination of the processors' activities and the execution of inter-component communications.
In embodiments where a validator comprises multiple processing resources, the validator may split its allocated segment into smaller segments. The validator's controller can then distribute the sub-segments across the processors under its control. In this way, the validation process can be implemented in a hierarchical and distributed manner.
This hierarchical decomposition can also be extended to the transaction level so that the validation may be further decomposed into sub-processes or tasks per transaction rather than at the tree segment level. In this approach, the validation of individual transaction(s) is broken down into sub-tasks that are distributed across different machines, or different threads running on the same or different machines. These processes can be queued such that as a thread becomes available, another transaction or task is allocated to it.
Thus, the disclosure enables many transactions to be processed simultaneously, with the only limit being the amount of hardware available to form the distributed validation node rather than the amount of available processing speed being the bottleneck, as per traditional techniques. This enables blockchain processing systems to scale horizontally without the need to alter the underlying protocol of the blockchain network.
Therefore, the disclosure represents a significant deviation from the traditional approach to validation which is described in more detail ion the section below entitled "Example technical environment for implementation of an illustrative embodiment of the disclosure", and with reference to Figures land 2. As explained, the traditional approach involves one block being validated as an entire entity, and the traditional view of a validation node (see Figure 1, 104) being a single computing unit. By contrast, embodiments of the disclosure break the Merkle tree into multiple segments which are given to different validators (704a to 704d in Figures 7 and 9), each of the segments and validators being capable of being further broken down to enhance the degree of distribution involved.
Further still, by breaking each block down into segments based on its Merkle tree, embodiments of the disclosure enable validators to access, download and process small portions of the block rather than the whole block. Recall that the transactions in each segment hash up (in pairs) to a single root value. This means that the segment can be validated using only the necessary, relevant transactions rather than the entire block being downloaded, stored and processed in entirety. As protocols such as Bitcoin SV allow for scaling of block size and inclusion of larger blocks in the ledger, the traditional model of downloading a whole block becomes a bottleneck. Embodiments of the disclosure overcome this challenge to blockchain scalability by enabling individual validators to receive and process only the (smaller) parts that are relevant to them. This results in faster overall validation times, an improved blockchain network and improved applications which run on the blockchain.
Further still, embodiments support and facilitate the use of SPV processes and resources, because such SPV involves local validation of only parts of the Merkle tree that are of interest to a given party. The tree-pruning nature of SPV technologies are, therefore, ideally suited for use in combination with embodiments of the present disclosure. In an SPV context, validators may be provided with only the portions of the block data that they need i.e., block header or segment root node and relevant transactions.
When each validator has performed its check and confirmed the validity of the segment that it has processed, it can be guaranteed that the block is valid due to the hashing mechanism that is used to generate the tree.
LOAD BALANCING ACROSS THE PLURALITY OF VALIDATORS
Load balancing techniques and systems are known in the art, arranged with the aim of evenly distributing tasks across multiple resources so as to enhance efficiency. The aim is to minimize the risk of some processing resources lying idle while others become overloaded and thus risk degradation of performance or even failure. Therefore, load balancing becomes important in ensuring the resilience of the overall system as well as its performance and efficiency. Embodiments of the disclosure may utilize any known load balancing technique such as, for example, static or dynamic load balancing. Additionally, or alternatively, the load balancing approach disclosed herein may be used to advantage.
As mentioned above, embodiments of the disclosure can use an indexing system in the allocation of block segments to respective validators. Preferably, this is a binary indexing system. In this preferred system, each validator is designated a binary label or identifier. Suppose that each identifier is 4 digits long, with the first validator being identified as 0000, the next validator being identified as 0001, the next as validator 0010 and so on.
Clearly, a 4-digit identifier allows for 256 validator IDs, with the last validator being identified as 1111 (i.e., validator number 255 in decimal).
When a tree segment needs to be assigned to a validator, the first 4 digits of its double hash (i.e., the segment hash of the tree segment) can be used to determine which validator will process that segment. Recall that a Merkle root is generated by hashing together pairs of transaction IDs (TxIDs) from a block to generate respective inner nodes (or inner hashes) of the Merkle tree, and then repeatedly hashing adjacent inner hashes until a single hash is finally arrived at. This double-hashed Merkle root provides an efficient, quick and secure verification mechanism. It also provides the advantage, in the present context, that the double hash generates a random binary number. Each inner hash, including each segment hash, is itself a double hash. Thus, we can take the first x number of leading digits of the segment hash as the allocation index. A hash with four leading zeroes will result in the tree segment being allocated to the validator with ID 0000, and hash with leading digits 0001 will result in allocation to validator with ID 0001 and so on. The random generation of the double hashes ensures a random distribution of tree segments to validators.
Although double-hashing is typically used when generating a Merkle tree, it is not essential in all examples and instead only single-hashing may be used. In fact, any number 30 of hash operations will result in a random binary number. The load balancing tasks may be performed by a dedicated system component, shown as 905 in Figure 9, or may be provided elsewhere within the system 700, or in association and communication with the system 700.
DISTRIBUTED DOWNLOADING OF BLOCKS
According to some embodiments, the allocation of segments of the block Merkle tree to different validators may be used to provide a faster and more efficient process for downloading part or all of a block of transactions.
Each validator is allocated a segment of the Merkle tree, e.g., based on the allocation index described above. Any given validator then operates to download the set of transactions that form the allocated tree segment. This may involve downloading the set of transactions from the blockchain itself (e.g., from a blockchain node) or from a different resource or entity, such as a third-party service provider. The set of transactions may be downloaded to internal memory of the validator, or to a shared storage location, such as a shared drive in the cloud.
A distributed node may require the full block, i.e., the entire set of transactions that form the block. In that case, each validator that is assigned a tree segment downloads the subset of transactions that form the segment. In other scenarios, the distributed node may only require certain parts of the block. In that case, only some of the validators may need to download their respective subsets of transactions in order to obtain the desired transactions.
Downloading a block (or part a block) in this fashion results in a faster overall download, as each validator only to process a subset of transactions of the entire set of transactions that form the block. This contrasts with conventional block downloading whereby a given entity (e.g., a full node) would have to download the entire block, e.g., by downloading each transaction in order as it appears in the block. Now, the block is downloaded in parallel by multiple validators. A block may contain tens of thousands of transactions, if not several orders of magnitude more. A single entity downloading this number of transactions would consume significant resources and take a considerable amount of time. The computational burden is now distributed amongst the validators such that each individual validator consumes a fraction of the processing resources. Similarly, the overall time to download the block is reduced.
As discussed, each validator may download a subset of transactions. The subsets may then be combined so as to reconstruct the block in a single storage location. (By "single storage location" we mean either a storage resource which is a self-contained entity or a plurality of associated storage resources which form a collective entity). To do so, the individual validators may transmit their respective subsets to a central controller of the distributed node which is configured to arrange the transactions in the correct order. The segment hash (i.e., the hash that links the tree segment) may be utilized for this purpose. For instance, a mapping may be maintained of the segment hash to its position in the Merkle tree, e.g., from left to right as the segment hash appears in the Merkle tree. The subsets of transaction may then be placed in order (e.g., from first to last as) based on the corresponding segment hash.
In some embodiments, the individual validators (or the distributed node as a whole) may confirm that the correct transactions have been downloaded (or that the transactions have been downloaded correctly) by reconstructing the Merkle tree. After downloading a subset of transactions, a validator may generate a candidate segment hash based on those transactions. The candidate segment hash is constructed by hashing pairs of TxIDs to generate respective inner hashes, and repeatedly hashing pairs of inner hashes until a candidate segment hash is produced. The level of the Merkle tree that the candidate segment hash belongs to will depend on the number of tree segments that the Merkle tree is divided into. The validator may verify that the candidate segment hash is a hash of the Merkle tree. If the hashes do not match, then an error has occurred during download. In some examples, each validator may generate the candidate segment hash and send it to a controller to perform the verification. As another example, a candidate block Merkle root may be generated based on the entire set of downloaded transactions. Again, the candidate Merkle root should match the actual block Merkle root (i.e., the Merkle root stored in the block) if the block has been correctly downloaded.
In some cases, the validators may validate the downloaded transactions using the techniques described above. That is, each validator is allocated a tree segment, downloads the corresponding subset of transactions, and validates those transactions. In other cases, the validators may not necessarily validate the transactions and may simply download the transactions for later use, e.g., for sending to a third party.
DISTRIBUTED UTXO POOLS
Preferably, each validator 704 that forms part of the distributed validation node has its own repository (pool) for generating, storing and/or maintaining unspent transaction outputs (UTXOS). This functions as a UTXO pool that provides a record of unconsumed i.e. unspent outputs associated with blockchain transactions. Each validator's UTXO pool is, therefore, based on and constructed from the transactions that are allocated to it by the controller in respect of Merkle tree segments. In one embodiment, this may be a (graph) database comprising data relating to the unspent UTX05 of transactions that have been assigned to a given validator for processing. A record in the database is created for each UTXO that the validator becomes aware of as new Merkle tree segments are allocated to it. From the perspective of the distributed validation node, therefore, the UTXO pool is not one single pool but is made up of a plurality of different UTXO pools, each provided at or on different validators and comprising different sets of UTX05. The UTXO pool for the node is, therefore, distributed in both in terms of the data and also the resources which store and/or process it.
This is a significant divergence from the traditional UTXO model in which each full node in the network has a copy of the UTXO pool that tracks all UTX05 on the blockchain. By contrast, the present disclosure distributes the UTXO pool across a plurality of validating 30 resources, each having a UTXO pool that is a subset of the blockchain's entire UTXO set.
Each validatoCs UTXO pool comprises the UTX0s of transactions which make up the Merkle tree sub-portions that it has been tasked with validating.
In accordance with such an approach, each time a new block needs to be validated it can 5 be implemented in a similar fashion to an SQL transaction log, in that every command, event and item relating to the database is recorded in the log. The term "database log" will be used herein to avoid confusion arising from the use of the term "transaction" as known in relation to blockchains, but we use the term "database log" to include terms such as "transaction journal", "transaction log" etc.. Essentially, the database log can be 10 interpreted as a history of actions executed by a database management system, providing a record of all changes that have occurred in respect of the state of the database, as known in the field of computer-based databases (See https://en.wikipedia.org/wiki/Transaction_log).
The use of an ordered, historical database log means that the entire UTXO pool can be constructed by executing the log's history in its original order. Advantageously, this ensures that a copy of the database can always be (re)generated when required, and separate copies of the data do not need to be stored. Data integrity is ensured, and fewer storage resources are required. Each UTXO pool can be stored, maintained and processed separately. Also advantageously, SPV techniques facilitate the creation of separate UTXO databases for each validator given that SPV techniques operate on pruned portions of Merkle trees.
Transactions (TXs) within the database can be structured in a variety of ways, although a particularly advantageous approach is to structure them according to identifiers which comprise a concatenation of the block ID and the transaction ID (block ID II Tx1D). The block ID and the transaction ID are both 256 bit hashes, resulting in a 512 bit concatenation field structure that is secure and collision free.
Structuring transactions in this way provides a fast, efficient look-up mechanism. Transactions can be sorted by block_ID such that all transactions having the same block_ID are located together in the database. Thus, when a validator requires a transaction (e.g. to check whether a UTXO of the transaction has been spent), the validator can locate the transaction in the database first by searching for the corresponding block_ID, and then the corresponding TxID. This has the effect that the search is confined to the relevant section of the database. This efficiency reduces the time, processing resources and energy required for search operations, providing a significant improvement over prior art A flag or marker is associated with each UTXO in a validator's pool, and indicates whether the UTXO is locked or unlocked. We may refer to this flag or marker as a "locking flag" for convenience. When a UTXO is marked as "locked", this serves as an indicator to validators in the group (i.e. elsewhere in the distributed validation node) that this UTXO is not available for spending. Conversely, when a UTXO is marked as "unlocked", this serves as an indicator to validators that the UTXO can be spent. It functions, therefore, as a way of enabling a validator that has been allocated to verifying a transaction that spends the UTXO to signal to its peers that, assuming the transaction proves to be valid, it has been redeemed and is, therefore, no longer spendable. A "locked" state means that spending is permitted, whereas an "unlocked" state means that spending is prohibited.
This locking/unlocking flag can be a simple, small binary marker such as 0 for "locked" and "1" for unlocked. The marker mechanism is used internally by validators in the distributed node system, the marker is removed from the transaction prior to interacting 25 with the blockchain so that the transaction conforms to the protocol rules.
In use, the validator inspects the outputs in each of the new transactions that have been allocated to it by the controller. Any unspent outputs (UTX05) are added to the validator's UTXO pool i.e. it is recorded as an entry in the UTXO database. In the relevant 30 database record for each new UTXO, the locking flag is set to "unlocked".
When the validator sees that a UTXO is being spent by a newly allocated transaction, it sends a message to every other validator in the plurality to inform them that this UTXO should also be locked in their respective pools. Essentially, the validator sends a communication to its peers indicating that it has seen a spend involving a transaction with a particular hash ID at a particular time. The other validators do not need to receive complete data for the entire transaction, as the transaction hash and a list of UTX0s that it spends is sufficient for them to identify the transaction in question and mark it as locked in their own database. Upon receipt of the message, each receiving validator checks whether the UTXO in question is in their UTXO pool. If it is, the state of the locking flag is changed to "locked". Thus, the lock prevents validators from allowing the same UTXO to be spent in a subsequent transaction. In the event that a new transaction does attempt to spend the same UTXO, a check of the locking flag will indicate that the second spend attempt is to be ignored. If the validator that sent the message determines that validation has failed and therefore the UTXO has not been spent, a further message can be sent out to the validator peers to this effect, indicating that the locking flag for the UTXO should be changed to the "unlocked" state. Once a valid spend has been completed, a message can be sent to this effect, and the locked UTXO can be deleted from the relevant UTXO pool.
In the embodiment described above, each validator has a single UTXO pool which comprises the UTX05 of all the transactions in all of the tree segments that have been allocated to it. However, in an alternative approach, the UTXO pool maintained by each validator may be divided/split/compartmentalised into/formed of multiple sub-pools, one per block. In this way, a single UTXO pool can be organised into a logical hierarchy. In yet another approach, one or more validators may be arranged in association with a respective plurality of UTXO pools, each plurality relating to UTX05 for a set of one or more tree segments. Thus, in some embodiments, validator(s) may organise UTX05 into separate UTXO pools for different individual tree segments, or according to some pre-defined criteria such as type of tree segment, or tree segments which fall within a given range etc. In such embodiments, the identifier may comprise a block ID which can be used to narrow down a search to a relevant UTXO pool, and then the search can proceed within that pool to (attempt to) identify the relevant transaction by its TxID. The skilled person will understand that in some embodiments, a mixture of these approaches can be used i.e. one or more validators within the distributed node may employ the single-UTXOpool approach while other(s) are arranged to use multiple, separate UTXO pools, and/or UTXO pools which are organised into sub-pools, or any combination thereof.
This provides protection against "double spend" situations, in which a party attempts to spend the same UTXO twice. This provides a simple and secure locking mechanism that operates efficiently and quickly, regardless of the number or location of the validators in the system, and preserves the security and integrity of transfers implemented over the blockchain.
DISTRIBUTED MINING
We now describe an example embodiment of another aspect of the disclosure for the purpose of illustration, without limitation, and with reference to accompanying Figures 14 to 19, and enumerated clause set 7. The distributed mining features disclosed in this section may be implemented in hardware and/or software so as to form a (distributed) mining component 2000 as shown in the system of Figure 20.
By way of summary, embodiments in relation to this aspect of the disclosure may comprise techniques for authorising, controlling, establishing authorisation of, or otherwise formulating a request for generation of a Proof-of-Work (Pow) for a blockchain block that comprises a particular plurality (set) of transactions. Preferably, the set includes a transaction which comprises at least one portion of control data that a Proofof-Work provider can use to determine whether or not the requested PoW effort should be initiated, undertaken and/or fulfilled. This may be called the "control transaction" (TX0). The request may also comprise data that the PoW provider can use to determine that TX° is included in the plurality of transactions. In a preferred embodiment, this may comprise at least one or more of: a Merkle proof, the control transaction (TXD) and/or the root of the Merkle tree that represents the set of transactions. The PoW provider can process the request to ensure that a) the control transaction is included in the set and/or b) comprises the at least one portion of control data that can be used, in conjunction with at least one pre-specified rule, criteria or requirement, to determine whether or not the requested PoW effort should be initiated, undertaken and/or fulfilled.
In combination, the PoW requester and the PoW provider may provide a distributed blockchain mining node. Embodiments provide the ability to separate, distribute and parallelise the various functions and tasks involved in validating and/or mining blockchain transactions.
Traditionally, nodes in a blockchain network maintain a global ledger of all transactions on the blockchain. The global ledger is a distributed ledger and each node may store a complete or partial copy of the global ledger. Transactions by a node affecting the global ledger are verified by other nodes so that the validity and integrity of the global ledger is maintained. The details of implementing and operating a blockchain network, such as one using the Bitcoin protocol, will be appreciated by those ordinarily skilled in the art.
Each transaction typically has one or more inputs and one or more outputs. Scripts embedded into the inputs and outputs specify how and by whom the outputs of the transactions can be accessed. The output of a transaction may be an address to which control of a value is transferred as a result of the transaction. That value is then associated with that output address as an unspent transaction output (UTXO). A subsequent transaction may then reference that address as an input in order to obtain control or ownership of that value.
As noted above, using the Bitcoin network and protocol as our example, mining nodes compete in a race to create the next block in the blockchain. To assemble a block, a miner 30 will build the block as a set of transactions from the pool of unconfirmed transactions (the "mem pool"). It then attempts to complete a proof of work (PoW) puzzle with respect to the block it has assembled. If it manages to complete the PoW prior to receiving notice that any other miner has succeeded in generating its own block and completing its PoW, then the miner propagates its block by sending it to peer nodes on the network. Those nodes validate the block and then send it further on in the network to other nodes. If the miner receives notice that another block has been completed prior to finishing its own PoW, then the miner abandons its efforts and begins trying to build the next block.
Thus, fast propagation of blocks helps to avoid wasted effort (and associated energy) on behalf of miners and validating nodes. By providing a solution which enables faster validation and thus propagation of blocks, the present invention provides an enhanced network performance. It reduces the amount of computing time and effort required, and thus the amount of energy required by the network. It provides a network which is more efficient in terms of resources and time. It provides, ultimately, an improved (blockchain) network.
Distributed mining -detailed description:
We now provide a detailed description of this aspect of the disclosure in which mining tasks and functions are separated from other operations that are typically associated with 20 or performed by a "full node" on a blockchain network. This enables the mining tasks to be distributed and parallelised across different resources.
As known in the art and illustrated in Figure 15, a transaction has to be validated before it can be written to the blockchain. Network nodes (miners) perform work to ensure that each transaction is valid, with invalid transactions rejected from the network. Software clients installed on the nodes perform this validation work on an unspent transaction (UTXO) by executing its locking and unlocking scripts. If execution of the locking and unlocking scripts evaluate to TRUE, the transaction is valid and the transaction is written to the blockchain. Thus, in order for a transaction to be added to the blockchain ledger, it must be i) validated by the first node that receives the transaction -if the transaction is validated, the node relays it to the other nodes in the network; and ii) added to a new block built by a miner; and iii) mined.
Traditionally, to mine a block the mining node selects unconfirmed transactions from its 5 mempool, generates the coinbase transaction for the block, and forms a candidate block by hashing all the transactions in pairs to form a Merkle tree structure having a Merkle (hash) root. The Merkle tree represents all the transactions in the candidate block. The miner also determines a version number and current epoch time, and obtains the hash of the latest block on the longest chain of the ledger. The Merkle root and other values are 10 concatenated to form a block message BM.
The miner then attempts to solve the PoW challenge by finding an integer value (the nonce) that, when appended to the block message to produce a full block header, produces a hash with a specified number of leading zeroes. If the attempt fails to produce a qualifying hash, the miner repeats the calculation using a different nonce. If it finds a nonce that succeeds in producing the required number of leading zeroes, it sends the candidate block, including its full header, out to the blockchain network to be verified by the other nodes. The nonce, therefore, provides proof that the miner has spent energy, effort and time in finding a solution to the challenge.
Therefore, in the traditional approach, the miner selects the transaction, generates the candidate block, generates the PoW and the full block header. In contrast to the traditional approach in which these functionalities are performed by the same entity, in the presently disclosed approach these functions are distributed and parallelised across different processing entities. This allows for verification and enforcement of pre-specified authorisation criteria prior to performing and/or completing the PoW calculation.
In a preferred embodiment, the Merkle structure of a block allows the various functions of the validation and mining processes to be separated out and handled independently by 30 different computing resources. These resources can be located anywhere in the world and may operate in isolation or in combination with one another. Collectively, they can form "distributed nodes" wherein different node components specialise in one or more functionalities relating to validation and/or mining of blockchain transactions and blocks.
The presently disclosed approach concerns the separation of the Proof-of-Work (PoW) calculation from the validation effort, transaction processing and other tasks typically associated with mining by the traditional full node. This means that the PoW provider does not need to perform any verification tasks and, conversely, the validation node can delegate the PoW calculation to a specialist, dedicated resource that can be located anywhere in the world.
Therefore, the disclosure represents a significant deviation from the traditional approach to validation which is described in more detail in the section herein entitled "Example technical environment for implementation of an illustrative embodiment of the
disclosure", and with reference to Figures land 2.
We turn now to figures 14 to 19 which illustrate an embodiment of this aspect. In this approach, a distributed mining node 14.1000 is provided as shown in Figures 14 and 19.
Alternatively, this may be referred to as a "PoW provider". The PoW provider 14.1000 comprises at least one specialised PoW calculator that can also be referred to as a "hash machine" or ASIC. The PoW calculator comprises one or more integrated circuit chips (shown in the figures as 19.1100a, 19.1100b, 19.1100c) that are arranged to mine a cryptocurrency in accordance with an associated protocol. Calculators 19.1100a to 19.1100c may be arranged to mine Bitcoin using the SHA-256 algorithm. Other algorithms may be employed for other cryptocurrencies such as, for example, ETHASH for mining Ethereum.
As shown in Figures 14 and 19, the PoW provider 1000 is in communication with a PoW requesting resource 14.1300 that is arranged to send a request to the PoW provider to 30 request generation of a valid nonce (or, preferably, a complete block header) for a given plurality of transactions. The term "request" as used herein is intended to include "instruct" and/or "initiate". Therefore, the request may comprise or be an instruction or initiation of a PoW generation. We will use the term "request" for simplicity.
In alternative wordings, the PoW requesting resource 14.1300 may be referred to as a validation and/or mining resource or node, or simply a "PoW requester". In a preferred embodiment, the requesting resource 14.1300 may be distributed and facilitate the parallelisation of validation and/or mining operations. The requester 14.1300 and may be substantially as described herein and illustrated in Figure 7 with reference to the validation node 700. In other embodiments, though, the requesting entity may take any suitable alternative form, and may be any entity that requires the generation of a PoW (nonce or block header).
To request the PoW, the PoW requester 14.1300 sends the PoW provider 1000 at least some of the information needed for the construction of a block header for a candidate block of transactions. The information sent from the PoW requester may be referred to as a "block template" or "block message" and may include at least the root for the Merkle tree that represents all of the transactions in the block. The block template may also include other information to be used by the PoW provider to generate a block header for the transactions, such as version number, previous block hash, difficulty target and/or time stamp, or one or more of these data items may be calculated or obtained by the PoW provider. For example, the PoW provider may obtain, retrieve or select a version number, or may obtain the previous block hash from the network. It should be noted that the PoW provider does not need to receive the whole block from the PoW requester; it simply needs sufficient, minimal information, as specified by the protocol, to combine with a selected nonce and attempt to solve the PoW challenge. It must, however, receive the Merkle root for the transactions that the PoW requester wishes to include in the block as this cannot be determined by the PoW provider 14.1000.
In some embodiments, the PoW provider may comprise a controller 19.1200 which is arranged to coordinate the activities of the PoW calculator(s). In some embodiments, the functions of the PoW provider 14.1000 and/or controller 19.1200 can be implemented in an ASIC or hash machine. Figure 19 shows the controller as part of the same entity as the PoW calculators but this should not be construed as necessarily meaning that the controller and the ASICS are implemented within the same hardware or device. They may be provided as physically separate devices but form a PoW provider 14.1000 by being associated with one another logically or electronically, and/or by being in communication with one another.
The controller 19.1200 may perform such operations as selecting a nonce or range of nonces for a given calculator (19.1100a to 19.1100c) to operate on, obtaining any necessary information for the PoW calculation that is not provided by the requester and/or checking the authorisation criteria as explained below. Calculators 19.1100a, 19.1100b and 19.1100c may be arranged to operate on different nonce ranges for the same candidate block. In some embodiments, however, the PoW requesting resource may allocate nonce ranges, and that the functions of the PoW provider 14.1000 and/or controller 19.1200 can be implemented in an ASIC 19.1100. In yet other embodiments, the PoW requester may allocate a nonce range.
In addition to the block template, the PoW requester can provide further data to the PoW provider. This could be any kind of data that the PoW provider needs in order to confirm the fulfilment or otherwise of at least one pre-requisite rule or criterium. This at least one pre-specified rule or criteria will be referred to hereafter as the control criteria for ease of reference. The control criteria must be met before the PoW provider begins, continues and/or completes its PoW calculation effort. If the (control) data provided to the PoW provider meets the control criteria, the request for PoW generation may be deemed by the PoW provider as authorised, legitimate and/or permitted. The control criteria may be predetermined at, by or on behalf of the PoW provider. It may be agreed between the PoW requester and the PoW provider, or their respective associated entities.
In a preferred implementation, the control data is included in a transaction that forms part of the block that the PoW is to be calculated for. The control data can be evaluated or checked by the PoW provider against the control criteria to ensure pre-authorisation or agreement between the parties, or legitimacy of the request from an authorised requester. For example, the PoW provider may require that the block includes a transaction (TX0) that transfers a portion of cryptocurrency to a particular address. If this criterium is not met, the PoW request will not be deemed to be permitted and it will not attempt to calculate the required PoW. To assist in the checking process, the PoW requester may provide, as part of the data that it sends to the PoW provider, an SPV-style proof that the PoW provider can use to confirm that a transfer to the pre-specified address will be made if the block is successfully mined and added to the blockchain.
In another example, the pre-requisite might be that TX0is signed by an authorising party.
In other examples, the control criteria may be that TX0 contains metadata that the PoW provider can check and confirm. For example, the metadata may comprise a secret such as a cryptographic key, or a password/code or some other data that the PoW provider can use to confirm that it is authorised or permitted to generate the PoW for or on behalf of the requester.
In some implementations, TX0 could also include instructions on where the PoW is to be sent. For example, it may by default be sent back to the PoW requester or it may be sent to another entity as specified in the metadata or some other part of the transaction. The metadata could include a flag or other identifier for directing which destination the PoW should be sent to, or which party is authorising the PoW request. The flag or identifier or password etc may be known only to the PoW provider and/or requester. This can be advantageous in scenarios where a PoW provider can receive requests from multiple, unrelated requesters.
In some cases, inspection of TX0 could trigger an event by the PoW provider. For example, data in the transaction could cause a balance or account to be updated e.g. because the PoW provider is able to identify the request as being received from a particular, authorised requester that has an account with the PoW provider. Additionally, or alternatively, a PoW provider may not wish to provide more than a specified number of PoWs for a given requester, possibly within a given period of time, and may use TX0 to determine whether or not the threshold has been met. Additionally, or alternatively, an alarm, alert or other communication may be initiated by the PoW provider based on the data provided in TX0.
In yet other examples, the control criteria could be that TX0 spends a sufficient quantity of 15 cryptocurrency, possibly to a pre-specified address, and the PoW could check that the outputs of TX0 to ensure that the control criteria are met.
In yet other examples, the inputs of TX0 could be inspected to ensure that funds from illegitimate or non-approved sources are not transferred and received. For example, if a PoW provider does not wish to receive requests from certain parties e.g. because they are known or suspected to be associated with illegal activities, the PoW can decline to generate the requested PoW. Thus, the disclosure can provide solutions for ensuring compliance with legal or regulatory requirements, and can provide measures for preventing fraud/criminal behaviour.
In essence, the invention provides an authorisation mechanism for parallelising and distributing the PoW calculation in a manner that is efficient and does not require trust between the participating parties. The control criteria may be checked separately from the PoW calculation, possibly in parallel with it. In other words, when a request is received from a PoW requester, the PoW provider may start work on the PoW calculation at substantially the same time as it begins to check the received data against the control criteria. If the received data fails to meet the control criteria, the PoW provider can halt work on the PoW calculation; or, if it meets the criteria, it can allow the work to continue. This provides the advantage on the assumption that the request is legitimate and authorised, the PoW can be returned as swiftly as possible to the requester/specified destination. As blockchain mining involves a race to submit the first valid block to the network, this can provide a time-critical advantage.
In use example:
With particular reference to Figures 17 and 18, we now explain how the disclosure may be put into practice in accordance with one illustrative embodiment of this aspect. From the PoW requester's perspective in Figure 13: * Step 51300: the PoW requester 1300 selects unconfirmed transactions (TXs) from its mempool, and generates the coinbase transaction (if the relevant protocol requires or permits one). In other cases, it may receive the set of transactions from another source which provides them to the PoW requester.
The PoW requester also generates or obtains at least one transaction TX0 which is arranged to fulfil an authorisation requirement specified by the PoW provider or an associated entity that authorises and/or directs the activities of the PoW provider. In our illustrative example, the requirement is that TX0 includes at least one output which transfer(s) assets to at least one specified address.
* Step S1320: the PoW requester (or an associated resource) hashes all of the transactions in pairs to produce a Merkle tree for the set of transactions. The Merkle Tree has a root R. * Step 51330: in some embodiments, the PoW requester may generate a block message BA1 (template) by concatenating the Root R with other information required for generation of a block header e.g. a version number, previous block hash, difficulty target and/or timestamp). In another embodiment, at least one, some or all of these values may be obtained, retrieved or generated by the PoW provider instead of being provided by the PoW requester.
* Step 1340: the PoW requester sends the root R (potentially as part of block message BM) to the PoW provider. The validator also sends a Merkle proof which the PoW can use to prove that TX0 is included in the block of transactions represented by the tree that R is the root of. This Merkle proof comprises the parts of the tree that, when hashed together in pairs along with TX0, allows the prover to arrive back at the root. In this way, the PoW requester needs only to send the PoW provider the root R, the authorisation transaction TX0, and the minimal set of transactions which can be used to generate the path from TX0 to R. The PoW provider can (in figure 19) perform an SPV style verification to check that the PoW requester has met the authorisation criteria.
From the PoW provider's perspective in Figure 18: * Step 51400: The PoW provider 1000 receives a Merkle root for a set of transactions from the PoW requester. These transactions will form the body of the block that the PoW is to generate the PoW for on behalf of the PoW requester. As explained above, the set of transactions may comprise one or more transactions selected from a mempool, at least one authorisation transaction TX0, and a coinbase transaction if relevant. The Merkle root R may be received from the PoW requester as part of a complete or incomplete block message. The PoW provider also receives at least one transaction TX0 that is arranged to fulfil at least one authorisation requirement, and the part of the set of transactions which serves as a Merkle proof for confirming that TX0 is included in the set.
* Step 51410: The PoW provider uses the Merkle proof to perform an SPV style local verification to confirm that TX0 is in the set, and check that the PoW requester has fulfilled the authorisation requirement(s).
* Step 51420: If the verification fails, then the PoW is not authorised to proceed with the PoW calculation. It terminates the process by either not instructing the PoW calculator(s) to start work on the discovery of a valid nonce or, if they have already begun to do so, instructs them to stop. No block header will be sent to the PoW requester. An alert, signal or message may, however, be sent to the PoW requester or another destination to indicate that authorisation for the PoW generation has failed.
In the alternative, if the verification succeeds then PoW generation is authorised to proceed * Step 51430: to generate the PoW the calculator (19.1100a, 19.1100b or 19.1100c) selects or receives a nonce. This may be randomly generated or may be selected from a range of allowed nonces specified to the calculator by the controller 1200.
* Step 51440: The calculator concatenates the block message with the selected nonce. It should be noted that if the PoW requester has not provided a complete block message as explained above, the PoW provider may retrieve, obtain or generate any additional data required for generation of a block header in accordance with the relevant blockchain protocol. Concatenation of the block message and the nonce provides a block headerBH.
* Step 51450: Block header 13 H is then double hashed * Step 51460: the result of step 51450 is then compared against the difficulty target set by the protocol; if it does not provide the requisite number of leading zeroes, the block cannot be added to the ledger so another nonce is selected and the process returns to step S1430.
* Step 51470: If, however, the selected nonce does produce the required number of zeroes, the block can be validly mined and so the block header, including the valid nonce, is sent to the PoW requester or another specified destination.
Although not shown in the figures, the PoW requester or another entity can then submit the block to the network for inclusion on-chain. Importantly, as the PoW generation has been outsourced to the specialist, dedicated PoW provider, the PoW requester can process, delegate or coordinate other tasks such as validation operations in parallel with the PoW calculation. This provides technical improvements in terms of throughput of transactions and efficiencies of resources.
Advantages: Aspects of the disclosure provide numerous advantages, including but not limited to: 1. The effort and costs of calculating the PoW calculation can be delegated and outsourced by the PoW requester to any PoW providing service(s) of their choosing.
2. These can even be providers that the validator has no existing relationship with. Instead, the relationship between the PoW requester and the PoW provider is governed by fulfilling at least one pre-specified criteria which serves as pre-authorisation to undertake the PoW effort.
In some implementations, the PoW requester sends a Merkle Proof that the PoW provider can use to ensure, before commencing the PoW calculation effort, that the necessary criteria have been met.
3. This allows an extra layer of pre-authorisation to be built into the PoW process, because the PoW requester and the PoW provider can both prove that the candidate block contains a transaction that fulfils the pre-specified or agreed conditions. If the block is successfully mined and the transaction is included in the blockchain, the transaction and its transfer of assets will be immutably recorded. In cases where the authorisation criteria requires transfer to a specified address the PoW provider can be assured that the desired transfer will be made if the block is written to the ledger.
4. Fulfilment of the pre-specified criteria is, therefore, provably embedded in the data that is to be processed by the PoW provider. It is not sent separately from the PoW requester to the PoW provider. This provides a more efficient solution compared to approaches involving separate communications.
5. As this solution allows for distribution of mining and validation tasks, the transaction processing functions are separated from processing of the block header. Therefore, the hash machine/ASIC component(s) can be sited in one or more locations while the transaction processing can be performed in other(s). Locations for the different functions can be selected in accordance with different needs such as energy resources or network infrastructure. For example, as the PoW provider only needs to return a small (80 byte) block header to the PoW requester, it can be sited in an isolated location that allows for use of renewable energy sources even if there is limited access to the Internet. The block header can be sent using a mobile phone with low bandwidth. The transaction processing, on the other hand, can be performed in a location that has good access to the Internet, such as a major city. Together, this allows for a more versatile and efficient distribution of tasks, including the use of sustainable, environmentally friendly energy supplies.
6. Additional security can be provided in that TX0 can be compared against the control criteria to ensure that only requests from legitimate requesters are acted upon. This can avoid exploitation by unauthorised parties, malicious parties such as attackers and/or provision of PoW work for parties potentially associated with undesirable or illegal activities and thus participation in criminal activity.
7. Improved authorisation and control techniques for blockchain mining, because the requester is able to identify themselves in a variety of ways via the control data supplied via TX°.
ILLUSTRATIVE SYSTEM OF A POSSIBLE EMBODIMENT
Figures 7and 9 illustrate an example system 700 for implementing at least some of the described embodiments, especially the distributed validation aspects of the disclosure. Figure 8 illustrates a flowchart of example steps which may be taken in (a high-level view of) a method of the disclosure. Figure 20 shows a more comprehensive view of the system as a whole, including more components.
With regard to figures 7 and 9 and the validation components, the system 700 may be a closed system in the sense that it may be associated with an organisation and form part of a larger proprietary system. In such cases, its data e.g. transactions, may be received from other components within the organisation's wider system and its results and outputs may be sent to internal destinations. Additionally, or alternatively, system 700 may be arranged to interface with a variety of entities, some or all of which may be located outside the organisation. In such cases, system 700 may be arranged to provide validation functionalities as a service. For example, system 700 may be arranged to interact with the blockchain network to obtain the data that it requires. Additionally, or alternatively, it could interact with entities that wish to use its validation services. Thus, system 700's activities could be solely internal with respect to a particular organisation or entity, or open to interactions with external entities to provide validation services to other parties, or a combination of the two. Communications between other internal or external entities may be coordinated by one or more interface or communication components, shown as 902 in Figure 9.
As shown in Figures 7 and 9, the system 700 includes a controlling entity 702 (or simply, "controller") and a plurality of validating resources 704, also referred to herein as simply "validators". Only four validators 701a-d are shown in Figure 7, but in general the system 700 may comprise any number of validators. Moreover, the controller 702 is shown in Figures 7 and 9 as distinct from the validators 704, but it is not excluded that the controller 702 may comprise or be comprised by one of the validators 704. As explained above, each validator may comprise one or more processing resources, and may comprise its own controller for coordination of its own internal activities. There is no technical or logical limit to the hierarchical levels that can be implemented in this way. Figure 7, however, shows only one (top) level of such a hierarchy for simplicity and ease of understanding.
As shown in Figure 7, the controller 702 obtains a set of transactions. The transactions can be received across an electronic channel or network from a sending resource. The sender may be any entity which wishes to perform a validation check of some kind, internal or external to the system's organisation as explained above. For example, this could be a full node on a blockchain network such as node 104 in Figure 1, or a digital wallet, or a merchant/SPV node wishing to perform a local check relating to a blockchainimplemented transfer made between parties. Interface(s) 902 may facilitate the transmission of data between the system 700 and sources external to the system.
The transactions form, or may form, a block of transactions. The transactions may be obtained from a single resource (e.g. from a block of the blockchain) or from different resources (e.g. one or more users, one or more blockchain nodes, etc.). The transactions may be obtained prior to them having been published on the blockchain, i.e. before being recorded in a block. Alternatively, the transactions may be obtained after having recorded on the blockchain.
The controller 702 allocates a respective subset of transactions to each validator 704 as described herein. Each subset of transactions forms at least part of a respective portion of a Merkle tree generated based on the full set of transactions, and is linked by a respective common inner node of the Merkle tree. In the example of Figure 7, transaction subset A is allocated to validator A, transaction subset B is allocated to validator B, transaction subset C is allocated to validator C, and transaction subset D is allocated to validator D. Having been allocated a subset of transactions, the validators 704 then process their respective subset. In some embodiments, this involves each validator 704 validating its respective subset of transactions. To do so, the controller 702 may transmit the relevant transactions to the respective validators 704. The validators 704 may communicate back to the controller 704 to indicate that each of their respective subset of transactions is valid or that at least one transaction is not valid.
At least one but preferably some or all of the validators 704a to 704d have access to their own UTXO pools shown as 901a to 901c1 in Figure 9. This pool comprises a storage facility such as the database described above, and potentially with the advantageous indexing structure comprising a concatenation of the block ID and the transaction ID. In figure 9 the pools are shown as included within the respective validator but the skilled person will readily understand that they may also/alternatively be provided as external to the validator but in communication therewith.
In one or more embodiments, the disclosed process may include a block-level validation stage, during which an incoming new block is tested against block-level criteria. Example block-level criteria are described above and generally relate to prescribed formatting requirements and characteristics or limits applicable to the block itself, as opposed to the transactions within the block. Examples include the block size, the block header structure or content, and similar criteria. Such operations may be performed by the controller, or a component of the controller, or by another system component.
In some embodiments, the method may further include a UTXO uniqueness confirmation module which is operative to evaluate whether each of the inputs, Le. each UTXO, to a transaction in the new block is unique. If the same UTXO appears more than once as an input in the new block, it indicates a potential double-spending problem and violates the UTXO uniqueness criteria. If the UTXO uniqueness confirmation module identifies a UTXO that is referenced more than once among the transaction inputs in the new block, then it may output an error signal or other interrupt to indicate that the block is to be rejected.
Assuming that the new block does not get rejected, Le. that all the UTXO inputs are unique, then the Merkle tree segments can then be identified and their associated transactions allocated among the set of validators. The identification process may be performed by a component such as segment identification unit 903, shown in Figure 9. The allocation process may be performed by a segment allocation unit, shown as 904 in Figure 9. The allocation unit 904 may employ any one of a number of possible allocation schemes for distributing the block segments amongst the individual validators, but in an advantageous approach the allocation scheme may be aimed at load balancing as described above. The allocation unit 904 may comprise (or be in communication with) a load balancing unit 905. Although this is shown as a separate, associated component of the system in Figure 9, in other embodiments load balancing unit may be part of the allocation unit 904, or may be separate relative to the controller 702. Any combination of components may be readily employed.
The individual validators validate the transactions associated with the segment(s) they receive against transaction-level validation criteria. The validators do not require synchronization paradigms between them as they each work independently on verifying that the transactions that they have been allocated are valid. Each validator outputs a result confirming the validity of its allocated transactions. The results are added or accumulated to confirm that all the transactions in the segment are valid. In the event that one of the validators identifies a non-compliant transaction, i.e. an invalid transaction, then it may issue an output, such as an interrupt or other signal, to indicate that there is an invalid transaction. That interrupt or signal may be sent to the other validators or to the controller or another system component so that they can immediately cease testing their respective transactions and not waste further resources on validating transactions within a block that is to be rejected.
In some examples, the system may be arranged to check block-level criteria. This may be performed prior to allocation of the segments to the validators, although it will be appreciated that the block-level validation stage may occur after the transaction-level validation testing by the validators or, in some instances, in parallel with the transaction-level validation testing.
Reference will now be made to Figure 8, which shows, in flowchart form, one example of a method of validating a block. The block contains a plurality of transactions, each transaction references one or more inputs, and each input is a UXTO (except in the case of a coinbase generation transaction). The method is implemented using suitable hardware and processor-executable instructions within a node on the blockchain network.
In operation the distributed validation node 700 receives new block data at step S801. This may be an entire block, or in the case of an SPV-related validation, it may comprise only partial data required for performing an SPV check. We will refer to this as data as "the block" for convenience. The new block that is to be validated may be received from a mining node on the blockchain network that generated the new block and completed the proof-of-work, or it may be received from a merchant node that wishes to perform an (SPV) check, or it may be received from a wallet such as an SPV wallet. The new block may be received from another (non-mining) node in the network. In some examples, the distributed validation node 700 validates the block before forwarding it to any other nodes in the network. As discussed above, the validation of the new block may include confirming that the block meets certain protocol-based criteria, and/or other criteria that may be specified and required within a given implementation.
At step 5802, the system 700 identifies chunks of the block's Merkle tree. At S803 the segments are distributed to a plurality of validators, and S804 the validators process their respective subsets of transactions substantially in parallel and independently of each other. At S805, the validators signal to the controller whether validation has been successful or has failed.
It should be noted that the term "processors", when used in connection with the description of parallel processors herein, does not necessarily mean physically distinct microprocessors and may include any hardware or software implementation that enables parallel processing resources capable of carrying out processor functions independently and in parallel. The parallel processors may include one processor having multiple cores. In some instances, the parallel processors may include multiple separate processing units. The parallel processors may or may not share a physical memory. Each parallel processor, howsoever implemented, has a software or hardware mechanism for signalling, such as to output a signal in response to identifying an invalid transaction. The implementation of the parallel processors also includes providing for the requisite data transfer mechanism, in software and/or hardware, to route the allocated transaction data to the respective processors for local processing.
With respect to Figure 20, system 700 of Figures 7 and 9 form one part or component of larger, wider system 2000. In addition to system 700 described above, system 2000 can further comprise one or more of the following components: 1) a distributed mining component 19.1000 substantially as described herein the section entitled "distributed mining", and as shown in figures 14 to 19, and illustrated in enumerated clause set 7 2) a record storage component 2100 substantially as described herein the section entitled "Records", and as shown in figures 14 to 19, and illustrated in enumerated clause set 6; 3) a resource allocation component1100 substantially as described herein the section entitled "UTXO database", and as shown in figures 14 to 19, and illustrated in enumerated clause set 5.
As with system 700, the overall system2000 can be a closed system which is owned or controlled by a single entity or related group of entities, or it can comprise components which are controlled by or associated with completely independent, un-related entities. The resources (hardware and software) can be located anywhere or take any suitable form. However, they are in communication with one another e.g. via a telecommunications link, LAN or WAN, or the public internet.
For example, a validating resource 704a to 704d which forms part of a distributed validation component 700 may wish to use a distributed mining component 19.000 to perform a PoW calculation. The validation component becomes, therefore, the PoW requester 14.1300 of Figure 19. Similarly, the resource 704a to 704d or the controller 702 of Figure 9 may interact with the UTXO database 1100 or the record storage mechanism 2100 in order to delegate part of their functionality to those other system components.
This provides the advantage that each system component can specialise in its own portion of the system functionality. In turn, this improves efficiency at each of the components because they can provide a designated, dedicated service.
In figure 20, only one of each component type is shown but in practice multiple instances of each or some may be provided. Also, Figure 20 shows each component as separate although in some embodiments one or more components may form sub-components or sub-systems of another. For example, a resource allocation component 1100 and/or record storage component 2100 may be provided within a validator resource 704a or validation system 700. Therefore, the system 2000 components can be provided as internal or external to one another but in communication therewith.
ENUMERATED CLAUSES
Embodiments of various aspects of the present disclosure are provided in the following enumerated clauses for the purpose of illustration, and without limitation. Features enumerated, described or claimed herein are not intended to be exclusive to any particular aspect of the disclosure. Features mentioned below in respect of one set of enumerated clauses or aspect of the disclosure are not intended to be limited in such a regard and any feature(s) mentioned herein in respect of one set of clauses/aspect/embodiment may be incorporated into one or more of the other sets of clauses/aspect/embodiment.
Clause set 1: Clause 1.1: A computer-implemented method of processing (e.g., validating) at least a portion of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block.
Preferably, the method also comprising: allocating respective subsets of the blockchain transactions to a plurality of processing (e.g., validating resources), wherein each respective subset may provide a respective portion of the Merkle tree and may be represented by a respective inner node of the Merkle tree; and/or using the plurality of processing (e.g., validating) resources to process (e.g. Validate) their respective subsets of blockchain transactions.
The term "validator" may be used interchangeably with "validating resource". The plurality of validating resources may form a distributed validation node. At least one of the plurality of validating resources may comprise one or more processing resources. Additionally, or alternatively, one or more of the plurality of validating resources may comprise a validator controller component substantially as described herein.
The respective inner node may be a segment root. In other words, an "inner node" is a node in a Merkle tree that is neither the root node of the entire tree nor a leaf node. The transactions in each subset may share a respective common inner node.
In an alternative wording, each subset may comprise at least two transactions which are associated with a common node in the Merkle tree such that the subset provides and/or is represented by a (sub)portion of the Merkle tree. The common (inner) node may be a segment node or root substantially as described herein. The portion of the Merkle tree may be a "segment" substantially as described herein.
Clause 1.2. A method according to clause 1.1, wherein validating the blockchain block and/or a subset of blockchain transactions comprises: i) validating and/or verifying at least one blockchain transaction; and/or ii) performing a Simplified Payment Verification (SPV) process; and/or iii) confirming whether a given blockchain transaction (Tx) is contained within the blockchain block; and/or Hi) generating a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier (TxID) in a header of the blockchain block.
Clause 1.3. A method according to clause 1.1 or 1.2, wherein: at least one of the subsets of blockchain transactions comprises an identifier that is associated with, identifies and/or represents the subset.
Clause 1.4. A method according to clause 1.3, wherein: the identifier facilitates calculation of the position of the at least one subset within the Merkle tree.
Clause 1.5. A method according to clause 1.3 or 1.4, wherein: the identifier comprises part of a hash of a blockchain transaction within the at least one subset of blockchain transactions.
Clause 1.6. A method according to any preceding clause, wherein: the step of allocating the respective subsets of blockchain transactions to the plurality of validating resources comprises matching the respective subsets to respective validating resources based on respective identifiers associated with the subsets of transactions.
Clause 1.7. A method according to any preceding clause, and further comprising the step: i) downloading at least one subset of blockchain transactions to at least one of the plurality of validating resources; and/or ii) sending at least one subset of blockchain transactions to at least one of the plurality of validating resources Clause 1.8. A method according to any preceding clause, wherein: the Merkle tree comprises a binary tree or a mesh of hashes of the plurality of blockchain transactions.
Clause 1.9. A method according to any preceding clause, and further comprising the step: identifying and/or determining the subsets of blockchain transactions within the plurality of blockchain transactions.
Clause 1.10. A method according to any preceding clause wherein: at least one of the plurality of validating resources is, or comprises, one or more of the following: a virtual machine, a server, a CPU-based computing resource, a processing thread, and/or a multiprocessor system.
Clause 1.11. A method according to any preceding clause wherein: i) the at least two transactions are siblings in the Merkle tree; and/or ii) the common node is parent or an ancestor of the at least two transactions.
Clause 1.12. A blockchain validating system operative to validate at least a portion of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block; wherein the system comprises a plurality of validating resources, each comprising: a processor; and memory including executable instructions that, as a result of execution by the processor, causes the system to perform the computer-implemented method of any preceding clause.
Clause 1.13. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a computer system, cause the computer system to perform the computer-implemented method of any one of clauses 1.1 to 1.11.
According to another aspect of the disclosure, there is provided a computer implemented 25 system arranged to perform any method step or combination of method steps described or claimed herein.
There is also provided a blockchain system (network) comprising a plurality of computer-implemented nodes, wherein each node in the blockchain network comprises: a processor; and memory including executable instructions that, as a result of execution by the processor, causes the system to perform any variation of the computer-implemented method claimed or described herein.
The network may be arranged to operate using a blockchain protocol as described herein.
Additionally or alternatively, the disclosure may comprise a computer implemented method of download at least part of a blockchain block. The block may comprise a plurality of blockchain transactions and a root of a Merkle tree for the block. The method may comprise steps as set out in one or more of the following clauses: Clause Set 2: Clause 2.1 A computer-implemented method. The method preferably comprising the stepof downloading at least part of a blockchain block; preferably, the block comprises a plurality of blockchain transactions and a root of a Merkle tree for the block; the method preferably comprising: allocating respective subsets of the blockchain transactions to a plurality of processing resources, wherein each respective subset provides a respective portion of the Merkle tree and is represented by a respective inner node of the Merkle tree; and/or using one, some or all of the plurality of processing resources to download their respective subset of blockchain transactions.
Each respective subset may be represented by the respective inner node in the sense that the respective inner node may encode the respective subset. That is, the respective inner node may be generated based on (i.e. as a function of) the respective subset. Each transaction in a respective subset may be linked to the respective inner node by one or more hashing operations.
Clause 2.2. A method according to clause 2.1, comprising: one, some or all of the plurality of processing resources sending their respective 30 subset of blockchain transactions to a central storage location.
Clause 2.3. A method according to clause 2.2, wherein: the respective inner node of the Merkle tree has a respective position in the Merkle tree, and wherein the method comprises: arranging the respective subsets of blockchain transactions based on the respective position of the respective inner node of the Merkle tree.
Clause 2.4. A method according to any preceding clause, comprising: one, some or all of the processing resource generating a respective candidate 10 inner node of the Merkle tree based on the respective downloaded subset of blockchain transactions; and further comprising at least one of the following: verifying that the respective candidate inner node matches the respective inner node of the Merkle tree; and/or; verifying that the respective candidate inner node is a node of the Merkle tree by 15 performing a Merkle proof based on the root of the Merkle tree; and/or sending the respective candidate inner node of the Merkle tree to one or more other processing resources.
Clause 2.5. A method according to any preceding clause, comprising: using one, some or all of the plurality of processing resources to validate their respective subset of blockchain transactions.
Clause 2.6. A method according to clause 2.1, wherein: validating the respective subset of blockchain transactions comprises: i) validating and/or verifying at least one blockchain transaction; and/or ii) performing a Simplified Payment Verification process; and/or Hi) confirming whether a given blockchain transaction is contained within the blockchain block; and/or iii) generating a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier in a header of the blockchain block.
Clause 2.7. A method according any preceding clause, wherein: at least one of the respective subsets of blockchain transactions comprises a respective identifier that is associated with, identifies and/or represents the respective subset.
Clause 2.8. A method according to clause 2.7, wherein: the respective identifier facilitates calculation of a respective position of the at least one respective subset within the Merkle tree.
Clause 2.9. A method according to clause 2.7 or 2.8, wherein: the respective identifier is based on the respective inner node of the Merkle tree.
10. A method according to claim 9, wherein: the respective identifier comprises part of the respective inner node of the Merkle tree.
Clause 2.11. A method according to any preceding clause, wherein: the step of allocating the respective subset of blockchain transactions to the plurality of respective processing resources comprises matching the respective subsets to respective processing resources based on respective identifiers associated with the respective subsets of transactions.
Clause 2.12. A method according to any preceding clause, wherein: the Merkle tree comprises a binary tree or a mesh structure of hashes of the plurality of blockchain transactions.
Clause 2.13. A method according to any preceding clause, comprising: identifying and/or determining the subsets of blockchain transactions within the plurality of blockchain transactions.
Clause 2.14. A method according to any preceding clause wherein: at least one of the plurality of processing resources is, or comprises, a virtual machine, a server, a GPU-based computing resource, or a multiprocessor system.
Clause 2.15. A blockchain processing system operative to download at least part of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block; wherein the system comprises a plurality of processing resources, each comprising: a processor; and memory including executable instructions that, as a result of execution by the 15 processor, causes or enables the system to perform the computer-implemented method of any preceding clause.
Clause 2.16. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a 20 computer system, cause or enable the computer system to perform the computer-implemented method of any one of clauses 2.1 to 2.14.
According to another aspect, there is provided a non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed 25 by a processor of a computer system, cause the computer system to perform any version of the computer-implemented method claimed or described herein.
Clause Set 3: Clause 3.1. A computer-implemented method; the method preferably comprising at least 30 one of the steps of: generating, storing and/or maintaining a first UTXO repository for recording, searching and/or processing a plurality of unspent transaction outputs (UTX05), each associated with a transaction (Tx) in a plurality of blockchain transactions (TXs) of a blockchain block; and preferably wherein: the plurality of blockchain transactions provides and/or is represented by a portion of a Merkle tree for the blockchain block.
Clause 3.2. A method according to clause 3.1, and comprising: generating, storing and/or maintaining at least one further UTXO repository.
Clause 3.3. A method according to clause 3.1 or 3.2, and further comprising: creating and/or maintaining a database log that comprises a history of actions, changes and events relating to the UTXO repository.
Clause 3.4. A method according to any preceding clause, wherein: the first and/or at least one further UTXO repository comprises at least one record associated with: i) an unspent transaction output (UTXO); and/or ii) an identifier that is associated with a) an unspent transaction output and/or b) a transaction (Tx) in the plurality of blockchain transactions Clause 3.5. A method according to clause 3.4, wherein: the at least one record comprises a record identifier having: i) a block identifier (block_ID) associated with a blockchain block; and/or ii) a transaction identifier (TxID) associated with a transaction (Tx) in the plurality of blockchain transactions.
Clause 3.6. A method according to clause 3.5, wherein: I) the record identifier comprises a function of the block identifier (block_ID) and the transaction identifier (TxID); and/or ii) a concatenation of the block identifier (block_ID) and the transaction identifier (TxID); and/or Hi) the transaction of the plurality of blockchain transactions is associated with an unspent transaction output (UTXO) Clause 3.7. A method according to clauses 3.5 or 3.6, further comprising the step: using the record identifier to search for, identify, access or insert the at least one record in the UTXO repository.
Clause 3.8. A method according to any of any preceding clause, wherein: at least one unspent transaction output (UTXO) in the plurality (UTX05) is associated in the UTXO repository with a locking flag which: i) indicates whether the unspent transaction output (UTXO) is available or unavailable for spending; and/or ii) is configurable between a first state indicative that spending of the unspent transaction output is allowed and a second state indicative that spending of the unspent transaction output is prohibited.
Clause 3.9. A method according to clause 3.8, the method comprising the step: i) associating the unspent transaction output (UTXO) with the locking flag; and/or ii) changing a state of the locking flag from the first state to the second state, or second state to the first state.
Clause 3.10. A method according to clauses 3.8 or 3.9, comprising the step: sending a communication from a first processing resource to at least one further processing resource to cause the at least one further processing resource to change the state of the locking flag associated with the unspent transaction output from the first state to the second state, or second state to the first state.
Clause 3.11. A method according to clause 3.10, wherein the communication comprises: i) a transaction (TX), a transaction identifier (TxID) and/or a hash of a transaction (Tx); and ii) a list of one or more unspent transaction outputs (UTX05).
Clause 3.12. A method according to clauses 3.10 or 3.11, and comprising the steps: receiving the communication at the at least one further processing resource; changing the state of the locking flag from the first state to the second state, or second state to the first state.
Clause 3.13. A method according to any preceding clause, wherein: i) the portion of the Merkle tree is a sub-portion or segment of the Merkle tree for the blockchain block; and/or ii) the plurality of blockchain transactions is represented by an inner node of the Merkle tree.
Clause 3.14. A blockchain implemented system comprising a plurality of processing resources, each comprising: a processor; and memory including executable instructions that, as a result of execution by the processor, causes or enables the system to perform the computer-implemented method of any preceding clause.
15.A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a computer system, cause or enable the computer system to perform the computer-implemented method of any one of clauses 3.1 to 3.13.
Clause set 4 Any embodiment defined in any clause or combination of clauses in clause set 4 may be arranged to implement or combine with any clause(s) in any other clause set(s) herein. The disclosure may comprise a system which includes a validation component. The system and/or validation component may be operative to facilitate and/or enable distributed validation of at least one blockchain transaction and/or a blockchain block of transactions. The validation component may be provided in accordance with the following clauses in clause set 4.
Clause 4.1. A system operative to validate at least a portion of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block, the system comprising: a plurality of validating resources, each comprising: at least one processor associated with at least one portion of memory storing executable instructions that, as a result of execution by the at least one processor, causes or enable the validating resource to: validate at least one subset of the plurality of blockchain transactions, wherein the at least one subset provides a portion of the Merkle tree and is represented by an inner node of the Merkle tree.
The system may comprise a validation component which comprises the plurality of validating resources.
Clause 4.2. A system according to clause 4.1, wherein the system further comprises: i) a load balancing component arranged to facilitate balancing of the distribution of a plurality of subsets of the plurality blockchain transactions among the plurality of validating resources; and/or ii) a segment identification component arranged to facilitate identification of the at least one subset of the plurality of blockchain transactions; and/or iii) an allocation unit; and/or iv) one or more interfaces for sending or receiving communications between the system and one or more data sources or destinations.
Clause 4.3. A system according to clause 4.1 or 4.2, wherein: the system comprises at least one controller component arranged to influence and/or control the operations of at least one of: at least one validating resource; at least one processor of the at least one validating resource; one or more interfaces; one or more load balancing components; and/or a one or more segment identification components arranged to facilitate identification of the at least one subset of the plurality of blockchain transactions.
Clause 4.4. A system according to any preceding clause wherein: i) at least two transactions in the plurality of blockchain transactions are siblings in the Merkle tree; and/or ii) the inner node is a parent or an ancestor of the subset of blockchain transactions.
Clause 4.5. A system according to any preceding clause and further comprising a plurality of UTXO repositories, each repository in the plurality associated with a respective validating resource and arranged to facilitate recording, searching and/or processing of a plurality of unspent transaction outputs (UTX05); preferably wherein each plurality of unspent transaction outputs is associated with at least one transaction (Tx) in the plurality of blockchain transactions.
Clause 4.6. A system according to clause 4.5, wherein the system is operative to: create and/or maintain a database log that comprises a history of actions, changes and events relating to at least one of the plurality of UTXO repositories Clause 4.7. A system according to any preceding clause, wherein: at least one of the plurality of UTXO repositories comprises at least one record associated with: I) an unspent transaction output (UTXO); and/or ii) an identifier that is associated with a) an unspent transaction output and/or b) a transaction (Tx) in the plurality of blockchain transactions Clause 4.8. A system according to clause 4.7, wherein: the at least one record comprises a record identifier having: i) a block identifier (block_ID) associated with the blockchain block; and/or ii) a transaction identifier (TxID) associated with a transaction (Tx) in the plurality of blockchain transactions.
Clause 4.9. A system according to clause 4.7 or 4.8, wherein the record identifier comprises: i) a function of the block identifier (block ID) and the transaction identifier (TxID); and/or ii) a concatenation of the block identifier (block_ID) and the transaction identifier (TxID).
Clause 4.10. A system according to clause 8 or 9, wherein the system is operative to: use the record identifier to search for, identify, access or insert the at least one record in at least one UTXO repository in the plurality of UTXO repositories.
Clause 4.11 A system according to any of clauses 4.5 to 4.10, wherein: at least one unspent transaction output (UTXO) in the plurality (UTX05) is associated with a locking flag which: i) indicates whether the unspent transaction output (UTXO) is available or unavailable for spending; and/or ii) is configurable between a first state indicative that spending of the unspent transaction output is allowed and a second state indicative that spending of the unspent transaction output is prohibited.
Clause 4.12. A system according to clause 4.11, the system operative to: change a state of the locking flag from the first state to the second state, or second state to the first state.
Clause 4.13. A system according to any preceding clause, wherein the system is operative 10 to: i) allocate respective subsets of the blockchain transactions to the plurality of validating resources; and ii) use one, some or all of the plurality of validating resources to download and/or receive respective subsets of blockchain transactions. 15 Clause 4.14. A system according to any preceding clause, and operative to: use one, some or all of the validating resources to generate a respective candidate inner node of the Merkle tree based on the respective downloaded subset of blockchain transactions; and further operative to perform at least one of the following: verify that the respective candidate inner node matches the respective inner node of the Merkle tree; and/or; verify that the respective candidate inner node is a node of the Merkle tree by performing a Merkle proof based on the root of the Merkle tree; and/or send the respective candidate inner node of the Merkle tree to one or more other processing resources.
Clause 4.15. A system according to any preceding clause, wherein the system is operative to: i) validate and/or verify at least one blockchain transaction; and/or ii) perform a Simplified Payment Verification process; and/or Hi) confirm whether a given blockchain transaction is contained within the blockchain block; and/or Hi) generate a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier in a header of the blockchain block.
Clause 4.16. A system according to any preceding clause wherein: at least one of the plurality of validating resources is, or comprises at least one of: a virtual machine, a server, a GPU-based computing resource, a thread, and/or a multiprocessor system.
Clause set 5 Any embodiment defined in any clause or combination of clauses in clause set 5 may be arranged to implement or combine with any feature or clause(s) described or included in the description or any other clause set included herein Clauses in clause set 5 may relate in particular to the features described herein in the section entitled "UTXO database". Clause 5.1 A computer-implemented method comprising: using a portion of data derived from a blockchain to identify and/or allocate a processing and/or storage resource, wherein said data from which the portion of data is derived from or comprises an (unspent) transaction output and/or a transaction (Tx) containing an unspent output The output may be referred to as a UTXO.
Said data can additionally or alternatively comprise transaction data for determining the at least a portion of a transaction (Tx) is included in the Merkle path of a blockchain block (3).
Information associated with the data derived from the blockchain is to be stored in a resource for efficient and cost effective reference. By using a portion of data to allocate the resource a relationship between the data, its associated information and the resource 30 in which it is stored is maintained. The data can include an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO. A portion of that data may be used to determine a key, which in turn determines an allocated resource that will store information about said data.
A database of outputs e.g. UTX05 and or transactions having UTX05 can be established. The database can be distributed, resulting in a distributed pool. The database can hold at least one of: a flag of the validity of the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO; and information enabling the validity of an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO to be determined, e.g. SPV information.
Prior to allocation, which enables subsequent identification of the resource, the method can include retrieving a portion of data derived from a blockchain and/or the associated data. Following allocation, the method can include storing and/or validating an unspent 15 transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
The allocation can support, or provide, load balancing between a plurality of resources. Clause 5.2. The method of clause 5.1, further comprising storing and/or processing at least a portion of the UTXO and/or the transaction (Tx): in the allocated resource; and/or by the allocated resource; and/or in association with the allocated resource.
Processing can include at least one of: validating the UTXO and/or the transaction (Tx); managing the information associated with the data into an accessible structure, such as a database.
Clause 5.3. The method of clause 5.1 or 5.2, further comprising: receiving at the allocated resource said data from which the portion of data is derived: parsing said data to determine whether to process said data and/or store information derived from said data, or take no action.
One a plurality of resources can receive a portion of data and/or information associated with said data and determine whether it is responsible for storing information related to said UTXO.
Clause 5.4. The method of any preceding clause, further comprising deriving the portion of data from the blockchain.
Clause 5.5. The method of any preceding clause, wherein identification and/or allocation to the processing and/or storage resource is performed by an intermediary connected to a plurality of allocated resources.
Clause 5.6. The method of any preceding clause, wherein the allocated resource at least one of: validates, at least in part, the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO; and generating, storing and/or maintaining a record of validation data required to validate the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
Clause 5.7. The method of clause 5.1, wherein the data includes at least one of: a UTXO identifier; a hash of the UTXO script; the transaction identification (TXID).
Clause 5.8. The method of any preceding clause, wherein processing the data includes determining a key, wherein the key determines the allocated resource.
Clause 5.9. The method of clause 5.8, wherein the key is hashed and the resulting hash 25 determines the allocated resource.
Clause 5.10. The method of any preceding clause, wherein at least one of the data, the key, and the resulting hash comprises at least one of: an alphanumeric number; and a binary number, and said number is used to determine the allocated resource Clause 5.11. The method of clause 5.10, wherein a portion of the number is parsed to determine the allocated resource.
Clause 5.12. The method of any preceding clause, wherein a hash table determines the 5 allocated resource in which at least a portion of the UTXO and/or the transaction (Tx) is stored.
Clause 5.13. The method of any of clauses 5.6 to 5.12, wherein the record of the at least a portion of the UTXO and/or the transaction (Tx) comprises at least one of: a Merkle Tree of the block in which said transaction (Tx) is recorded; the Merkle root the block in which said transaction (Tx) is recorded; a Merkle path, which enables the determination of the value for the Merkle root for the block in which said transaction (Tx) is recorded, from a hash of said transaction (Tx); a Merkle proof; a block identifier (block_ID) associated with the blockchain block; a transaction identifier (TxID) associated with a transaction (Tx) in the plurality of blockchain transactions within the blockchain block; a function of the block identifier (block_ID) and the transaction identifier (TxID); and a concatenation of the block identifier (block_ID) and the transaction identifier (TxID).
Clause 5.14. The method of any preceding clause, further comprising, for at least a portion of the transaction (Tx) and/or said UTXO, at least one of: validating and/or verifying said UTXO; performing at least part of a Simplified Payment Verification (SPV) process for said UTXO; confirming whether a given blockchain transaction (Tx) is contained within the blockchain block; generating a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier (TxID) in a header of the blockchain block; and determining a Merkle proof for said UTXO.
Clause 5.15. A computer-implemented method comprising the steps: generating, storing and/or maintaining a first UTXO resource for recording, searching and/or processing a 30 plurality of unspent transaction outputs (UTX05), each associated with a transaction (Tx) in a plurality of blockchain transactions (TXs) of a blockchain block; using a portion of data derived from a blockchain to identify and/or allocate said resource, wherein said data from which the portion of data is derived comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
Clause 5.16. A computer-implemented method comprising: receiving and/or processing an unspent transaction output (UTXO) for inclusion in a transaction; and/or using the portion of data derived from the UTXO to identify an allocated resource, wherein said allocated resource holds validation data for the UTXO; and/or requesting the validation data from the allocated resource.
Clause 5.17. The method of clause 5.16, further comprising obtaining from the allocated resource, at least one of: validation of the UTXO and/or the transaction (Tx) containing said UTXO, and/or 15) a record for determining the validity of the UTXO and/or the transaction (Tx) containing said UTXO.
Clause 5.18. The method of any preceding clause, further comprising: preparing and/or transmitting a transaction (Tx) having said UTXO as an input.
Clause 5.19. A blockchain node configured to at least one of generate, store and maintain a UTXO resource for recording, searching and/or processing a plurality of unspent transaction outputs (UTX05), wherein said node processes a portion of data derived from a blockchain to identify and/or allocate a processing and/or storage resource, wherein said data from which the portion of data is derived comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
Clause 5.20. Computer equipment comprising: memory comprising one or more memory units; and processing apparatus comprising one or more processing units, wherein the 30 memory stores code arranged to run on the processing apparatus, the code being configured so as when on the processing apparatus to perform the method of any of clauses 5.1 to 5.18.
Clause 5.21. A computer program embodied on computer-readable storage and configured so as, when run on one or more processors, to perform the method of any of clauses 5.1 to 5.18.
Clause set 6 Any embodiment defined in any clause or combination of clauses in clause set 6 may be 10 arranged to implement or combine with any clause(s) in clause sets 1 to 5. Clauses in clause set 6 may relate in particular to the features described herein in the section entitled "Records".
Clause 6.1 A computer-implemented method comprising: generating, storing, processing, accessing and/or maintaining a record of at least a portion of a transaction (Tx) wherein the record comprises transaction data for determining the at least a portion of a transaction (Tx) is included in the Merkle path of a blockchain block (B).
Overall, the record functions to hold information e.g. data items. As described elsewhere, records can be stored in allocated resources e.g. a database, which can be part of a resource connected to the blockchain e.g. a node or other resource connected to the blockchain network. The invention is not so limited, and the validation, allocation/identification and format of the record can be used to implement the functionality of a node, which can be off-chain.
The records comprise, at least, transaction data and can also comprise a status flag/state, verification information, validation data, details of where a UTXO can be found, reference to at least one previous record e.g. the location, signatures and authorization data. The record enables data related to a transaction to be stored, and to be stored in a catalogued manner.
Expressed another way, the record is part of a pruned version of a blockchain block. A record will be part of a collection of records, preferably stored in allocated resources, and hold data items obtained directly from a block of a blockchain and/or data derived from the blockchain e.g., validation data or a collection of information associated with a transaction.
The system 1100 managing the database and/or allocated resources 1104 holding the records of transactions can be said to operate like a node -the record holds transaction data having at least a portion of a transaction that is included in the Merkle path, thus a Merkle-linked pruned node can be implemented.
By way of example, the system e.g., a Merkle-linked pruned node can be established and user by an owner. For example, blockchain data associated with tokens issued by the Bank of England can be held as records in allocated resources. The records can be a pruned and/or enhanced version of the corresponding transaction data held on the blockchain.
Configuring the record compliments at least one of the validation of transactions, and the allocation and/or identification of a processing and/or storage resource, as taught herein. The record contents enable improvements in security and resilience, efficiency or reduction of speed and resource requirements when used, said use including verification of the transaction to which the record relates.
Allocation and/or identification is based on a portion of data derived from a whole or at least a portion of a blockchain transaction e.g. the portion of data derived comprises transaction data, which can be an unspent transaction output (UTX0) and/or a transaction (Tx) containing a UTXO. The data can additionally or alternatively comprise transaction data for determining the at least a portion of a transaction is included in the Merkle path of a blockchain block.
Clause 6.2 The method of clause 1, wherein the record comprises a data catalogue, said data catalogue is or comprises a set of the transaction data.
Clause 6.3 The method of clause 1 or 2, wherein the record is processed and/or stored in an allocated resource (1104).
Clause 6.4 The method of any preceding clause, wherein the at least a portion of a transaction (Tx) is an output of the transaction.
Clause 6.5 The method of clause 4, wherein the output of the transaction is an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO of a blockchain block.
Clause 6.6 The method of any preceding clause, wherein the record is stored in a database, said record comprising: i) a blockchain transaction (TXO) comprising at least one data item (D); and ii) at least one further blockchain transaction (TX1) necessary for confirming that the blockchain transaction (TX1) is included in the Merkle path of a blockchain block (B).
Clause 6.7 The method of any preceding clause, wherein using the database comprises generating, maintaining, providing, updating, storing, accessing or processing: i) the database; and/or ii) data that is stored within, or in association with, the database.
Clause 6.8 The method of any preceding clause, wherein the record further comprises: a Merkle path from the transaction (TXO) to a root of a Merkle tree for the blockchain block (B); Clause 6.9 The method of any preceding clause, wherein: the Merkle path comprises at least the minimum blockchain transactions necessary to establish or verify that the blockchain transaction (TXO) is included in the blockchain block (B).
Clause 6.10 The method of any preceding clause, wherein the blockchain block is stored on or in association with: i) a blockchain ledger; and/or ii) an off-chain storage resource.
Clause 6.11 The method of any of clauses 6 to 10, further comprising using the blockchain transaction (TXO) and the at least one further blockchain transaction (TX1) to verify that the blockchain transaction (TXO) is included in the Merkle path of the blockchain block (B).
Clause 6.12 The method of any of clauses 6 to 11, wherein the data item (D): is stored in association with a script in the transaction; and/or is stored as metadata within the transaction.
Clause 6.13 The method of any preceding clause, wherein the record further comprises validation data required to validate the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
Clause 6.14 The method of any preceding clause, wherein the record further comprises a history of a plurality of preceding transactions of the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
Clause 6.15 The method of any preceding clause, wherein the record further comprises a history of the allocated resources that processed and/or stored the data of at least one preceding transaction, preferably at least one transaction of the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
Clause 6.16 The method of clauses 14 or 15, wherein said history includes at least one of: a set of transaction data for determining a Merkle proof of the a plurality of preceding transactions; a link to the respective allocated resources that processed and/or stored the plurality of preceding transactions.
Clause 6.17 The method of any preceding clause, wherein the record further comprises a flag and/or status indication of the or each input of the unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO.
Clause 6.18 The method of any preceding clause, wherein the record further comprises at least one of: a Merkle Tree of the block in which said transaction (Tx) is recorded; the Merkle root the block in which said transaction (Tx) is recorded; a Merkle path, which enables the determination of the value for the Merkle root for the block in which said transaction (Tx) is recorded, from a hash of said transaction (Tx); a Merkle proof; a block identifier (block_ID) associated with the blockchain block; a transaction identifier (TxID) associated with a transaction (Tx) in the plurality of blockchain transactions within the blockchain block; a function of the block identifier (block_ID) and the transaction identifier (TxID); a concatenation of the block identifier (block_ID) and the transaction identifier (TxID); a digital signature; an authentication code; a signature message for determining a transactional state; a protocol flag; a discretionary public key (DPK); and a discretionary transaction ID (DTxID).
Clause 6.19 The method of any of clauses 3 to 18, wherein the allocated resource for processing and/or storage of the record is identified and/or allocated using a portion of data derived from a blockchain to identify and/or allocate a resource, wherein said data from which the portion of data is derived comprises the unspent transaction output (UTXO) and/or the transaction (Tx) containing a UTXO.
Clause 6.20 A computer-implemented method comprising: using a database comprising at least one record, the at least one record comprising: i) a blockchain transaction (TXO) comprising at least one data item (D); and ii) at least one further blockchain transaction (TX1) necessary for confirming that the blockchain transaction (TX1) is included in the Merkle path of a blockchain block (B).
Clause 6.21 The method of clause 20, wherein using the database comprises generating, maintaining, providing, updating, storing, accessing or processing: i) the database; and/or data that is stored within, or in association with, the database.
Clause 6.22 The method of clause 20 or 21, wherein the record further comprises: a Merkle path from the transaction (TXO) to a root of a Merkle tree for the blockchain block (B) Clause 6.23 The method of clause 22, wherein the Merkle path comprises at least the minimum blockchain transactions necessary to establish or verify that the blockchain transaction (TXO) is included in the blockchain block (B).
Clause 6.24 The method of any of clauses 20 to 23, wherein the block is stored on or in association with: i) a blockchain ledger; and/or an off-chain storage resource.
Clause 6.25 The method of any of clauses 20 to 24, further comprising using the blockchain transaction (TXO) and the at least one further blockchain transaction (TX1) to verify that the blockchain transaction (TXO) is included in the Merkle path of the blockchain block (B).
Clause 6.26 The method of any of clauses 20 to 25, wherein the data item (D): is stored in association with a script in the transaction; and/or is stored as metadata within the transaction.
Clause 6.27 The method of any of clauses 20 to 26, wherein the transaction further comprises: a transaction ID (TxID); a protocol flag; a discretionary public key (DPI(); and a discretionary transaction ID (DTxID).
Clause 6.28 Computer equipment comprising: memory comprising one or more memory units; and processing apparatus comprising one or more processing units, wherein the memory stores code arranged to run on the processing apparatus, the code being configured so as when on the processing apparatus to perform the method of any of clauses 1. to 27.
Clause 6.29 A computer program embodied on computer-readable storage and configured so as, when run on one or more processors, to perform the method of any of clauses 1 to 27.
Clause set 7 Any embodiment defined in any clause or combination of clauses in clause set 7 may be 10 arranged to implement or combine with any clause(s) in one or more other enumerated clause sets included herein. Clauses in clause set 7 may relate in particular to the features described herein in the section entitled "Distributed mining".
The present disclosure may provide methods and systems for distributed and/or parallel processing of data records. It may provide such methods/systems for mining of blockchain transactions in a blockchain block, and/or for generation of a Proof-of-Work (PoW) for a blockchain block. Advantageously, embodiments may allow for separation of the PoW calculation from other blockchain mining/validation tasks. The disclosure may be described as providing an authorisation and/or control mechanism for improved blockchain mining techniques and/or improved PoW generation techniques. It may also be described as an improved security technique.
Preferably, a PoW requester (first party/entity) may send a specialist PoW provider (second party/entity) one or more of: i) a Merkle root for a Merkle tree that represents a set of transactions ii) a control transaction (TX0) and iii) a Merkle proof which confirms that TX0 is included in the set of transactions. TX0 may provide or comprise control data that the PoW provider can use to determine whether or not performance of the PoW calculation is to be performed or completed.
A preferred embodiment may be described as: Clause 7.1. A computer-implemented method comprising: sending, from a first resource to a second resource, a request to generate a ProofOf-Work (PoW) for a blockchain block containing a plurality of transactions, the request comprising a Merkle proof for verification that a control transaction (TX0) is included in the plurality of transactions; and/or receiving, at the second resource from the first resource, a request to generate a Proof-Of-Work (PoW) for a blockchain block containing a plurality of transactions, the request comprising a Merkle proof for verification that a control transaction (TX0) is included in the plurality of transactions.
The first resource may be a PoW requester and the second resource may be a PoW provider. The PoW may be any PoW specified by a blockchain protocol. The Merkle proof may comprise data sufficient to prove that a given blockchain transaction is included in a particular set of transactions, and conversely disprove that it is included in the set of transactions. The set of transactions may be represented by a Merkle tree Tthat has a Merkle root R. Clause 7.2. A method according to clause 1, wherein: the control transaction (TX0) comprises control data for controlling, allowing and/or prohibiting the performance of the Proof-of-Work generation; preferably wherein the control data comprises: i) at least one output that specifies a predetermined address for the destination of a blockchain transfer; preferably wherein the address is associated with the second resource or a party associated with or authorised by the second resource; and/or ii) at least one pre-determined signature; and/or iii) at least one secret value or secret portion of data.
Clause 7.3. A method according to clause 7.1 or 7.22, wherein: the first resource is a PoW requesting resource, a blockchain validation resource or a blockchain mining resource; and/or the second resource is a Proof-of-Work Provider; and/or the second resource comprises at least one ASIC or hash machine or specialized cryptocurrency mining resource.
Clause 7.4. A method according to any preceding clause, and further comprising: i) receiving, at the first resource from the second resource, a Proof-Of-Work for the blockchain block; and/or ii) sending, to the first resource from the second resource, a Proof-Of-Work for the blockchain block.
Clause 7.5. A method according to any preceding clause, wherein the Proof-Of-Work comprises: a value (nonce) arranged to provide an output that satisfies one or more of: a target, rule or criteria specified by a blockchain protocol; and/or a block header for the blockchain block; and/or a puzzle or challenge solution specified in accordance with a blockchain protocol.
Clause 7.6. A method according to any preceding clause, wherein generating the ProofOf-Work comprises: i) generating or selecting a value (nonce) arranged to provide an output that meets a target, challenge, rule or criteria specified by a blockchain protocol; ii) concatenating a block message for the blockchain block with a nonce; and/or ili) double hashing a block header for the blockchain block.
Clause 7.7. A method according to any preceding clause, and comprising processing or comparing at least a portion of the control transaction (TX0) in respect of a pre-defined control criteria and generating or not generating the Proof-ofWork based on the output of the processing or comparison; preferably wherein the control criterium comprises at least one of a threshold, rule or criteria for allowing initiation, performance or completion or the ProofOf-Work generation.
Clause 7.8. A method according to clause 7.7 and further comprising: allowing or prohibiting the generation of the Proof-of-Work based upon: i) successful or unsuccessful confirmation that the control transaction (TX0) is included in the plurality of transactions; and/or ii) determination that the control transaction comprises or does not comprise a portion of data which satisfies a predetermined rule or criteria; and/or iii) determination that the control transaction or at least a portion of it meets the control criteria.
Clause 7.9. A method according to any preceding clause, and comprising the step of determining, at the first or second resource, a portion of data required by a blockchain protocol for generation of a Proof-of-Work for a block, the portion of data comprising one or more of: a protocol version identifier; a block hash; a Proof-of-Work difficulty target specified by the protocol; and/or a timestamp.
Clause 7.10. A method according to any preceding clause, wherein: i) the Merkle proof comprises data arranged to enable performance of an SPV verification to determine whether the control transaction is included in the plurality of transactions; ii) the request includes the control transaction.
Clause 7.11. A method according to any preceding clause, and comprising the step of: processing the plurality of transactions to a provide a Merkle tree; preferably wherein the processing involves a hashing function.
Clause 7.12. A method according to any preceding clause, wherein: the control transaction (TX0) comprises an identifier to enable the second resource to identify the first resource; preferably wherein the identifier is provided in an input, output, script or metadata portion of the control transaction.
Clause 7.13. A system operative to control or influence the generation of a Proof-Of-Work generation for a blockchain block containing a plurality of transactions, and/or operative to implement the method of any preceding clause.
Clause 7.14. A system in accordance with clause 7.13 and comprising at least one of: at least one Proof-Of-Work providing resource (1000); preferably wherein the at least one Proof-Of-Work providing resource comprises at least one ASIC or hash machine (1100a to 1100c);at least one Proof-Of-Work requesting resource (1300); preferably wherein the at least one Proof-Of-Work requesting resource comprises a distributed validation node (700) substantially disclosed herein.
Clause 7.15. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by a processor of a computer system, cause or enable the computer system to perform the computer-implemented method of any one of clauses 7.1 to 7.13.
Clause set 8 Any embodiment defined in any clause or combination of clauses in clause set 8 may be 25 arranged to implement or combine with any clause(s) in any other clause set(s) herein. The disclosure may comprise a computer implemented system. The system may be a distributed blockchain system.
The system may include at least one (distributed) validation component. The system 30 and/or validation component may be operative to facilitate and/or enable (distributed) validation of at least one blockchain transaction and/or a blockchain block of transactions. The validation component may be provided in accordance with the clauses in clause set 4, or arranged to perform the method or combination of methods, of any of clauses in clause sets 1, 2, 3 and/or 4.
The system may comprise a (distributed) mining component. The mining component may be operative to facilitate and/or enable distributed mining of a blockchain block and/or calculation of a Proof-of-Work calculation. The distributed mining component may be provided in accordance with one or more of the clauses in clause set 7, or arranged to perform the method of any of clauses in clause set 7 or as disclosed in the section entitled "distributed mining" and/or Figures 14 to 19.
The system may comprise at least one record storage component. This may be a database. The database may be provided in accordance with one or more of the clauses in clause set 5, or substantially as disclosed in the section entitled "Records" and/or Figure 13. The record storage components may comprise a record of at least a portion of a blockchain transaction, the record comprising transaction data for determining whether the at least a portion of a transaction (Tx) is included in the Merkle path of a blockchain block.
The system may at least one allocation component operative to allocate blockchain-related or implemented tasks to at least one computing resource. It may be operative to operative to allocate blockchain-related or implemented tasks to at least one computing resource, by using a portion of data derived from a blockchain to identify and/or allocate a (computer-based) processing/storage resource. The portion of data may be derived from (a larger portion of) data that comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing an unspent transaction output. The allocation component may be provided in accordance with one or more of the clauses in clause set 6, or as disclosed in the section entitled "UTXO database" and/or Figures 10 to 12.
The system may comprise one of the above mentioned components, or more than one of these components. When a plurality of components is used, the components are arranged for communication. Components of the system may be arranged to read from and/or write to a blockchain and/or blockchain network. The blockchain may be associated with a blockchain protocol which is implemented by the network.
Clause 8.1. A computer-implemented system comprising any one, two or more of the following components: i) at least one validation component; ii) at least one mining component; iii) at least one task allocation component; iv) at least one record storage component comprising a record of (at least) a portion of a blockchain transaction, the record comprising transaction data for determining whether the (at least a) portion of the transaction (Tx) is included in the Merkle path of a blockchain block.
Clause 8.2. A system according to clause 8.1, wherein the at least one validation component is operative to: validate at least a portion of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block; and preferably: allocate respective subsets of the blockchain transactions to a plurality of validating (processing) resources, wherein each respective subset provides a respective portion of the Merkle tree and is represented by a respective inner node of the Merkle tree; and use the plurality of validating resources to validate their respective subsets of blockchain transactions.
Clause 8.3. A system according to clause 8.1 or 8.2, wherein the at least one validation component is operative to: download at least part of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block; preferably wherein the validation component is arranged to perform the download by: allocating respective subsets of the blockchain transactions to a plurality of processing resources, wherein each respective subset provides a respective portion of the Merkle tree and is represented by a respective inner node of the Merkle tree; and using one, some or all of the plurality of processing resources to download their respective subset of blockchain transactions.
Clause 8.4. A system according to any preceding Clause, wherein the at least one validation component is operative to: generate, store and/or maintain a first UTXO repository for recording, searching and/or processing a plurality of unspent transaction outputs (UTX05), each associated with a transaction (Tx) in a plurality of blockchain transactions (TXs) of a blockchain block; wherein: the plurality of blockchain transactions provides and/or is represented by a portion of a Merkle tree for the blockchain block.
Clause 8.5. A system according to any preceding Clause, wherein the system and/or at least one validation component is operative to: i) validate and/or verify at least one blockchain transaction; and/or ii) perform a Simplified Payment Verification process; and/or iii) confirm whether a given blockchain transaction is contained within the blockchain block; and/or iii) generate a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier in a header of the blockchain block.
Clause 8.6. A system according any preceding Clause wherein the system and/or at least one validation component comprises at least one validating resource which is, or comprises, at least one of: a virtual machine, a server, a GPU-based computing resource, a thread, and/or a multiprocessor system.
Clause 8.7. A system according to any preceding Clause wherein the at least one allocation component is operative to: i) use a portion of data derived from a blockchain to identify and/or allocate a processing and/or storage resource; preferably wherein the portion of data comprises or is derived from an unspent transaction output (UTXO) and/or a blockchain transaction (Tx) containing an unspent transaction; and/or ii) use/provide, generate, store and/or maintain a first UTXO resource arranged to a) record, search and/or process a plurality of unspent transaction outputs (UTX0s), each associated with a transaction (Tx) in a plurality of blockchain transactions (TXs) of a blockchain block; and/or b) use a portion of data derived from a blockchain to identify and/or allocate said resource, wherein said data from which the portion of data is derived comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO; and/or iii) receive and/or process an unspent transaction output (UTXO) for inclusion in a transaction; and/or use the portion of data derived from the unspent output to identify an allocated resource, wherein said allocated resource holds validation data for the UTXO; and/or request the validation data from the allocated resource.
Clause 8.8. The system of clause 8.7, wherein the at least one allocation component is 30 further operative to: store and/or process at least a portion of the unspent output and/or the transaction (Tx): in the allocated resource; and/or by the allocated resource; and/or in association with the allocated resource.
Clause 8.9. The system of any preceding Clause, wherein the at least one mining component is operative to: send, from a first resource to a second resource, a request to generate a Proof-OfWork (PoW) for a blockchain block containing a plurality of transactions, the request comprising a Merkle proof for verification that a control transaction (TX0) is included in the plurality of transactions; and/or receive, at the second resource from the first resource, a request to generate a Proof-Of-Work (PoW) for a blockchain block containing a plurality of transactions, the request comprising a Merkle proof for verification that a control transaction (TX0) is included in the plurality of transactions Clause 8.10. A system according to clause 8.9, wherein: the control transaction (TX0) comprises control data for controlling, allowing and/or prohibiting the performance of the Proof-of-Work generation; preferably wherein the control data comprises: i) at least one output that specifies a predetermined address for the destination of a blockchain transfer; preferably wherein the address is associated with the second resource, or a party associated with or authorised by the second resource; and/or ii) at least one pre-determined signature; and/or iii) at least one secret value or secret portion of data.
Clause 8.11. A system according to clause 8.9 or 8.10, wherein: the first resource is a PoW requesting resource, a blockchain validation resource or a blockchain mining resource; and/or the second resource is a Proof-of-Work Provider; and/or the second resource comprises at least one ASIC or hash machine or specialized cryptocurrency mining resource.
Clause 8.12. A system according to any preceding Clause, wherein the at least one record 5 storage component comprises: at least one record, the at least one record comprising: i) a blockchain transaction (TXO) comprising at least one data item (D); and at least one further blockchain transaction (TX1) necessary for confirming that the blockchain transaction (TX1) is included in the Merkle path of a blockchain block (B).
Clause 8.13. The system of clause 8.12, wherein: the record further comprises: a Merkle path from the transaction (TXO) to a root of a Merkle tree for the blockchain block (B); and preferably wherein the Merkle path comprises at least the minimum blockchain transactions necessary to establish or verify that the blockchain transaction (TXO) is included in the blockchain block (B).
Clause 8.14. A computer program embodied on computer-readable storage and arranged 20 or configured so as, when run on one or more processors, to: i) implement some or all of the functionality of the system claimed herein; and/or ii) implement, facilitate, enable or provide one or more of the features of any of preceding clause.
EXAMPLE TECHNICAL ENVIRONMENT FOR IMPLEMENTATION OF AN ILLUSTRATIVE EMBODIMENT OF THE DISCLOSURE
We now describe an overview of a computing environment in which one or more embodiments of the disclosure may be put into practice. However, as noted above, this context is not intended to be limiting and embodiments may be put into effect for the processing of data records and structures that are not implemented via a blockchain.
Non-blockchain embodiments may be devised e.g. using a database instead of a distributed ledger.
Figure 1 shows an example system 100 for implementing a blockchain 150. The system 5 100 may comprise a packet-switched network 101, typically a wide-area internetwork such as the Internet. The packet-switched network 101 comprises a plurality of blockchain nodes 104 that may be arranged to form a peer-to-peer (P2P) network 106 within the packet-switched network 101. Whilst not illustrated, the blockchain nodes 104 may be arranged as a near-complete graph. Each blockchain node 104 is therefore highly 10 connected to other blockchain nodes 104.
Each blockchain node 104 comprises computer equipment of a peer, with different ones of the nodes 104 belonging to different peers. Each blockchain node 104 comprises processing apparatus comprising one or more processors, e.g. one or more central processing units (CPUs), accelerator processors, application specific processors and/or field programmable gate arrays (FPGAs), and other equipment such as application specific integrated circuits (ASICs). Each node also comprises memory, i.e. computer-readable storage in the form of a non-transitory computer-readable medium or media. The memory may comprise one or more memory units employing one or more memory media, e.g. a magnetic medium such as a hard disk; an electronic medium such as a solid-state drive (SSD), flash memory or EEPROM; and/or an optical medium such as an optical disk drive.
The blockchain 150 comprises a chain of blocks of data 151, wherein a respective copy of the blockchain 150 is maintained at each of a plurality of blockchain nodes 104 in the distributed or blockchain network 106. As mentioned above, maintaining a copy of the blockchain 150 does not necessarily mean storing the blockchain 150 in full. Instead, the blockchain 150 may be pruned of data so long as each blockchain node 150 stores the block header (discussed below) of each block 151. Each block 151 in the chain comprises one or more transactions 152, wherein a transaction in this context refers to a kind of data structure. The nature of the data structure will depend on the type of transaction protocol used as part of a transaction model or scheme. A given blockchain will use one particular transaction protocol throughout. In one common type of transaction protocol, the data structure of each transaction 152 comprises at least one input and at least one output. Each output specifies an amount representing a quantity of a digital asset as property, an example of which is a user 103 to whom the output is cryptographically locked (requiring a signature or other solution of that user in order to be unlocked and thereby redeemed or spent). Each input points back to the output of a preceding transaction 152, thereby linking the transactions.
Each block 151 also comprises a block pointer 155 pointing back to the previously created block 151 in the chain so as to define a sequential order to the blocks 151. Each transaction 152 (other than a coinbase transaction) comprises a pointer back to a previous transaction so as to define an order to sequences of transactions (N.B.
sequences of transactions 152 are allowed to branch). The chain of blocks 151 goes all the way back to a genesis block (Gb) 153 which was the first block in the chain. One or more original transactions 152 early on in the chain 150 pointed to the genesis block 153 rather than a preceding transaction.
Each of the blockchain nodes 104 is configured to forward transactions 152 to other blockchain nodes 104, and thereby cause transactions 152 to be propagated throughout the network 106. Each blockchain node 104 is configured to create blocks 151 and to store a respective copy of the same blockchain 150 in their respective memory. Each blockchain node 104 also maintains an ordered set (or "pool") 154 of transactions 152 waiting to be incorporated into blocks 151. The ordered pool 154 is often referred to as a "mempool". This term herein is not intended to limit to any particular blockchain, protocol or model. It refers to the ordered set of transactions which a node 104 has accepted as valid and for which the node 104 is obliged not to accept any other transactions attempting to spend the same output.
In a given present transaction 152j, the (or each) input comprises a pointer referencing the output of a preceding transaction 152i in the sequence of transactions, specifying that this output is to be redeemed or "spent" in the present transaction 152j. In general, the preceding transaction could be any transaction in the ordered set 154 or any block 151.
The preceding transaction 152i need not necessarily exist at the time the present transaction 152j is created or even sent to the network 106, though the preceding transaction 152i will need to exist and be validated in order for the present transaction to be valid. Hence "preceding" herein refers to a predecessor in a logical sequence linked by pointers, not necessarily the time of creation or sending in a temporal sequence, and hence it does not necessarily exclude that the transactions 152i, 152j be created or sent out-of-order (see discussion below on orphan transactions). The preceding transaction 152i could equally be called the antecedent or predecessor transaction.
The input of the present transaction 152j also comprises the input authorisation, for example the signature of the user 103a to whom the output of the preceding transaction 152i is locked. In turn, the output of the present transaction 152j can be cryptographically locked to a new user or entity 103b. The present transaction 152j can thus transfer the amount defined in the input of the preceding transaction 152i to the new user or entity 103b as defined in the output of the present transaction 152j. In some cases a transaction 152 may have multiple outputs to split the input amount between multiple users or entities (one of whom could be the original user or entity 103a in order to give change). In some cases a transaction can also have multiple inputs to gather together the amounts from multiple outputs of one or more preceding transactions, and redistribute to one or more outputs of the current transaction.
According to an output-based transaction protocol such as bitcoin, when a party 103, such as an individual user or an organization, wishes to enact a new transaction 152j (either manually or by an automated process employed by the party), then the enacting party sends the new transaction from its computer terminal 102 to a recipient. The enacting party or the recipient will eventually send this transaction to one or more of the blockchain nodes 104 of the network 106 (which nowadays are typically servers or data centres, but could in principle be other user terminals). It is also not excluded that the party 103 enacting the new transaction 152j could send the transaction directly to one or more of the blockchain nodes 104 and, in some examples, not to the recipient. A blockchain node 104 that receives a transaction checks whether the transaction is valid according to a blockchain node protocol which is applied at each of the blockchain nodes 104. The blockchain node protocol typically requires the blockchain node 104 to check that a cryptographic signature in the new transaction 152j matches the expected signature, which depends on the previous transaction 152i in an ordered sequence of transactions 152. In such an output-based transaction protocol, this may comprise checking that the cryptographic signature or other authorisation of the party 103 included in the input of the new transaction 152j matches a condition defined in the output of the preceding transaction 152i which the new transaction assigns, wherein this condition typically comprises at least checking that the cryptographic signature or other authorisation in the input of the new transaction 152j unlocks the output of the previous transaction 152i to which the input of the new transaction is linked to. The condition may be at least partially defined by a script included in the output of the preceding transaction 152i. Alternatively it could simply be fixed by the blockchain node protocol alone, or it could be due to a combination of these. Either way, if the new transaction 152j is valid, the blockchain node 104 forwards it to one or more other blockchain nodes 104 in the blockchain network 106. These other blockchain nodes 104 apply the same test according to the same blockchain node protocol, and so forward the new transaction 152j on to one or more further nodes 104, and so forth. In this way the new transaction is propagated throughout the network of blockchain nodes 104.
In an output-based model, the definition of whether a given output (e.g. UTXO) is assigned (e.g. spent) is whether it has yet been validly redeemed by the input of another, onward transaction 152j according to the blockchain node protocol. Another condition for a transaction to be valid is that the output of the preceding transaction 152i which it attempts to redeem has not already been redeemed by another transaction. Again if not valid, the transaction 152j will not be propagated (unless flagged as invalid and propagated for alerting) or recorded in the blockchain 150. This guards against double-spending whereby the transactor tries to assign the output of the same transaction more than once. An account-based model on the other hand guards against double-spending by maintaining an account balance. Because again there is a defined order of transactions, the account balance has a single defined state at any one time.
In addition to validating transactions, blockchain nodes 104 also race to be the first to create blocks of transactions in a process commonly referred to as mining, which is supported by "proof-of-work". At a blockchain node 104, new transactions are added to an ordered pool 154 of valid transactions that have not yet appeared in a block 151 recorded on the blockchain 150. The blockchain nodes then race to assemble a new valid block 151 of transactions 152 from the ordered set of transactions 154 by attempting to solve a cryptographic puzzle. Typically this comprises searching for a "nonce" value such that when the nonce is concatenated with a representation of the ordered pool of pending transactions 154 and hashed, then the output of the hash meets a predetermined condition. E.g. the predetermined condition may be that the output of the hash has a certain predefined number of leading zeros. Note that this is just one particular type of proof-of-work puzzle, and other types are not excluded. A property of a hash function is that it has an unpredictable output with respect to its input. Therefore this search can only be performed by brute force, thus consuming a substantive amount of processing resource at each blockchain node 104 that is trying to solve the puzzle.
The first blockchain node 104 to solve the puzzle announces this to the network 106, providing the solution as proof which can then be easily checked by the other blockchain nodes 104 in the network (once given the solution to a hash it is straightforward to check that it causes the output of the hash to meet the condition). The first blockchain node 104 propagates a block to a threshold consensus of other nodes that accept the block and thus enforce the protocol rules. The ordered set of transactions 154 then becomes recorded as a new block 151 in the blockchain 150 by each of the blockchain nodes 104. A block pointer 155 is also assigned to the new block 151n pointing back to the previously created block 151n-1 in the chain. The significant amount of effort, for example in the form of hash, required to create a proof-of-work solution signals the intent of the first node 104 to follow the rules of the blockchain protocol. Such rules include not accepting a transaction as valid if it assigns the same output as a previously validated transaction, otherwise known as double-spending. Once created, the block 151 cannot be modified since it is recognized and maintained at each of the blockchain nodes 104 in the blockchain network 106. The block pointer 155 also imposes a sequential order to the blocks 151. Since the transactions 152 are recorded in the ordered blocks at each blockchain node 104 in a network 106, this therefore provides an immutable public ledger of the transactions.
Note that different blockchain nodes 104 racing to solve the puzzle at any given time may be doing so based on different snapshots of the pool of yet-to-be published transactions 154 at any given time, depending on when they started searching for a solution or the order in which the transactions were received. Whoever solves their respective puzzle first defines which transactions 152 are included in the next new block 151n and in which order, and the current pool 154 of unpublished transactions is updated. The blockchain nodes 104 then continue to race to create a block from the newly-defined ordered pool of unpublished transactions 154, and so forth. A protocol also exists for resolving any "fork" that may arise, which is where two blockchain nodes104 solve their puzzle within a very short time of one another such that a conflicting view of the blockchain gets propagated between nodes 104. In short, whichever prong of the fork grows the longest becomes the definitive blockchain 150. Note this should not affect the users or agents of the network as the same transactions will appear in both forks.
According to the bitcoin blockchain (and most other blockchains) a node that successfully constructs a new block 104 is granted the ability to newly assign an additional, accepted amount of the digital asset in a new special kind of transaction which distributes an additional defined quantity of the digital asset (as opposed to an inter-agent, or inter-user transaction which transfers an amount of the digital asset from one agent or user to another). This special type of transaction is usually referred to as a "coinbase transaction", but may also be termed an "initiation transaction" or "generation transaction". It typically forms the first transaction of the new block 151n. The proof-of-work signals the intent of the node that constructs the new block to follow the protocol rules allowing this special transaction to be redeemed later. The blockchain protocol rules may require a maturity period, for example 100 blocks, before this special transaction may be redeemed. Often a regular (non-generation) transaction 152 will also specify an additional transaction fee in one of its outputs, to further reward the blockchain node 104 that created the block 151n in which that transaction was published. This fee is normally referred to as the "transaction fee", and is discussed blow.
Due to the resources involved in transaction validation and publication, typically at least each of the blockchain nodes 104 takes the form of a server comprising one or more physical server units, or even whole a data centre. However in principle any given blockchain node 104 could take the form of a user terminal or a group of user terminals networked together.
The memory of each blockchain node 104 stores software configured to run on the processing apparatus of the blockchain node 104 in order to perform its respective role or roles and handle transactions 152 in accordance with the blockchain node protocol. It will be understood that any action attributed herein to a blockchain node 104 may be performed by the software run on the processing apparatus of the respective computer equipment. The node software may be implemented in one or more applications at the application layer, or a lower layer such as the operating system layer or a protocol layer, or any combination of these.
Also connected to the network 101 is the computer equipment 102 of each of a plurality of parties 103 in the role of consuming users. These users may interact with the blockchain network 106 but do not participate in validating transactions or constructing blocks. Some of these users or agents 103 may act as senders and recipients in transactions. Other users may interact with the blockchain 150 without necessarily acting as senders or recipients. For instance, some parties may act as storage entities that store a copy of the blockchain 150 (e.g. having obtained a copy of the blockchain from a blockchain node 104).
Some or all of the parties 103 may be connected as part of a different network, e.g. a network overlaid on top of the blockchain network 106. Users of the blockchain network (often referred to as "clients") may be said to be part of a system that includes the blockchain network 106; however, these users are not blockchain nodes 104 as they do not perform the roles required of the blockchain nodes. Instead, each party 103 may interact with the blockchain network 106 and thereby utilize the blockchain 150 by connecting to (i.e. communicating with) a blockchain node 106. Two parties 103 and their respective equipment 102 are shown for illustrative purposes: a first party 103a and his/her respective computer equipment 102a, and a second party 103b and his/her respective computer equipment 102b. It will be understood that many more such parties 103 and their respective computer equipment 102 may be present and participating in the system 100, but for convenience they are not illustrated. Each party 103 may be an individual or an organization. Purely by way of illustration the first party 103a is referred to herein as Alice and the second party 103b is referred to as Bob, but it will be appreciated that this is not limiting and any reference herein to Alice or Bob may be replaced with "first party" and "second "party" respectively.
The computer equipment 102 of each party 103 comprises respective processing apparatus comprising one or more processors, e.g. one or more CPUs, GPUs, other accelerator processors, application specific processors, and/or FPGAs. The computer equipment 102 of each party 103 further comprises memory, i.e. computer-readable storage in the form of a non-transitory computer-readable medium or media. This memory may comprise one or more memory units employing one or more memory media, e.g. a magnetic medium such as hard disk; an electronic medium such as an SSD, flash memory or [[PROM; and/or an optical medium such as an optical disc drive. The memory on the computer equipment 102 of each party 103 stores software comprising a respective instance of at least one client application 105 arranged to run on the processing apparatus. It will be understood that any action attributed herein to a given party 103 may be performed using the software run on the processing apparatus of the respective computer equipment 102. The computer equipment 102 of each party 103 comprises at least one user terminal, e.g. a desktop or laptop computer, a tablet, a smartphone, or a wearable device such as a smartwatch. The computer equipment 102 of a given party 103 may also comprise one or more other networked resources, such as 10 cloud computing resources accessed via the user terminal.
The client application 105 may be initially provided to the computer equipment 102 of any given party 103 on suitable computer-readable storage medium or media, e.g. downloaded from a server, or provided on a removable storage device such as a removable SSD, flash memory key, removable [[PROM, removable magnetic disk drive, magnetic floppy disk or tape, optical disk such as a CD or DVD ROM, or a removable optical drive, etc. The client application 105 comprises at least a "wallet" function. This has two main functionalities. One of these is to enable the respective party 103 to create, authorise (for example sign) and send transactions 152 to one or more bitcoin nodes 104 to then be propagated throughout the network of blockchain nodes 104 and thereby included in the blockchain 150. The other is to report back to the respective party the amount of the digital asset that he or she currently owns. In an output-based system, this second functionality comprises collating the amounts defined in the outputs of the various 152 transactions scattered throughout the blockchain 150 that belong to the party in question.
Note: whilst the various client functionality may be described as being integrated into a given client application 105, this is not necessarily limiting and instead any client functionality described herein may instead be implemented in a suite of two or more distinct applications, e.g. interfacing via an API, or one being a plug-in to the other. More generally the client functionality could be implemented at the application layer or a lower layer such as the operating system, or any combination of these. The following will be described in terms of a client application 105 but it will be appreciated that this is not limiting.
The instance of the client application or software 105 on each computer equipment 102 is operatively coupled to at least one of the blockchain nodes 104 of the network 106. This enables the wallet function of the client 105 to send transactions 152 to the network 106. The client 105 is also able to contact blockchain nodes 104 in order to query the blockchain 150 for any transactions of which the respective party 103 is the recipient (or indeed inspect other parties' transactions in the blockchain 150, since in embodiments the blockchain 150 is a public facility which provides trust in transactions in part through its public visibility). The wallet function on each computer equipment 102 is configured to formulate and send transactions 152 according to a transaction protocol. As set out above, each blockchain node 104 runs software configured to validate transactions 152 according to the blockchain node protocol, and to forward transactions 152 in order to propagate them throughout the blockchain network 106. The transaction protocol and the node protocol correspond to one another, and a given transaction protocol goes with a given node protocol, together implementing a given transaction model. The same transaction protocol is used for all transactions 152 in the blockchain 150. The same node protocol is used by all the nodes 104 in the network 106.
When a given party 103, say Alice, wishes to send a new transaction 152j to be included in the blockchain 150, then she formulates the new transaction in accordance with the relevant transaction protocol (using the wallet function in her client application 105). She then sends the transaction 152 from the client application 105 to one or more blockchain nodes 104 to which she is connected. E.g. this could be the blockchain node 104 that is best connected to Alice's computer 102. When any given blockchain node 104 receives a new transaction 152j, it handles it in accordance with the blockchain node protocol and its respective role. This comprises first checking whether the newly received transaction 152j meets a certain condition for being "valid", examples of which will be discussed in more detail shortly. In some transaction protocols, the condition for validation may be configurable on a per-transaction basis by scripts included in the transactions 152.
Alternatively the condition could simply be a built-in feature of the node protocol, or be defined by a combination of the script and the node protocol.
On condition that the newly received transaction 152j passes the test for being deemed valid (i.e. on condition that it is "validated"), any blockchain node 104 that receives the transaction 152j will add the new validated transaction 152 to the ordered set of transactions 154 maintained at that blockchain node 104. Further, any blockchain node 104 that receives the transaction 152j will propagate the validated transaction 152 onward to one or more other blockchain nodes 104 in the network 106. Since each blockchain node 104 applies the same protocol, then assuming the transaction 152j is valid, this means it will soon be propagated throughout the whole network 106.
Once admitted to the ordered pool of pending transactions 154 maintained at a given blockchain node 104, that blockchain node 104 will start competing to solve the proof-of-work puzzle on the latest version of their respective pool of 154 including the new transaction 152 (recall that other blockchain nodes 104 may be trying to solve the puzzle based on a different pool of transactions154, but whoever gets there first will define the set of transactions that are included in the latest block 151. Eventually a blockchain node 104 will solve the puzzle for a part of the ordered pool 154 which includes Alice's transaction 152j). Once the proof-of-work has been done for the pool 154 including the new transaction 152j, it immutably becomes part of one of the blocks 151 in the blockchain 150. Each transaction 152 comprises a pointer back to an earlier transaction, so the order of the transactions is also immutably recorded.
Different blockchain nodes 104 may receive different instances of a given transaction first and therefore have conflicting views of which instance is 'valid' before one instance is published in a new block 151, at which point all blockchain nodes 104 agree that the published instance is the only valid instance. If a blockchain node 104 accepts one instance as valid, and then discovers that a second instance has been recorded in the blockchain 150 then that blockchain node 104 must accept this and will discard (i.e. treat as invalid) the instance which it had initially accepted (i.e. the one that has not been published in a block 151).
An alternative type of transaction protocol operated by some blockchain networks may be referred to as an "account-based" protocol, as part of an account-based transaction model. In the account-based case, each transaction does not define the amount to be transferred by referring back to the UTXO of a preceding transaction in a sequence of past transactions, but rather by reference to an absolute account balance. The current state of all accounts is stored, by the nodes of that network, separate to the blockchain and is updated constantly. In such a system, transactions are ordered using a running transaction tally of the account (also called the "position"). This value is signed by the sender as part of their cryptographic signature and is hashed as part of the transaction reference calculation. In addition, an optional data field may also be signed the transaction. This data field may point back to a previous transaction, for example if the previous transaction ID is included in the data field.
UTXO-based Model Figure 2 illustrates an example transaction protocol. This is an example of a UTXO-based protocol. A transaction 152 (abbreviated "Tx") is the fundamental data structure of the blockchain 150 (each block 151 comprising one or more transactions 152). The following will be described by reference to an output-based or "UTXO" based protocol. However, this is not limiting to all possible embodiments. Note that while the example UTXO-based protocol is described with reference to bitcoin, it may equally be implemented on other example blockchain networks.
I n a UTXO-based model, each transaction ("Tx") 152 comprises a data structure comprising one or more inputs 202, and one or more outputs 203. Each output 203 may comprise an unspent transaction output (UTXO), which can be used as the source for the input 202 of another new transaction (if the UTXO has not already been redeemed). The UTXO includes a value specifying an amount of a digital asset. This represents a set number of tokens on the distributed ledger. The UTXO may also contain the transaction ID of the transaction from which it came, amongst other information. The transaction data structure may also comprise a header 201, which may comprise an indicator of the size of the input field(s) 202 and output field(s) 203. The header 201 may also include an ID of the transaction. In embodiments the transaction ID is the hash of the transaction data (excluding the transaction ID itself) and stored in the header 201 of the raw transaction 152 submitted to the nodes 104.
Say Alice 103a wishes to create a transaction 152j transferring an amount of the digital asset in question to Bob 103b. In Figure 2 Alice's new transaction 152j is labelled "Tx/". It takes an amount of the digital asset that is locked to Alice in the output 203 of a preceding transaction 152i in the sequence, and transfers at least some of this to Bob. The preceding transaction 152i is labelled "Txo" in Figure 2. Txo and Tx/ are just arbitrary labels. They do not necessarily mean that Txo is the first transaction in the blockchain 151, nor that Tx/ is the immediate next transaction in the pool 154. Tx/ could point back to any preceding (i.e. antecedent) transaction that still has an unspent output 203 locked to Alice.
The preceding transaction Txo may already have been validated and included in a block 151 of the blockchain 150 at the time when Alice creates her new transaction Txr, or at least by the time she sends it to the network 106. It may already have been included in one of the blocks 151 at that time, or it may be still waiting in the ordered set 154 in which case it will soon be included in a new block 151. Alternatively Txo and MT could be created and sent to the network 106 together, or Tx° could even be sent after Tx/ if the node protocol allows for buffering "orphan" transactions. The terms "preceding" and "subsequent" as used herein in the context of the sequence of transactions refer to the order of the transactions in the sequence as defined by the transaction pointers specified in the transactions (which transaction points back to which other transaction, and so forth). They could equally be replaced with "predecessor" and "successor", or "antecedent" and "descendant", "parent" and "child", or such like. It does not necessarily imply an order in which they are created, sent to the network 106, or arrive at any given blockchain node 104. Nevertheless, a subsequent transaction (the descendent transaction or "child") which points to a preceding transaction (the antecedent transaction or "parent") will not be validated until and unless the parent transaction is validated. A child that arrives at a blockchain node 104 before its parent is considered an orphan. It may be discarded or buffered for a certain time to wait for the parent, depending on the node protocol and/or node behaviour.
One of the one or more outputs 203 of the preceding transaction Txo comprises a particular UTXO, labelled here UTX0o. Each UTXO comprises a value specifying an amount of the digital asset represented by the UTXO, and a locking script which defines a condition which must be met by an unlocking script in the input 202 of a subsequent transaction in order for the subsequent transaction to be validated, and therefore for the UTXO to be successfully redeemed. Typically the locking script locks the amount to a particular party (the beneficiary of the transaction in which it is included). I.e. the locking script defines an unlocking condition, typically comprising a condition that the unlocking script in the input of the subsequent transaction comprises the cryptographic signature of the party to whom the preceding transaction is locked.
The locking script (also known as scriptPubKey) is a piece of code written in the domain specific language recognized by the node protocol. A particular example of such a language is called "Script" (capital 5) which is used by the blockchain network. The locking script specifies what information is required to spend a transaction output 203, for example the requirement of Alice's signature. Unlocking scripts appear in the outputs of -12 1-transactions. The unlocking script (also known as scriptSig) is a piece of code written the domain specific language that provides the information required to satisfy the locking script criteria. For example, it may contain Bob's signature. Unlocking scripts appear in the input 202 of transactions.
So in the example illustrated, UTX0o in the output 203 of Txo comprises a locking script [Checksig PA] which requires a signature Sig PA of Alice in order for UTX00 to be redeemed (strictly, in order for a subsequent transaction attempting to redeem UTX00 to be valid). [Checksig PA] contains a representation (i.e. a hash) of the public key PA from a public-private key pair of Alice. The input 202 of Tx/ comprises a pointer pointing back to Tx/ (e.g. by means of its transaction ID, Tx/Do, which in embodiments is the hash of the whole transaction Txo). The input 202 of Tx/comprises an identifying UTXDowithin Txo, to identify it amongst any other possible outputs of Txo. The input 202 of Txr further comprises an unlocking script <Sig PA> which comprises a cryptographic signature of Alice, created by Alice applying her private key from the key pair to a predefined portion of data (sometimes called the "message" in cryptography). The data (or "message") that needs to be signed by Alice to provide a valid signature may be defined by the locking script, or by the node protocol, or by a combination of these.
When the new transaction Trz arrives at a blockchain node 104, the node applies the node protocol. This comprises running the locking script and unlocking script together to check whether the unlocking script meets the condition defined in the locking script (where this condition may comprise one or more criteria). In embodiments this involves concatenating the two scripts: <Sig PA> <PA> I I [Checksig PA] where "I I" represents a concatenation and "<...>" means place the data on the stack, and "[...]" is a function comprised by the locking script (in this example a stack-based language). Equivalently the scripts may be run one after the other, with a common stack, rather than concatenating the scripts. Either way, when run together, the scripts use the public key PA of Alice, as included in the locking script in the output of Txo, to authenticate that the unlocking script in the input of Tx/ contains the signature of Alice signing the expected portion of data. The expected portion of data itself (the "message") also needs to be included in order to perform this authentication. In embodiments the signed data comprises the whole of Tx/ (so a separate element does not need to be included specifying the signed portion of data in the clear, as it is already inherently present).
The details of authentication by public-private cryptography will be familiar to a person skilled in the art. Basically, if Alice has signed a message using her private key, then given Alice's public key and the message in the clear, another entity such as a node 104 is able to authenticate that the message must have been signed by Alice. Signing typically comprises hashing the message, signing the hash, and tagging this onto the message as a signature, thus enabling any holder of the public key to authenticate the signature. Note therefore that any reference herein to signing a particular piece of data or part of a transaction, or such like, can in embodiments mean signing a hash of that piece of data or part of the transaction.
If the unlocking script in Tx] meets the one or more conditions specified in the locking script of Txo(so in the example shown, if Alice's signature is provided in Tx/and authenticated), then the blockchain node 104 deems Tx/ valid. This means that the blockchain node 104 will add Tx] to the ordered pool of pending transactions 154. The blockchain node 104 will also forward the transaction Tx/ to one or more other blockchain nodes 104 in the network 106, so that it will be propagated throughout the network 106. Once Tx/ has been validated and included in the blockchain 150, this defines UTX00 from Txuas spent. Note that Tx] can only be valid if it spends an unspent transaction output 203. If it attempts to spend an output that has already been spent by another transaction 152, then Tx/ will be invalid even if all the other conditions are met.
Hence the blockchain node 104 also needs to check whether the referenced UTXO in the preceding transaction Txo is already spent (i.e. whether it has already formed a valid input to another valid transaction). This is one reason why it is important for the blockchain 150 to impose a defined order on the transactions 152. In practice a given blockchain node 104 may maintain a separate database marking which UTX05 203 in which transactions 152 have been spent, but ultimately what defines whether a UTXO has been spent is whether it has already formed a valid input to another valid transaction in the blockchain 150.
If the total amount specified in all the outputs 203 of a given transaction 152 is greater than the total amount pointed to by all its inputs 202, this is another basis for invalidity in most transaction models. Therefore such transactions will not be propagated nor included in a block 151.
Note that in UTXO-based transaction models, a given UTXO needs to be spent as a whole.
It cannot "leave behind" a fraction of the amount defined in the UTXO as spent while another fraction is spent. However the amount from the UTXO can be split between multiple outputs of the next transaction. E.g. the amount defined in UTX00 in Txocan be split between multiple UTX05 in Tx/. Hence if Alice does not want to give Bob all of the amount defined in UTX00, she can use the remainder to give herself change in a second output of Txr, or pay another party.
In practice Alice will also usually need to include a fee for the bitcoin node 104 that successfully includes her transaction 104 in a block 151. If Alice does not include such a fee, Txo may be rejected by the blockchain nodes 104, and hence although technically valid, may not be propagated and included in the blockchain 150 (the node protocol does not force blockchain nodes 104 to accept transactions 152 if they don't want). In some protocols, the transaction fee does not require its own separate output 203 (i.e. does not need a separate UTXO). Instead any difference between the total amount pointed to by the input(s) 202 and the total amount of specified in the output(s) 203 of a given transaction 152 is automatically given to the blockchain node 104 publishing the transaction. E.g. say a pointer to UTX0o is the only input to Txi, and Tx/ has only one output UTX0/. If the amount of the digital asset specified in UTX0o is greater than the amount specified in UTX0/, then the difference may be assigned by the node 104 that wins the proof-of-work race to create the block containing UTX0i. Alternatively or additionally however, it is not necessarily excluded that a transaction fee could be specified explicitly in its own one of the UTX05 203 of the transaction 152.
Alice and Bob's digital assets consist of the UTX05 locked to them in any transactions 152 anywhere in the blockchain 150. Hence typically, the assets of a given party 103 are scattered throughout the UTX0s of various transactions 152 throughout the blockchain 150. There is no one number stored anywhere in the blockchain 150 that defines the total balance of a given party 103. It is the role of the wallet function in the client application 105 to collate together the values of all the various UTX05 which are locked to the respective party and have not yet been spent in another onward transaction. It can do this by querying the copy of the blockchain 150 as stored at any of the bitcoin nodes 104.
Note that the script code is often represented schematically (i.e. not using the exact language). For example, one may use operation codes (opcodes) to represent a particular function. "OP_..." refers to a particular opcode of the Script language. As an example, OP RETURN is an opcode of the Script language that when preceded by OP_FALSE at the beginning of a locking script creates an unspendable output of a transaction that can store data within the transaction, and thereby record the data immutably in the blockchain 150. E.g. the data could comprise a document which it is desired to store in the blockchain.
Typically an input of a transaction contains a digital signature corresponding to a public key PA. In embodiments this is based on the ECDSA using the elliptic curve secp256k1. A digital signature signs a particular piece of data. In some embodiments, for a given transaction the signature will sign part of the transaction input, and some or all of the transaction outputs. The particular parts of the outputs it signs depends on the SIGHASH flag. The SIGHASH flag is usually a 4-byte code included at the end of a signature to select which outputs are signed (and thus fixed at the time of signing).
The locking script is sometimes called "scriptPubKey" referring to the fact that it typically 5 comprises the public key of the party to whom the respective transaction is locked. The unlocking script is sometimes called "scriptSig" referring to the fact that it typically supplies the corresponding signature. However, more generally it is not essential in all applications of a blockchain 150 that the condition for a UTXO to be redeemed comprises authenticating a signature. More generally the scripting language could be used to define 10 any one or more conditions. Hence the more general terms "locking script" and "unlocking script" may be preferred.
Side Channel As shown in Figure 1, the client application on each of Alice and Bob's computer equipment 102a, 120b, respectively, may comprise additional communication functionality. This additional functionality enables Alice 103a to establish a separate side channel 107 with Bob 103b (at the instigation of either party or a third party). The side channel 107 enables exchange of data separately from the blockchain network. Such communication is sometimes referred to as "off-chain" communication. For instance this may be used to exchange a transaction 152 between Alice and Bob without the transaction (yet) being registered onto the blockchain network 106 or making its way onto the chain 150, until one of the parties chooses to broadcast it to the network 106. Sharing a transaction in this way is sometimes referred to as sharing a "transaction template". A transaction template may lack one or more inputs and/or outputs that are required in order to form a complete transaction. Alternatively or additionally, the side channel 107 may be used to exchange any other transaction related data, such as keys, negotiated amounts or terms, data content, etc. The side channel 107 may be established via the same packet-switched network 101 as 30 the blockchain network 106. Alternatively or additionally, the side channel 301 may be established via a different network such as a mobile cellular network, or a local area network such as a local wireless network, or even a direct wired or wireless link between Alice and Bob's devices 102a, 102b. Generally, the side channel 107 as referred to anywhere herein may comprise any one or more links via one or more networking technologies or communication media for exchanging data "off-chain", i.e. separately from the blockchain network 106. Where more than one link is used, then the bundle or collection of off-chain links as a whole may be referred to as the side channel 107. Note therefore that if it is said that Alice and Bob exchange certain pieces of information or data, or such like, over the side channel 107, then this does not necessarily imply all these 10 pieces of data have to be send over exactly the same link or even the same type of network.
CONCLUSION
Other variants or use cases of the disclosed techniques may become apparent to the person skilled in the art once given the disclosure herein. The scope of the disclosure is not limited by the described embodiments but only by the accompanying claims. For instance, some embodiments above have been described in terms of a bitcoin network 106, bitcoin blockchain 150 and bitcoin nodes 104. However, it will be appreciated that the bitcoin blockchain is one particular example of a blockchain 150 and the above description may apply generally to any blockchain. That is, the present invention is in by no way limited to the bitcoin blockchain. More generally, any reference above to bitcoin network 106, bitcoin blockchain 150 and bitcoin nodes 104 may be replaced with reference to a blockchain network 106, blockchain 150 and blockchain node 104 respectively. The blockchain, blockchain network and/or blockchain nodes may share some or all of the described properties of the bitcoin blockchain 150, bitcoin network 106 and bitcoin nodes 104 as described above.
In preferred embodiments of the disclosure, the blockchain network 106 is the bitcoin network and bitcoin nodes 104 perform at least some or all of the described functions of 30 creating, publishing, propagating and storing blocks 151 of the blockchain 150. It is not excluded that there may be other network entities (or network elements) that only perform one or some but not all of these functions. That is, a network entity may perform the function of propagating and/or storing blocks without creating and publishing blocks (recall that these entities are not considered nodes of the preferred bitcoin network 106).
In other embodiments of the disclosure, the blockchain network 106 may not be the bitcoin network. In these embodiments, it is not excluded that a node may perform at least one or some but not all of the functions of creating, publishing, propagating and storing blocks 151 of the blockchain 150. For instance, on those other blockchain 1 0 networks a "node" may be used to refer to a network entity that is configured to create and publish blocks 151 but not store and/or propagate those blocks 151 to other nodes.
Even more generally, any reference to the term "bitcoin node" 104 above may be replaced with the term "network entity" or "network element", wherein such an entity/element is configured to perform some or all of the roles of creating, publishing, propagating and storing blocks. The functions of such a network entity/element may be implemented in hardware in the same way described above with reference to a blockchain node 104.
The term "user" may be used herein to include human and machine-based entities. The above-mentioned embodiments illustrate rather than limit the disclosure, and those skilled in the art will be capable of designing many alternative embodiments without departing from the scope of the disclosure as defined by the appended claims. In the claims, any reference signs placed in parentheses shall not be construed as limiting the claims. The word "comprising" and "comprises", and the like, does not exclude the presence of elements or steps other than those listed in any claim or the specification as a whole. In the present specification, "comprises" means "includes or consists or and "comprising" means "including or consisting of". Throughout this specification the word "comprise", or variations such as "includes", "comprises" or "comprising", will be understood to imply the inclusion of a stated element, integer or step, or group of elements, integers or steps, but not the exclusion of any other element, integer or step, or group of elements, integers or steps. The singular reference of an element does not exclude the plural reference of such elements and vice-versa. The disclosure may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In a device claim enumerating several means, several of these means may be embodied by one and the same item of hardware. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Claims (14)
- CLAIMS: 1. A computer-implemented system comprising any one or more of: i) at least one validation component operative to facilitate and/or enable distributed validation of at least one blockchain transaction and/or a blockchain block of transactions; and/or ii) at least one mining component operative to facilitate and/or enable distributed mining of a blockchain block and/or calculation of a Proof-of-Work calculation; and/or Hi) at least one allocation component operative to allocate blockchain-related or implemented tasks to at least one computing resource by: using a portion of data derived from a blockchain to identify and/or allocate a processing and/or storage resource, wherein the portion of data is derived from data that comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing an unspent transaction output; and/or iv) at least one record storage component comprising a record of at least a portion of a blockchain transaction, the record comprising transaction data for determining whether the at least a portion of a transaction (Tx) is included in the Merkle path of a blockchain block.
- 2. A system according to claim 1, wherein the at least one validation component is operative to: validate at least a portion of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block; and preferably: allocate respective subsets of the blockchain transactions to a plurality of validating (processing) resources, wherein each respective subset provides a respective portion of the Merkle tree and is represented by a respective inner node of the Merkle tree; and use the plurality of validating resources to validate their respective subsets of blockchain transactions.
- 3. A system according to claim 1 or 2, wherein the at least one validation component is operative to: download at least part of a blockchain block that comprises a plurality of blockchain transactions and a root of a Merkle tree for the block; preferably wherein the validation component is arranged to perform the download by: allocating respective subsets of the blockchain transactions to a plurality of processing resources, wherein each respective subset provides a respective portion of the Merkle tree and is represented by a respective inner node of the Merkle tree; and using one, some or all of the plurality of processing resources to download their respective subset of blockchain transactions.
- 4. A system according to any preceding claim, wherein the at least one validation component is operative to: generate, store and/or maintain a first UTXO repository for recording, searching and/or processing a plurality of unspent transaction outputs (UTX05), each associated with a transaction (Tx) in a plurality of blockchain transactions (TXs) of a blockchain block; wherein: the plurality of blockchain transactions provides and/or is represented by a portion of a Merkle tree for the blockchain block.
- 5. A system according to any preceding claim, wherein the system and/or at least one validation component is operative to: i) validate and/or verify at least one blockchain transaction; and/or ii) perform a Simplified Payment Verification process; and/or iii) confirm whether a given blockchain transaction is contained within the blockchain block; and/or -13 1-iii) generate a hash of at least one of the blockchain transactions, using the hash to construct a Merkle path and/or checking whether the hash matches a transaction identifier in a header of the blockchain block.
- 6. A system according any preceding claim wherein the system and/or at least one validation component comprises at least one validating resource which is, or comprises, at least one of: a virtual machine, a server, a GPU-based computing resource, a thread, and/or a multiprocessor system.
- 7 A system according to any preceding claim wherein the at least one allocation component is operative to: i) use a portion of data derived from a blockchain to identify and/or allocate a processing and/or storage resource; preferably wherein the portion of data comprises or is derived from an unspent transaction output (UTXO) and/or a blockchain transaction (Tx) containing an unspent transaction; and/or ii) use/provide, generate, store and/or maintain a first UTXO resource arranged to a) record, search and/or process a plurality of unspent transaction outputs (UTX05), each associated with a transaction (Tx) in a plurality of blockchain transactions (TXs) of a blockchain block; and/or b) use a portion of data derived from a blockchain to identify and/or allocate said resource, wherein said data from which the portion of data is derived comprises an unspent transaction output (UTXO) and/or a transaction (Tx) containing a UTXO; and/or iii) receive and/or process an unspent transaction output (UTXO) for inclusion in a transaction; and/or use the portion of data derived from the unspent output to identify an allocated resource, wherein said allocated resource holds validation data for the UTXO; and/or request the validation data from the allocated resource.
- 8. The system of claim 7, wherein the at least one allocation component is further operative to: store and/or process at least a portion of the unspent output and/or the transaction (Tx): in the allocated resource; and/or by the allocated resource; and/or in association with the allocated resource.
- 9. A system of any preceding claim, wherein the at least one mining component is operative to: send, from a first resource to a second resource, a request to generate a Proof-Of-Work (PoW) for a blockchain block containing a plurality of transactions, the request comprising a Merkle proof for verification that a control transaction (TX0) is included in the plurality of transactions; and/or receive, at the second resource from the first resource, a request to generate a Proof-Of-Work (PoW) for a blockchain block containing a plurality of transactions, the request comprising a Merkle proof for verification that a control transaction (TX0) is included in the plurality of transactions
- 10. A system according to claim 9, wherein: the control transaction (TX0) comprises control data for controlling, allowing and/or prohibiting the performance of the Proof-of-Work generation; preferably wherein the control data comprises: i) at least one output that specifies a predetermined address for the destination of a blockchain transfer; preferably wherein the address is associated with the second resource, or a party associated with or authorised by the second resource; and/or ii) at least one pre-determined signature; and/or iii) at least one secret value or secret portion of data.
- 11. A system according to claim 9 or 10, wherein: the first resource is a PoW requesting resource, a blockchain validation resource or a blockchain mining resource; and/or the second resource is a Proof-of-Work Provider; and/or the second resource comprises at least one ASIC or hash machine or specialized cryptocurrency mining resource.
- 12. A system according to any preceding claim, wherein the at least one record storage component comprises: at least one record, the at least one record comprising: i) a blockchain transaction (TXO) comprising at least one data item (D); and ii) at least one further blockchain transaction (TX1) necessary for confirming that the blockchain transaction (TX1) is included in the Merkle path of a blockchain block (B).
- 13. A system of claim 12, wherein: the record further comprises: a Merkle path from the transaction (TXO) to a root of a Merkle tree for the blockchain block (B); and preferably wherein the Merkle path comprises at least the minimum blockchain transactions necessary to establish or verify that the blockchain transaction (TXO) is included in the blockchain block (B).
- 14. A computer program embodied on computer-readable storage and arranged or configured so as, when run on one or more processors, to: i) implement some or all of the functionality of the system claimed herein; and/or ii) implement, facilitate, enable or provide one or more of the features of any of preceding claim.
Priority Applications (17)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB2209533.5A GB2620155A (en) | 2022-06-29 | 2022-06-29 | Computer-implemented system and method |
KR1020247016846A KR20240096559A (en) | 2021-10-28 | 2022-10-25 | Methods and systems for distributed blockchain functions |
CN202280072528.2A CN118202622A (en) | 2021-10-28 | 2022-10-25 | Method and system for distributed blockchain functionality |
PCT/EP2022/079837 WO2023072965A1 (en) | 2021-10-28 | 2022-10-25 | Methods and systems for distributed blockchain functionalities |
EP22809119.5A EP4423954A1 (en) | 2021-10-28 | 2022-10-25 | Methods and systems for distributed blockchain functionalities |
PCT/EP2022/080014 WO2023073066A1 (en) | 2021-10-28 | 2022-10-26 | Methods and systems for distributed blockchain functionalities |
KR1020247016845A KR20240096558A (en) | 2021-10-28 | 2022-10-26 | Methods and systems for distributed blockchain functions |
CN202280072836.5A CN118216122A (en) | 2021-10-28 | 2022-10-26 | Method and system for distributed blockchain functionality |
EP22809145.0A EP4423955A1 (en) | 2021-10-28 | 2022-10-26 | Methods and systems for distributed blockchain functionalities |
PCT/EP2022/080081 WO2023073103A1 (en) | 2021-10-28 | 2022-10-27 | Methods and systems for distributed blockchain functionalities |
KR1020247016896A KR20240096562A (en) | 2021-10-28 | 2022-10-27 | Methods and systems for decentralized blockchain functions |
CN202280072835.0A CN118202613A (en) | 2021-10-28 | 2022-10-27 | Method and system for distributed blockchain functionality |
EP22809445.4A EP4423957A1 (en) | 2021-10-28 | 2022-10-27 | Methods and systems for distributed blockchain functionalities |
KR1020247015209A KR20240093548A (en) | 2021-10-28 | 2022-10-27 | Methods and systems for distributed blockchain functions |
EP22809444.7A EP4423956A1 (en) | 2021-10-28 | 2022-10-27 | Methods and systems for distributed blockchain functionalities |
CN202280072834.6A CN118266187A (en) | 2021-10-28 | 2022-10-27 | Method and system for distributed blockchain functionality |
PCT/EP2022/080084 WO2023073105A1 (en) | 2021-10-28 | 2022-10-27 | Methods and systems for distributed blockchain functionalities |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB2209533.5A GB2620155A (en) | 2022-06-29 | 2022-06-29 | Computer-implemented system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
GB202209533D0 GB202209533D0 (en) | 2022-08-10 |
GB2620155A true GB2620155A (en) | 2024-01-03 |
Family
ID=82705458
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB2209533.5A Pending GB2620155A (en) | 2021-10-28 | 2022-06-29 | Computer-implemented system and method |
Country Status (2)
Country | Link |
---|---|
CN (4) | CN118202622A (en) |
GB (1) | GB2620155A (en) |
-
2022
- 2022-06-29 GB GB2209533.5A patent/GB2620155A/en active Pending
- 2022-10-25 CN CN202280072528.2A patent/CN118202622A/en active Pending
- 2022-10-26 CN CN202280072836.5A patent/CN118216122A/en active Pending
- 2022-10-27 CN CN202280072834.6A patent/CN118266187A/en active Pending
- 2022-10-27 CN CN202280072835.0A patent/CN118202613A/en active Pending
Non-Patent Citations (1)
Title |
---|
None * |
Also Published As
Publication number | Publication date |
---|---|
GB202209533D0 (en) | 2022-08-10 |
CN118202613A (en) | 2024-06-14 |
CN118216122A (en) | 2024-06-18 |
CN118266187A (en) | 2024-06-28 |
CN118202622A (en) | 2024-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4423955A1 (en) | Methods and systems for distributed blockchain functionalities | |
EP4423953A1 (en) | Methods and systems for distributed blockchain functionalities | |
WO2023072955A1 (en) | Methods and systems for distributed blockchain functionalities | |
JP2024524683A (en) | Blockchain Blocks and Proof of Existence | |
GB2620155A (en) | Computer-implemented system and method | |
GB2621808A (en) | Computer-implemented system and method | |
GB2619745A (en) | Computer-implemented system and method | |
GB2618380A (en) | Computer-implemented system and method | |
EP4423951A1 (en) | Methods and systems for distributed blockchain functionalities | |
GB2612339A (en) | Computer-implemented system and method | |
WO2024170308A1 (en) | Computer-implemented solutions for recording data relating to multiple components of an item | |
WO2024194061A1 (en) | Computer-implemented system and method for tree-based data verification, communication and integrity solutions | |
JP2024524687A (en) | Blockchain Blocks and Proof of Existence | |
EP4396752A1 (en) | A computer implemented method and system | |
WO2023156667A1 (en) | Computer implemented method and system for the provision of access to a plurality of functions and applications associated with a blockchain | |
WO2024041866A1 (en) | Blockchain transaction | |
GB2606196A (en) | Subtree-based storage and retrieval of merkle tree data |