WO2019125814A1 - Blockchain based information security system and method - Google Patents

Blockchain based information security system and method Download PDF

Info

Publication number
WO2019125814A1
WO2019125814A1 PCT/US2018/064838 US2018064838W WO2019125814A1 WO 2019125814 A1 WO2019125814 A1 WO 2019125814A1 US 2018064838 W US2018064838 W US 2018064838W WO 2019125814 A1 WO2019125814 A1 WO 2019125814A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
nodes
cluster
user
real
Prior art date
Application number
PCT/US2018/064838
Other languages
French (fr)
Inventor
Ching Song WU
Chun-Wei Yu
Chih-Sheng Wang
Original Assignee
Eland Blockchain Fintech Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eland Blockchain Fintech Inc. filed Critical Eland Blockchain Fintech Inc.
Publication of WO2019125814A1 publication Critical patent/WO2019125814A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]

Definitions

  • the present invention relates to an information security system and method, in particular a blockchain based information security system and method.
  • bitcoin mining mechanism adopts the PoW (Proof of Work) to prove consensus mechanism, which obtains the accounting rights through arithmetic competition, creates a ledger block, and stores it after verifying through other nodes.
  • PoW Proof of Work
  • most of the participants in the initial stage have dual identities and corresponding functions (ie, creating blocks & verifying blocks).
  • security of PoW is practically secured by“node verifiers”, the recorded data can be altered only when 51% of the nodes agree. In this way, a high security threshold may be created.
  • PoW is considered as the most secure consensus mechanism today.
  • the main object of the present invention is to provide an information security system and method based on a highly reliable and secure blockchain, which provides verification nodes that can only verify the validity of the transaction messages, and at the same time distributedly records the previous and real-time transaction messages in the verification devices corresponding to the verification nodes.
  • the storage capacity and the computing workload required for each verification node can be greatly reduced, thereby reduces the cost of the installation for verifying the transaction messages, and significantly increase the overall number of the verification nodes so as to improve the reliability and security of the associated application systems.
  • the present invention provides a technical solution in which the two execution operations“block creation” and“block verification” are divided into two independent operations. That is to say,“block creation” may still be executed on the original chain, and the methods for creating the block can be determined based on the rules as defined by the private chains of respective enterprises. The methods can be regulated by the private chains internally, and the blocks can be created by any of the participants. However, after the block has been created, it must be sent to the verification node, for example, a router, for verification. Therefore, by making the function of verifying the accuracy of the block information independent, and using the distributed blockchain transaction message recording mechanism, the present invention effectively provides a mechanism which enables security of the transaction information in the blockchain and reduces the overall cost of verification.
  • an aspect of the present invention provides a blockchain based information security system, wherein the blockchain includes a plurality of user nodes, each of which corresponds to a user device, and the information security system comprising: a verification module having a plurality of verification nodes connected to the plurality of user nodes through a peer-to-peer network, each of the verification nodes corresponds to a verification device; wherein each of the verification devices comprises: a data storage unit configured to store all previous transaction messages generated by the user node; and a cluster creating unit configured to dynamically group other verification nodes to create a plurality of clusters by broadcasting a communication signal to said other verification nodes; and wherein when a real-time transaction message generated by one of the user nodes is sent to a data block and the data block is broadcasted to the other user node and the verification nodes, the real-time transaction message is distributed and recorded by each of the clusters to the verification devices and each verification device of each cluster verifies the real-time transaction message.
  • Another aspect of the present invention provides a blockchain based information security system, wherein the blockchain includes a plurality of user nodes, each of which corresponds to a user device, and the information security system comprising: a verification module having a plurality of verification nodes, each of the verification nodes corresponds to a verification device; a processing module for interconnecting the user notes and the verification nodes through a peer-to-peer network, wherein the processing module comprises: a grouping unit configured to group the user nodes and the verification nodes to create a plurality of clusters, wherein each cluster includes at least the plurality of verification nodes; wherein when a real-time transaction message generated by one of the user nodes is sent to a data block and the data block is broadcasted to the other user node and the verification nodes, the real-time transaction message is distributed and recorded by each of the clusters to the verification devices and each verification device of each cluster verifies the respective real-time transaction message,
  • a further aspect of the present invention provides a method for securing information in a blockchain having a plurality of user nodes, the plurality of user nodes each corresponds to a user device; the method comprising: (A): providing a plurality of verification nodes connected to the plurality of user nodes through a peer-to-peer network, the verification nodes each corresponds to a verification device; (B): dynamically grouping the verification nodes to create a plurality of clusters; and (C): when a real-time transaction message generated by one of the user nodes is transferred to a data block, and the data block is broadcasted to the other user node and the verification node, each of the clusters records the real-time data block to the verification device in a distributed manner, and each of the verification devices of each cluster verifies the real-time transaction message.
  • FIG, 1 A is a schematic diagram illustrating a blockchain-based information security system according to an embodiment of the present invention.
  • FIG. IB is a block diagram illustrating a verification device according to another embodiment of the present invention.
  • FIG. 1C is a schematic diagram illustrating a blockchain-based information security system according to an embodiment of the present invention.
  • FIG. ID schematically illustrates that real-time transaction messages are distributed and recorded in verification nodes in accordance with an exemplary embodiment.
  • FIG. 2 is a schematic diagram illustrating a blockchain-based information security system according to another embodiment of the present invention.
  • FIG, 3 is a flow chart illustrating a blockchain-based information security method in accordance with an exemplary embodiment.
  • the present invention is related to a blockchain-based information security system and method.
  • similar elements will be denoted by the same reference numerals.
  • the drawings of the present invention are only intended to be illustrative, and are not necessarily drawn to scale, and all details are not necessarily be shown in the drawing.
  • FIG. 1A is a schematic diagram of a blockchain-based message security system according to an embodiment of the present invention
  • FIG. IB is a block diagram illustrating a verification device according to another embodiment of the present invention.
  • the figures show a blockchain-based information security system 1 in which a blockchain 2 includes a plurality of user nodes 21, and each user node 21 corresponds to a user device 22.
  • the information security system 1 may include a verification module 3 having plurality of verification nodes 31. Each verification node 31 corresponds to a verification device 32.
  • the user node 21 and the verification node 31 are connected to each other through a peer-to-peer network.
  • each of the verification devices 32 includes a data storage unit 33 and a cluster creating unit 34.
  • the data storage unit 33 is configured to store all previous transaction messages generated by the user node 21.
  • the cluster creating unit 34 is configured to dynamically group the other verification nodes 31 to form clusters through posting a communication signal to the verification node 31.
  • the verification device 32 includes a router R.
  • the present invention is not limited thereto.
  • the verification device 32 may also be an electronic device having the abilities of internet connection, processing and storing.
  • the verification devices 32 may make voluntarily broadcast among each other, and create a cluster 5 based on at least one of the following factors: the fastest connection speed in message transmission or the shortest message transmission path between the verification devices, or the transaction messages omitted in the previous transaction messages stored in the verification nodes 31 corresponding to the verification device 32.
  • the user devices 22 corresponding to the user nodes 21 in the cluster 5 store the complete previous transaction messages, the user nodes 21 can map the previous transaction messages to the verification nodes 31 in the same cluster 5, thereby ensuring that the previous transaction messages integrated in the verification nodes 31 are complete and no omission is involved.
  • each of the clusters 5 distributes and records the data block to the verification device 32 corresponding to the verification node 31.
  • the respective verification nodes 31 of the same cluster 5 need to verify the real-time transaction message, they may broadcast to other verification nodes 31 to acquire the complete previous transaction messages and real-time transaction messages to verify the accuracy of this real-time transaction message.
  • FIG. 1C schematically illustrates a blockchain-based information security system according to a further embodiment of the present invention.
  • the cluster 5 may include at least one user node 21 and a plurality of verification nodes 31.
  • the cluster creating unit 34 can detect the fastest connection speed in message transmission or the shortest message transmission path between the corresponding verification nodes 31 and the user nodes 21 and other verification nodes 31, and consider the transaction messages omitted in the previous transaction messages stored in the verification device 32 associated with the verification nodes, to create the clusters 5.
  • the user nodes 21 can map the previous transaction messages to the verification nodes 31 in the same cluster 5, to ensure that the previous transaction information integrated between the verification nodes 31 are complete and none is omitted.
  • each cluster creating unit 34 can dynamically adjust the matching numbers of the user nodes 21 and the verification nodes 31 in each cluster 5 according to the real-time communication speed and the omissions of the previous transaction messages stored.
  • the cluster 5 formed initially has a user node 21 and a plurality of verification nodes 31.
  • the cluster creating units 34 may readjust the components of the cluster 5 between each other, to exclude the user node 21 from the original cluster 5, and even exclude the verification nodes 31 having duplicate message records in the cluster 5, so that clusters 5 having fewer components are formed, thereby improving the overall effectiveness of verification.
  • each cluster 5 records the data block in a distributed manner to the verification device 32 corresponding to the verification node 31.
  • the verification nodes 31 of the same cluster 5 may obtain complete, previous transaction messages and real-time transaction messages from other verification nodes 31 by broadcasting so as to verify the accuracy of this real-time transaction message.
  • FIG. ID schematically illustrates the recording of the real-time transaction messages in distributed maimer in the verification nodes in accordance with an exemplary embodiment.
  • the data block will distributedly record the transaction message in at least two verification devices 32 of each cluster 5.
  • the real-time transaction message generated by the user node 21 is first divided into N equal segments. Then the segments of real-time transaction messages are distributedly recorded in the verification device 32 corresponding to the verification node 31.
  • the first and second segments of the real-time transaction message are allocated in the router corresponding to the first verification node; and the third and fourth segments of the real-time transaction message are allocated in the router corresponding to the second verification node.
  • the 2N-l th and 2N th segments of the real-time transaction message are allocated in the router corresponding to the N* verification node.
  • the cluster creating unit 34 may determine the quantity of the verification nodes 31 needed in each cluster 5 based on the size of the overall contents needed for recording the previous and real-time transaction messages. For example, when the size of the contents needed for the previous and real-time transaction messages is 64G, then the cluster creating unit 34 will dynamically edit at least 64 verification nodes 31 having a storage capacity of 1G to completely store the overall transaction messages in a distributed manner.
  • the verification node 31 in the same cluster 5 when the verification device 32 corresponding to the verification node 31 in the cluster 5 does not completely receive and record the real-time and previous transaction messages, the verification node 31 in the same cluster 5 will broadcast to other clusters 5, and then retrieve the omitted, corresponding transaction messages from the user node 21 or verification node 31 of the other cluster 5, and distributedly record the retrieved transaction messages to the verification device 32 in the same cluster 5. As such, the verification node 31 in the same cluster 5 may verify the accuracy of the real-time transaction messages.
  • FIG. 2 is a schematic diagram illustrating a blockchain-based information security system 1 according to another embodiment of the present invention.
  • hlockchain 2 includes a plurality of user nodes 21, and each of which corresponds to a user device 22.
  • each user node 21 can be considered as an individual account of respective user.
  • the message security system 1 comprises a verification module 3 having a plurality of verification nodes 31, and a processing module 4.
  • Each of the verification nodes 31 corresponds to a verification device 32.
  • the verification device 32 includes a router, hut the present invention is not limited thereto, and the verification device 32 can also be an electronic device having internet access, processing and storage capability.
  • the processing module 4 is configured to connect the user nodes 21 and the verification nodes 31 through a peer-to-peer network.
  • the processing module comprises a grouping unit 41 configured to dynamically group the user nodes 21 and the verification nodes 31 to create a plurality of clusters 5, wherein each cluster 5 includes at least two or more verification nodes 31.
  • the grouping unit 41 may monitor the real-time communication speed between the verification nodes 31 and the transaction messages omitted in the previous transaction messages stored so as to more appropriately create the cluster 5 by dynamic matching and grouping.
  • the grouping unit 41 may create the cluster 5 by detecting the fastest connection speed in message transmission or the shortest message transmission path between the verification nodes 31, and considering the complementarity and heterogeneity of the previous transaction messages stored in the verification device 32 corresponding to the verification nodes 31. In this way, broadcasting among the verification nodes 31 in every cluster 5 can be made in an efficient manner, and the previous transaction messages integrated by the verification nodes 31 are completed, and the repetition of the message information is reduced.
  • the forming component of the cluster 5 is only the verification node 31 as an example, but the invention is not limited thereto.
  • the cluster 5 may include at least one user node 21 and a plurality of verification nodes 31. That is to say, the grouping unit 41 can detect the fastest connection speed in message transmission or the shortest message transmission path between the verification nodes 31 and the user nodes 21 and consider the transaction messages omitted in the previous transaction messages stored in the verification devices corresponding to the verification nodes, to create the clusters 5.
  • the user node 21 can map the previous transaction messages to the verification nodes 31 in the same cluster 5, thereby ensures that the previous transaction messages integrated in the verification nodes 31 are complete without any omission.
  • the grouping unit 41 can dynamically adjust the matching quantity of the user nodes 21 and the verification nodes 31 in each cluster 5 according to the real-time communication speed and the omissions of the stored previous transaction messages. For example, even if the cluster 5 created at the outset includes a user node 21 and a plurality of verification nodes 31, but when the verification nodes 31 in the cluster 5 have been distributedly obtained through the user nodes 21, and completely record previous transaction messages, that is, the verification nodes 31 in the cluster 5 have acquired previous transaction messages in complete through broadcast among each other, the grouping unit 41 may readjust the constituents of the cluster 5, and exclude the user nodes 21 from the original cluster 5, and even the verification nodes 31 with duplicate message records in the cluster 5 can be excluded. As such, clusters 5 having fewer constituents are formed, and thus the overall verification efficiency is improved.
  • each of the clusters 5 distributes and records the data block to the verification device 32 corresponding to the verification node 31.
  • the respective verification nodes 31 of the same cluster 5 need to verify the real-time transaction message, they may broadcast to other verification nodes 31 to acquire the complete previous transaction messages and real-time transaction messages to verify the accuracy of this real-time transaction message.
  • the verification device 32 in this embodiment creates a cluster 5 in a passive manner by using the grouping unit 41 to detect the nature of the data stored therein and the connection response rate thereof.
  • each of the verification devices 32 of the embodiments mentioned earlier uses the cluster creating unit 34 to actively broadcast to each other to create the cluster 5.
  • the associated operation mechanism and framework are similar to those of the earlier mentioned embodiments, and thus are omitted in description.
  • FIG. 3 is a flow chart illustrating a blockchain-based information security method in accordance with an exemplary embodiment.
  • the method 6 for securing information in a blockchain 2 is applicable to the framework of the blockchain-based information security system 1 of the afore-mentioned embodiments.
  • the blockchain 2 includes a plurality of user nodes 21, the plurality of user nodes each corresponds to a user device 22.
  • the method comprises: step A of providing a plurality of verification nodes 31 connected to the plurality of user nodes 22 through a peer-to-peer network, and the verification nodes 31 each corresponds to a verification device 32.
  • the verification device 32 can be an electronic device having a network connection function and processing and storage capabilities, such as a router.
  • the information securing method 6 further comprises step B of dynamically grouping the verification nodes 31 to create a plurality of clusters.
  • the verification nodes 31 can actively broadcast to each other through the cluster creating unit 34 in their corresponding verification device 32, and form the cluster 5 by detecting the fastest connection speed in message transmission or the shortest message transmission path between the verification nodes 31, considering the complementarity and heterogeneity of the previous transaction messages stored in the verification device 32 corresponding to the verification nodes 31.
  • the verification nodes 31 may form the cluster 5 by detecting the fastest connection speed in message transmission or the shortest transmission path between each other via an external grouping unit 41, and consider the complementarity and heterogeneity of the previous transaction messages stored in the verification device 32 corresponding to the verification nodes 31.
  • the information securing method 6 further comprises step C in which when a real-time transaction message generated by one of the user nodes 21 is transferred to a data block and the data block is broadcasted to the other user node 21 and the verification device 32, each of the clusters 5 records the real-time data block in a distributed manner to the verification device 32, and each of the verification devices of each cluster verifies the real-time transaction message. Further, the verification nodes 31 in each cluster record the real-time transaction messages and previous transaction messages in respective corresponding verification devices 32 through labor division and cooperation, so that each verification device 32 does not have to completely record all transaction messages.
  • each verification node 31 when each verification node 31 needs to verify the validity of a real-time transaction message, it may broadcast to other verification nodes 31 in the cluster 5 to obtain fragments of the real-time and previous transaction messages from respective corresponding verification device 32, and then the fragmental transaction messages are integrated into complete transaction messages to verify the accuracy of the real-time transaction message.
  • the blockchain-based message security system 1 and method 6 thereof of the present invention can effectively transmit a single private block, for example, through a router that can maintain the power-on state for a long time and all around the clock.
  • Chain, alliance chain, or simultaneous trading of more than two independent blockchains providing a highly reliable verification mechanism while significantly reducing equipment costs and reducing energy consumption.
  • the blockchain-based information security system 1 and method 6 will provide a highly reliable mechanism by means of for example, a router that is power-on around the clock to verify the transaction messages of a single private blockchain, an alliance chain, or two or more independent blockchains, and. in the mean time, can reduce greatly the installation cost and energy consumption.
  • the blockchain-based information security system 1 and method 6 provide a solution to distinct“verifying the blocks” from“creating the blocks” by means of verification nodes (for example; using routers as verification nodes).
  • verification nodes for example; using routers as verification nodes.
  • a household 24-hours uninterruptible router is used as a node body for conducting verification, which only verifies but not creates the block (creating or accounting the block will be executed by private chains).
  • the verification process of the router is operated in the background, and it is not necessary to reward the participants as they do not involve in mining, and most of the business activities do not need to go through coins.
  • the performance of the router is balanced, the storage unit is consistent, and the network connection is stable.
  • Simple verification behavior enables enhanced security, faster speed and privacy of the overall system, and keeps the difference in data throughput balanced.
  • Ethereum which has the largest number of nodes, has only about 27,097 nodes, whereas the blockchain for bitcoin has about 11,218 nodes. Therefore, to create chaos by hacking, if based on the number of household routers (one node per household/ISP with address), it is necessary to have fifty thousands households to conspire.
  • the present invention is thus far more secure than any existing consensus mechanisms applied by existing blockchain technology.
  • Taiwan there are now tens of thousands of routers working synchronously, and eventually more than hundred million routers will be used as verification nodes in the world.
  • Such peer-to-peer connection will become the foundation of the next generation“internet of value”, and is a primary basic backbone engineering of the blockchain, which will consistently secure the commercial blockchains of the enterprises of respective countries.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A blockchain based information security system in which the blockchain includes a plurality of user nodes that correspond to respective user devices. The system comprises a verification module having a plurality of verification nodes that correspond to respective verification devices, and are connected to the user nodes through a peer-to-peer network. The verification device comprises a data storage unit for storing previous transaction messages generated by the user node, and a cluster creating unit for dynamically grouping other verification nodes to create multiple clusters by broadcasting a communication signal to the other verification nodes. When a real-time transaction message generated by the user node is transferred to a data block and the data block is broadcasted to the other user node and the verification nodes, the real-time transaction message is then distributed and recorded by each cluster to the verification devices and each verification devices of each cluster verifies the transaction message.

Description

BLOCKCHAIN BASED INFORMATION SECURITY SYSTEM AND METHOD
BACKGROUND OF THE INVENTION
1. Field of the Invention
[0001 ] The present invention relates to an information security system and method, in particular a blockchain based information security system and method.
2. Description of the Related Art
[0002] In the blockchain-based application system and method of the existing blockchain application field, the participants compete with each other through creating and verifying blocks, and the standard of criterion for the competition is called“consensus mechanism”.
[0003] For example, bitcoin mining mechanism adopts the PoW (Proof of Work) to prove consensus mechanism, which obtains the accounting rights through arithmetic competition, creates a ledger block, and stores it after verifying through other nodes. However, most of the participants in the initial stage have dual identities and corresponding functions (ie, creating blocks & verifying blocks). As security of PoW is practically secured by“node verifiers”, the recorded data can be altered only when 51% of the nodes agree. In this way, a high security threshold may be created. As such, PoW is considered as the most secure consensus mechanism today.
[0004] Since blockchain has the characteristics of decentralization, and the nodes can be realized easily due to accessibility, it is costly to destroy the blockchain application system. Unfortunately,“mining behavior” is not energy saving and thus is not environmentally friendly, and is not suitable for practical commercial applications. In addition, in order to check the nodes to make up for the final consistency, each of the afore-mentioned conventional nodes needs to record all previous transaction records, so as to fulfill the obligation and rights of creating and verifying the blocks. As such, the workload associated with the calculation of the nodes is heavy and energy consuming, renders the cost of the equipment rises and the production efficiency declines. As a result, virtual assets that are valueless to the real economy are created, and thus large amount of financial speculations prevail.
[0005} In view of the above, there is a need to develop a novel and innovative blockchain based information security system and method, which has the following inventive consensus mechanism scheme to solve the following shortcomings of blockchain, such as (01) large amount of useless computation that results in energy wastage; (02) low transaction speed, which effects only 7 transactions per second, while the enterprises need at least a thousand folds, and require a transaction speed of millisecond level; (3) the service of the public chain of the blockchain may be hacked; and (4) the public chain is completely transparent, and the details of coiporate transactions are exposed; to the contrary, the enterprises need optional transparencies from the aspect of business.
SUMMARY OF THE INVENTION
[0006] The main object of the present invention is to provide an information security system and method based on a highly reliable and secure blockchain, which provides verification nodes that can only verify the validity of the transaction messages, and at the same time distributedly records the previous and real-time transaction messages in the verification devices corresponding to the verification nodes. In this way, the storage capacity and the computing workload required for each verification node can be greatly reduced, thereby reduces the cost of the installation for verifying the transaction messages, and significantly increase the overall number of the verification nodes so as to improve the reliability and security of the associated application systems.
[ 0007 ] More particularly, the present invention provides a technical solution in which the two execution operations“block creation” and“block verification” are divided into two independent operations. That is to say,“block creation” may still be executed on the original chain, and the methods for creating the block can be determined based on the rules as defined by the private chains of respective enterprises. The methods can be regulated by the private chains internally, and the blocks can be created by any of the participants. However, after the block has been created, it must be sent to the verification node, for example, a router, for verification. Therefore, by making the function of verifying the accuracy of the block information independent, and using the distributed blockchain transaction message recording mechanism, the present invention effectively provides a mechanism which enables security of the transaction information in the blockchain and reduces the overall cost of verification.
[0008] To achieve the above object, an aspect of the present invention provides a blockchain based information security system, wherein the blockchain includes a plurality of user nodes, each of which corresponds to a user device, and the information security system comprising: a verification module having a plurality of verification nodes connected to the plurality of user nodes through a peer-to-peer network, each of the verification nodes corresponds to a verification device; wherein each of the verification devices comprises: a data storage unit configured to store all previous transaction messages generated by the user node; and a cluster creating unit configured to dynamically group other verification nodes to create a plurality of clusters by broadcasting a communication signal to said other verification nodes; and wherein when a real-time transaction message generated by one of the user nodes is sent to a data block and the data block is broadcasted to the other user node and the verification nodes, the real-time transaction message is distributed and recorded by each of the clusters to the verification devices and each verification device of each cluster verifies the real-time transaction message.
[0009] Another aspect of the present invention provides a blockchain based information security system, wherein the blockchain includes a plurality of user nodes, each of which corresponds to a user device, and the information security system comprising: a verification module having a plurality of verification nodes, each of the verification nodes corresponds to a verification device; a processing module for interconnecting the user notes and the verification nodes through a peer-to-peer network, wherein the processing module comprises: a grouping unit configured to group the user nodes and the verification nodes to create a plurality of clusters, wherein each cluster includes at least the plurality of verification nodes; wherein when a real-time transaction message generated by one of the user nodes is sent to a data block and the data block is broadcasted to the other user node and the verification nodes, the real-time transaction message is distributed and recorded by each of the clusters to the verification devices and each verification device of each cluster verifies the respective real-time transaction message,
[ 0010] A further aspect of the present invention provides a method for securing information in a blockchain having a plurality of user nodes, the plurality of user nodes each corresponds to a user device; the method comprising: (A): providing a plurality of verification nodes connected to the plurality of user nodes through a peer-to-peer network, the verification nodes each corresponds to a verification device; (B): dynamically grouping the verification nodes to create a plurality of clusters; and (C): when a real-time transaction message generated by one of the user nodes is transferred to a data block, and the data block is broadcasted to the other user node and the verification node, each of the clusters records the real-time data block to the verification device in a distributed manner, and each of the verification devices of each cluster verifies the real-time transaction message.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG, 1 A is a schematic diagram illustrating a blockchain-based information security system according to an embodiment of the present invention.
FIG. IB is a block diagram illustrating a verification device according to another embodiment of the present invention.
FIG. 1C is a schematic diagram illustrating a blockchain-based information security system according to an embodiment of the present invention.
FIG. ID schematically illustrates that real-time transaction messages are distributed and recorded in verification nodes in accordance with an exemplary embodiment. FIG. 2 is a schematic diagram illustrating a blockchain-based information security system according to another embodiment of the present invention.
FIG, 3 is a flow chart illustrating a blockchain-based information security method in accordance with an exemplary embodiment.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0011 ] The present invention is related to a blockchain-based information security system and method. In the description, similar elements will be denoted by the same reference numerals. In addition, the drawings of the present invention are only intended to be illustrative, and are not necessarily drawn to scale, and all details are not necessarily be shown in the drawing.
[0012] Referring to FIGS. 1A and IB, in which FIG. 1A is a schematic diagram of a blockchain-based message security system according to an embodiment of the present invention, and FIG. IB is a block diagram illustrating a verification device according to another embodiment of the present invention. The figures show a blockchain-based information security system 1 in which a blockchain 2 includes a plurality of user nodes 21, and each user node 21 corresponds to a user device 22. The information security system 1 may include a verification module 3 having plurality of verification nodes 31. Each verification node 31 corresponds to a verification device 32. The user node 21 and the verification node 31 are connected to each other through a peer-to-peer network.
[0013] As shown in FIG. IB, each of the verification devices 32 includes a data storage unit 33 and a cluster creating unit 34. The data storage unit 33 is configured to store all previous transaction messages generated by the user node 21. The cluster creating unit 34 is configured to dynamically group the other verification nodes 31 to form clusters through posting a communication signal to the verification node 31. In addition, in the embodiment, the verification device 32 includes a router R. However, the present invention is not limited thereto. The verification device 32 may also be an electronic device having the abilities of internet connection, processing and storing.
[ 0014] The verification devices 32 may make voluntarily broadcast among each other, and create a cluster 5 based on at least one of the following factors: the fastest connection speed in message transmission or the shortest message transmission path between the verification devices, or the transaction messages omitted in the previous transaction messages stored in the verification nodes 31 corresponding to the verification device 32. As such, since the user devices 22 corresponding to the user nodes 21 in the cluster 5 store the complete previous transaction messages, the user nodes 21 can map the previous transaction messages to the verification nodes 31 in the same cluster 5, thereby ensuring that the previous transaction messages integrated in the verification nodes 31 are complete and no omission is involved.
[ 0015] Further, when the user node 21 in the blockchain 2 generates a real-time transaction message and posts it to a data block, and broadcasts the data block to other user node 21 and verification node 31, each of the clusters 5 distributes and records the data block to the verification device 32 corresponding to the verification node 31. On the other hand, when the respective verification nodes 31 of the same cluster 5 need to verify the real-time transaction message, they may broadcast to other verification nodes 31 to acquire the complete previous transaction messages and real-time transaction messages to verify the accuracy of this real-time transaction message.
[0016] Referring now to FIG. 1C which schematically illustrates a blockchain-based information security system according to a further embodiment of the present invention. Even though in the embodiment as described hereinbefore, the constituent components of the cluster 5 are exemplified by verification nodes 31, the present invention shall not be limited thereto. In a further embodiment according to the present invention, the cluster 5 may include at least one user node 21 and a plurality of verification nodes 31. In other words, the cluster creating unit 34 can detect the fastest connection speed in message transmission or the shortest message transmission path between the corresponding verification nodes 31 and the user nodes 21 and other verification nodes 31, and consider the transaction messages omitted in the previous transaction messages stored in the verification device 32 associated with the verification nodes, to create the clusters 5.
[0017] In this way, since the user devices 22 corresponding to the user nodes 21 in the cluster 5 store the complete previous transaction messages, the user nodes 21 can map the previous transaction messages to the verification nodes 31 in the same cluster 5, to ensure that the previous transaction information integrated between the verification nodes 31 are complete and none is omitted.
[0018] Furthermore, each cluster creating unit 34 can dynamically adjust the matching numbers of the user nodes 21 and the verification nodes 31 in each cluster 5 according to the real-time communication speed and the omissions of the previous transaction messages stored. For example, the cluster 5 formed initially has a user node 21 and a plurality of verification nodes 31. When the verification nodes 31 in the cluster 5 have distributed and recorded the complete, previous transaction messages through the user nodes 21, that is, when each of the verification nodes 31 in the cluster 5 acquires complete, previous transaction messages through broadcasting each other, the cluster creating units 34 may readjust the components of the cluster 5 between each other, to exclude the user node 21 from the original cluster 5, and even exclude the verification nodes 31 having duplicate message records in the cluster 5, so that clusters 5 having fewer components are formed, thereby improving the overall effectiveness of verification.
[0019] Furthermore, when the user node 21 in the blockchain 2 generates a real-time transaction message and transmits the same to a data block and broadcasts the data block to the other user node 21 and verification node 31, each cluster 5 records the data block in a distributed manner to the verification device 32 corresponding to the verification node 31. On the other hand, when the verification nodes 31 of the same cluster 5 have to verify this real-time transaction messages, they may obtain complete, previous transaction messages and real-time transaction messages from other verification nodes 31 by broadcasting so as to verify the accuracy of this real-time transaction message.
[0020] Referring now to FIG. ID which schematically illustrates the recording of the real-time transaction messages in distributed maimer in the verification nodes in accordance with an exemplary embodiment. As shown, when the user node 21 transmits the newly generated real-time transaction message to the data block, and broadcasts the data block to the other user node 21 and verification node 31, the data block will distributedly record the transaction message in at least two verification devices 32 of each cluster 5. In particular, the real-time transaction message generated by the user node 21 is first divided into N equal segments. Then the segments of real-time transaction messages are distributedly recorded in the verification device 32 corresponding to the verification node 31. For example, the first and second segments of the real-time transaction message are allocated in the router corresponding to the first verification node; and the third and fourth segments of the real-time transaction message are allocated in the router corresponding to the second verification node. In this manner, the 2N-lth and 2Nth segments of the real-time transaction message are allocated in the router corresponding to the N* verification node. In this way, by means of the afore-mentioned distributed recording mechanism of the transaction message, the storage capacity required for each verification device can be greatly reduced, thereby improving the storage efficiency.
[0021 ] Furthermore, by means of the distributed storage mechanism for the verification node 31 in each of the clusters 5, the cluster creating unit 34 may determine the quantity of the verification nodes 31 needed in each cluster 5 based on the size of the overall contents needed for recording the previous and real-time transaction messages. For example, when the size of the contents needed for the previous and real-time transaction messages is 64G, then the cluster creating unit 34 will dynamically edit at least 64 verification nodes 31 having a storage capacity of 1G to completely store the overall transaction messages in a distributed manner.
[0022] Furthermore, in a further embodiment according to the present invention, when the verification device 32 corresponding to the verification node 31 in the cluster 5 does not completely receive and record the real-time and previous transaction messages, the verification node 31 in the same cluster 5 will broadcast to other clusters 5, and then retrieve the omitted, corresponding transaction messages from the user node 21 or verification node 31 of the other cluster 5, and distributedly record the retrieved transaction messages to the verification device 32 in the same cluster 5. As such, the verification node 31 in the same cluster 5 may verify the accuracy of the real-time transaction messages.
[0023] FIG. 2 is a schematic diagram illustrating a blockchain-based information security system 1 according to another embodiment of the present invention. As shown in FIG. 2, hlockchain 2 includes a plurality of user nodes 21, and each of which corresponds to a user device 22. In short, each user node 21 can be considered as an individual account of respective user. The message security system 1 comprises a verification module 3 having a plurality of verification nodes 31, and a processing module 4. Each of the verification nodes 31 corresponds to a verification device 32. In addition, in this embodiment, the verification device 32 includes a router, hut the present invention is not limited thereto, and the verification device 32 can also be an electronic device having internet access, processing and storage capability.
[0024] The processing module 4 is configured to connect the user nodes 21 and the verification nodes 31 through a peer-to-peer network. The processing module comprises a grouping unit 41 configured to dynamically group the user nodes 21 and the verification nodes 31 to create a plurality of clusters 5, wherein each cluster 5 includes at least two or more verification nodes 31. In particular, the grouping unit 41 may monitor the real-time communication speed between the verification nodes 31 and the transaction messages omitted in the previous transaction messages stored so as to more appropriately create the cluster 5 by dynamic matching and grouping. In other words, the grouping unit 41 may create the cluster 5 by detecting the fastest connection speed in message transmission or the shortest message transmission path between the verification nodes 31, and considering the complementarity and heterogeneity of the previous transaction messages stored in the verification device 32 corresponding to the verification nodes 31. In this way, broadcasting among the verification nodes 31 in every cluster 5 can be made in an efficient manner, and the previous transaction messages integrated by the verification nodes 31 are completed, and the repetition of the message information is reduced.
[0025] In the above embodiment, the forming component of the cluster 5 is only the verification node 31 as an example, but the invention is not limited thereto. In another embodiment of the present invention, the cluster 5 may include at least one user node 21 and a plurality of verification nodes 31. That is to say, the grouping unit 41 can detect the fastest connection speed in message transmission or the shortest message transmission path between the verification nodes 31 and the user nodes 21 and consider the transaction messages omitted in the previous transaction messages stored in the verification devices corresponding to the verification nodes, to create the clusters 5. In this way, as the user devices 22 corresponding to the user nodes 21 in the cluster 5 stores the complete previous transaction messages, the user node 21 can map the previous transaction messages to the verification nodes 31 in the same cluster 5, thereby ensures that the previous transaction messages integrated in the verification nodes 31 are complete without any omission.
[0026] Furthermore, the grouping unit 41 can dynamically adjust the matching quantity of the user nodes 21 and the verification nodes 31 in each cluster 5 according to the real-time communication speed and the omissions of the stored previous transaction messages. For example, even if the cluster 5 created at the outset includes a user node 21 and a plurality of verification nodes 31, but when the verification nodes 31 in the cluster 5 have been distributedly obtained through the user nodes 21, and completely record previous transaction messages, that is, the verification nodes 31 in the cluster 5 have acquired previous transaction messages in complete through broadcast among each other, the grouping unit 41 may readjust the constituents of the cluster 5, and exclude the user nodes 21 from the original cluster 5, and even the verification nodes 31 with duplicate message records in the cluster 5 can be excluded. As such, clusters 5 having fewer constituents are formed, and thus the overall verification efficiency is improved.
[ 0027] Further, when the user node 21 in the blockchain 2 generates a real-time transaction message and posts it to a data block and broadcasts the data block to other user node 21 and verification node 31, each of the clusters 5 distributes and records the data block to the verification device 32 corresponding to the verification node 31. On the other hand, when the respective verification nodes 31 of the same cluster 5 need to verify the real-time transaction message, they may broadcast to other verification nodes 31 to acquire the complete previous transaction messages and real-time transaction messages to verify the accuracy of this real-time transaction message.
[ 0028 ] In short, the verification device 32 in this embodiment creates a cluster 5 in a passive manner by using the grouping unit 41 to detect the nature of the data stored therein and the connection response rate thereof. In contrast to this embodiment, each of the verification devices 32 of the embodiments mentioned earlier uses the cluster creating unit 34 to actively broadcast to each other to create the cluster 5. As regards the storing of the distributed records of the previous transaction messages and real-time transaction messages in the verification device 3 of this embodiment, the associated operation mechanism and framework are similar to those of the earlier mentioned embodiments, and thus are omitted in description.
[0029 ] FIG. 3 is a flow chart illustrating a blockchain-based information security method in accordance with an exemplary embodiment. As shown in the figure, the method 6 for securing information in a blockchain 2 is applicable to the framework of the blockchain-based information security system 1 of the afore-mentioned embodiments. According to the method, the blockchain 2 includes a plurality of user nodes 21, the plurality of user nodes each corresponds to a user device 22. The method comprises: step A of providing a plurality of verification nodes 31 connected to the plurality of user nodes 22 through a peer-to-peer network, and the verification nodes 31 each corresponds to a verification device 32. The verification device 32 can be an electronic device having a network connection function and processing and storage capabilities, such as a router.
[0030] The information securing method 6 further comprises step B of dynamically grouping the verification nodes 31 to create a plurality of clusters. In particular, the verification nodes 31 can actively broadcast to each other through the cluster creating unit 34 in their corresponding verification device 32, and form the cluster 5 by detecting the fastest connection speed in message transmission or the shortest message transmission path between the verification nodes 31, considering the complementarity and heterogeneity of the previous transaction messages stored in the verification device 32 corresponding to the verification nodes 31. Alternatively, according to another embodiment of the present invention, the verification nodes 31 may form the cluster 5 by detecting the fastest connection speed in message transmission or the shortest transmission path between each other via an external grouping unit 41, and consider the complementarity and heterogeneity of the previous transaction messages stored in the verification device 32 corresponding to the verification nodes 31.
[0031] The information securing method 6 further comprises step C in which when a real-time transaction message generated by one of the user nodes 21 is transferred to a data block and the data block is broadcasted to the other user node 21 and the verification device 32, each of the clusters 5 records the real-time data block in a distributed manner to the verification device 32, and each of the verification devices of each cluster verifies the real-time transaction message. Further, the verification nodes 31 in each cluster record the real-time transaction messages and previous transaction messages in respective corresponding verification devices 32 through labor division and cooperation, so that each verification device 32 does not have to completely record all transaction messages. As such, when each verification node 31 needs to verify the validity of a real-time transaction message, it may broadcast to other verification nodes 31 in the cluster 5 to obtain fragments of the real-time and previous transaction messages from respective corresponding verification device 32, and then the fragmental transaction messages are integrated into complete transaction messages to verify the accuracy of the real-time transaction message.
[0032] Through the specific description of the above embodiments, the blockchain-based message security system 1 and method 6 thereof of the present invention can effectively transmit a single private block, for example, through a router that can maintain the power-on state for a long time and all around the clock. Chain, alliance chain, or simultaneous trading of more than two independent blockchains, providing a highly reliable verification mechanism while significantly reducing equipment costs and reducing energy consumption.
[0033] Given the above, the blockchain-based information security system 1 and method 6 according to the present invention will provide a highly reliable mechanism by means of for example, a router that is power-on around the clock to verify the transaction messages of a single private blockchain, an alliance chain, or two or more independent blockchains, and. in the mean time, can reduce greatly the installation cost and energy consumption.
[0034] Given the above, the blockchain-based information security system 1 and method 6 according to the present invention provide a solution to distinct“verifying the blocks” from“creating the blocks” by means of verification nodes (for example; using routers as verification nodes). For example, a household 24-hours uninterruptible router is used as a node body for conducting verification, which only verifies but not creates the block (creating or accounting the block will be executed by private chains). In this way, the verification process of the router is operated in the background, and it is not necessary to reward the participants as they do not involve in mining, and most of the business activities do not need to go through coins. Furthermore, the performance of the router is balanced, the storage unit is consistent, and the network connection is stable. Simple verification behavior enables enhanced security, faster speed and privacy of the overall system, and keeps the difference in data throughput balanced. In existing application field of the blockchain, even Ethereum (ETH) which has the largest number of nodes, has only about 27,097 nodes, whereas the blockchain for bitcoin has about 11,218 nodes. Therefore, to create chaos by hacking, if based on the number of household routers (one node per household/ISP with address), it is necessary to have fifty thousands households to conspire. The present invention is thus far more secure than any existing consensus mechanisms applied by existing blockchain technology. In Taiwan, there are now tens of thousands of routers working synchronously, and eventually more than hundred million routers will be used as verification nodes in the world. Such peer-to-peer connection will become the foundation of the next generation“internet of value”, and is a primary basic backbone engineering of the blockchain, which will consistently secure the commercial blockchains of the enterprises of respective countries.
[0035] The preferred embodiments of the present invention are illustrative only, and are not limited to the details disclosed in the drawings and the specification. Many changes can be made by those having ordinary skill in the art without departing from the equivalent changes and modifications made by the claims of the present invention, and should belong to the scope of the present invention.

Claims

What is claimed is:
1. A blockchain based information security system, wherein the blockchain includes a plurality of user nodes, each user node corresponds to a user device, and the information security system comprising: a verification module having a plurality of verification nodes connected to the plurality of user nodes through a peer-to-peer network, each verification node corresponds to a verification device; wherein each verification device comprises:
a data storage unit configured to store all previous transaction messages generated by the user nodes; and a cluster creating unit configured to dynamically grouping at least one other verification node to create a cluster by broadcasting a communication signal to the at least one other verification node; and
wherein when a real-time transaction message generated by one of the user nodes is transferred to a data block and the data block is broadcasted to the other of the user nodes and the verification nodes, each cluster records the real-time transaction message to the verification devices in a distributed manner and each verification device of each cluster verifies the real-time transaction message.
2. The blockchain based information security system of claim 1, wherein each verification device comprises a router.
3. The blockchain based information security system of claim 1, wherein each cluster includes at least one user node and a plurality of verification nodes.
4. The blockchain based information security system of claim 1, wherein when the real-time transaction message generated by one of the user nodes is transferred to a data block and the data block is broadcasted to the other of the user nodes and the verification nodes, the data block is recorded in at least two verification devices of each cluster in a distributed manner.
5. The blockchain based information security system of claim 1, wherein each verification node is configured to verify the real-time transaction message by acquiring the transaction message and the previous transaction messages from the verification devices in the same cluster.
6. The blockchain based information security system of claim 5, wherein when the verification devices of one of the clusters fail to completely receive and record the transaction message and the previous transaction messages, the verification nodes in the same cluster acquire the corresponding omitted transaction messages from the user node of the other cluster, and record the omitted transaction messages in a distributed manner in the verification devices of the same cluster.
7. The blockchain based information security system of claim 1, wherein the cluster creating unit of each verification device is configured to dynamically group the at least one other verification node to create the cluster based on at least one of the real-time communication speed between the other verification nodes and the omissions in the previous transaction messages stored.
8. A blockchain based information security system, wherein the blockchain includes a plurality of user nodes, each user node corresponds to a user device, and the information security system comprising: a verification module having a plurality of verification nodes, each verification node corresponds to a verification device; a processing module for connecting the user notes and the verification nodes with a peer-to-peer network, wherein the processing module comprises: a grouping unit configured to group the user nodes and the verification nodes to form a plurality of clusters, wherein each cluster at least includes the verification nodes; wherein when a real-time transaction message generated by one of the user nodes is transferred to a data block and the data block is broadcasted to the other of the user nodes and the verification nodes, each cluster records the real-time transaction message to the verification devices in a distributed manner and each verification device of each cluster verifies the real-time transaction message.
9. The blockchain based information security system of claim 8, wherein each verification device comprises a router.
10. The blockchain based information security system of claim 8, wherein each cluster includes at least one user node and a plurality of verification nodes.
11. The blockchain based information security system of claim 8, wherein when the real-time transaction message generated by one of the user nodes is transferred to a data block and the data block is broadcasted to the other of the user nodes and the verification nodes, the data block is recorded in at least two verification devices of each cluster in a distributed manner.
12. The blockchain based information security system of claim 8, wherein each of the verification nodes is configured to verify the real-time transaction message by acquiring the transaction message and the previous transaction messages from the verification devices of the respective clusters.
13. The blockchain based information security system of claim 12, wherein when the verification devices of one of the clusters fail to completely receive and record the transaction message and all the previous transaction messages, the verification nodes in the same cluster acquire the corresponding omitted transaction messages from the user node of the other cluster, and record the omitted transaction messages in a distributed manner in the verification devices of the same cluster.
14. The blockchain based information security system of claim 8, wherein the grouping unit is configured to dynamically group the verification nodes to create a plurality of clusters based on at least one of the real-time communication speed between the verification nodes, and the omissions in the previous transaction messages stored.
15. A method for securing information in a blockchain having a plurality of user nodes, the plurality of user nodes each corresponds to a user device; the method comprising; providing a plurality of verification nodes connected to the plurality of user nodes with a peer-to-peer network, each verification node corresponds to a verification device; dynamically grouping the verification nodes to create a plurality of clusters; and when a real-time transaction message generated by one of the user nodes is transferred to a data block, and the data block is broadcasted to the other of the user nodes and the verification nodes, each cluster records the real-time data block to the verification devices in a distributed manner, and the verification devices of each cluster verifies the real-time transaction message.
16. The method of claim 15, wherein in the step of dynamically grouping the verification nodes to create the clusters, the clusters are created by a grouping unit or by broadcasting communication signals between the verification nodes.
17. The method of claim 16, wherein the step of dynamically grouping the verification nodes to create the clusters is based on at least one of the real-time communication speed between the verification nodes and the omissions in the previous transaction messages stored.
PCT/US2018/064838 2017-12-21 2018-12-11 Blockchain based information security system and method WO2019125814A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201762608640P 2017-12-21 2017-12-21
US62/608,640 2017-12-21

Publications (1)

Publication Number Publication Date
WO2019125814A1 true WO2019125814A1 (en) 2019-06-27

Family

ID=66994159

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/064838 WO2019125814A1 (en) 2017-12-21 2018-12-11 Blockchain based information security system and method

Country Status (1)

Country Link
WO (1) WO2019125814A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275554A (en) * 2020-01-22 2020-06-12 北京瑞卓喜投科技发展有限公司 Securities type general certificate trading method and system and storage medium
CN111415161A (en) * 2020-04-27 2020-07-14 财付通支付科技有限公司 Block chain-based data verification method and device and computer-readable storage medium
CN111539030A (en) * 2020-04-29 2020-08-14 中国银行股份有限公司 Information verification method and node
CN111639129A (en) * 2020-05-24 2020-09-08 中信银行股份有限公司 Transaction processing method and device, electronic equipment and computer-readable storage medium
CN112448817A (en) * 2019-09-05 2021-03-05 陈小虎 Decentralization consensus scheme
CN113610523A (en) * 2021-08-05 2021-11-05 润联软件系统(深圳)有限公司 Credible contract consensus method, device and equipment for improving performance of alliance chain
CN113919846A (en) * 2021-12-15 2022-01-11 腾讯科技(深圳)有限公司 Block link point dynamic grouping method and device, computer equipment and storage medium
CN117670541A (en) * 2023-12-05 2024-03-08 云南大学 Double-chain distributed power transaction system and method with optimized performance

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160283941A1 (en) * 2015-03-27 2016-09-29 Black Gold Coin, Inc. Systems and methods for personal identification and verification
US20170126702A1 (en) * 2015-08-20 2017-05-04 Guardtime Ip Holdings Limited Verification lineage tracking and transfer control of data sets
US20170323392A1 (en) * 2016-05-05 2017-11-09 Lance Kasper Consensus system for manipulation resistant digital record keeping

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160283941A1 (en) * 2015-03-27 2016-09-29 Black Gold Coin, Inc. Systems and methods for personal identification and verification
US20170126702A1 (en) * 2015-08-20 2017-05-04 Guardtime Ip Holdings Limited Verification lineage tracking and transfer control of data sets
US20170323392A1 (en) * 2016-05-05 2017-11-09 Lance Kasper Consensus system for manipulation resistant digital record keeping

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112448817A (en) * 2019-09-05 2021-03-05 陈小虎 Decentralization consensus scheme
CN111275554A (en) * 2020-01-22 2020-06-12 北京瑞卓喜投科技发展有限公司 Securities type general certificate trading method and system and storage medium
CN111415161A (en) * 2020-04-27 2020-07-14 财付通支付科技有限公司 Block chain-based data verification method and device and computer-readable storage medium
CN111415161B (en) * 2020-04-27 2024-03-19 财付通支付科技有限公司 Block chain-based data verification method and device and computer readable storage medium
CN111539030A (en) * 2020-04-29 2020-08-14 中国银行股份有限公司 Information verification method and node
CN111539030B (en) * 2020-04-29 2023-11-24 中国银行股份有限公司 Information verification method and node
CN111639129A (en) * 2020-05-24 2020-09-08 中信银行股份有限公司 Transaction processing method and device, electronic equipment and computer-readable storage medium
CN113610523A (en) * 2021-08-05 2021-11-05 润联软件系统(深圳)有限公司 Credible contract consensus method, device and equipment for improving performance of alliance chain
CN113919846A (en) * 2021-12-15 2022-01-11 腾讯科技(深圳)有限公司 Block link point dynamic grouping method and device, computer equipment and storage medium
CN113919846B (en) * 2021-12-15 2022-03-08 腾讯科技(深圳)有限公司 Block link point dynamic grouping method and device, computer equipment and storage medium
CN117670541A (en) * 2023-12-05 2024-03-08 云南大学 Double-chain distributed power transaction system and method with optimized performance

Similar Documents

Publication Publication Date Title
WO2019125814A1 (en) Blockchain based information security system and method
Yu et al. A high performance blockchain platform for intelligent devices
Chen et al. SSChain: A full sharding protocol for public blockchain without data migration overhead
CN108200203B (en) Block chain system based on double-layer network
US11095451B2 (en) Optimal data storage configuration in a blockchain
CN108717630B (en) Block output method and implementation system thereof
CN108737375B (en) Block chain consensus method and system
Bano et al. The road to scalable blockchain designs
US10657526B2 (en) System and method to dynamically setup a private sub-blockchain based on agility of transaction processing
US20200052996A1 (en) Consensus incentive method for blockchain
US10154086B1 (en) Distributed consumer cloud storage system
CN110868440A (en) Block chain male chain
CN108805627B (en) Media resource allocation method, device, system, medium and equipment
KR102566892B1 (en) Blockchain consensus method, device and system
WO2023045620A1 (en) Transaction data processing method and apparatus, computer device and storage medium
JP2020525876A (en) Implementation of parallel execution of transactions in distributed ledger system
CN108347483B (en) Decentralized computing system based on double-layer network
CN109951474A (en) A method of realizing that block chain is known together out block
KR102050087B1 (en) The block-chain system including POPS(Proof of Power specification and Stake) consensus algorithm and block generation method in the block-chain system
CN109684519B (en) Decentralized chip research and development transaction data storage method and system based on block chain
WO2022048357A1 (en) Transaction endorsement method and apparatus, and storage medium
CN109101338A (en) A kind of block chain processing framework and its method based on the extension of multichannel chip
CN111066050A (en) Using intelligent contracts to retrieve value of digital tickets in blockchain networks
CN111639080A (en) Data processing method and device, node equipment and storage medium
CN112187866A (en) Novel block chain consensus method based on shared storage

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18890669

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18890669

Country of ref document: EP

Kind code of ref document: A1