WO2020233073A1 - Procédé, dispositif et appareil de traitement de test d'environnement de chaîne de blocs, et support de stockage - Google Patents
Procédé, dispositif et appareil de traitement de test d'environnement de chaîne de blocs, et support de stockage Download PDFInfo
- Publication number
- WO2020233073A1 WO2020233073A1 PCT/CN2019/122013 CN2019122013W WO2020233073A1 WO 2020233073 A1 WO2020233073 A1 WO 2020233073A1 CN 2019122013 W CN2019122013 W CN 2019122013W WO 2020233073 A1 WO2020233073 A1 WO 2020233073A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- deployment
- configuration information
- network
- detection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0889—Techniques to speed-up the configuration process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Definitions
- This application relates to the field of blockchain technology, and in particular to a method, equipment, device and non-volatile computer-readable storage medium for detecting a blockchain environment.
- Blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Its essence is a decentralized database. Through decentralization and trustlessness, all nodes in the network to the blockchain network are connected to generate data blocks through a series of cryptographic methods, and each data block contains All the information exchange data of the current blockchain network is used, and the next data block is connected through network routing.
- each user represents a network node.
- it is necessary to deploy the blockchain network environment according to the conditions of each network node to meet the operational requirements of the blockchain network.
- each node is distributed in different network environments. If the blockchain environment is deployed abnormally, it will easily lead to the failure of the inter-node link, the abnormal network node and the abnormal message middleware.
- the blockchain environment needs to be rebuilt, which reduces the deployment efficiency of the blockchain network.
- the main purpose of this application is to provide a blockchain environment detection method, equipment, device and storage medium, which aims to solve the technical problem of low deployment efficiency of the blockchain network in the prior art.
- this application provides a blockchain environment detection method, which includes the following steps:
- node configuration information of all network nodes in the blockchain network to be constructed, where the node configuration information includes node types;
- the deployment normal information is generated
- a deployment exception information is generated
- the step of judging whether all node configuration information meets respective corresponding deployment detection standards includes:
- the network node is an endorsing node, determine whether the mirror file in the node configuration file of the endorsing node is a Fabric mirror;
- the step of generating deployment exception information includes:
- mirror exception information is generated.
- this application also proposes a blockchain environment detection device, the device includes: a first acquisition module, a second acquisition module, and an environment detection module;
- the first obtaining module is configured to obtain node configuration information of all network nodes in the blockchain network to be constructed, where the node configuration information includes node types;
- the second acquisition module is configured to determine the node type of all network nodes according to the node configuration information, and query the deployment detection standard corresponding to the node type in a preset deployment mechanism table;
- the environment detection module is used to determine whether all node configuration information meets their corresponding deployment detection standards
- the environment detection module is further configured to determine whether the image file in the node configuration file of the endorsing node is a Fabric image if the network node is an endorsing node;
- the environment detection module is also used to generate deployment normal information when all node configuration information meets respective corresponding deployment detection standards;
- the environment detection module is further configured to generate deployment exception information when it is detected that the configuration information of a node does not meet its corresponding deployment detection standard;
- the environment detection module is also used to generate mirror abnormality information when the mirror file is not a Fabric mirror.
- this application also proposes a blockchain environment detection device, the device includes: a memory, a processor, and computer-readable instructions stored on the memory and running on the processor The computer-readable instructions are configured to implement the steps of the blockchain environment detection method as described above.
- the present application also proposes a non-volatile computer-readable storage medium having computer-readable instructions stored thereon, and the computer-readable instructions are processed When the device is executed, the steps of the blockchain environment detection method described above are implemented.
- FIG. 1 is a schematic diagram of the structure of the hardware operating environment involved in the solution of the embodiment of the present application
- FIG. 2 is a schematic flowchart of an embodiment of a method for detecting a blockchain environment in this application
- FIG. 3 is a schematic flowchart of another embodiment of a method for detecting a blockchain environment according to the application
- FIG. 4 is a schematic flowchart of another embodiment of a method for detecting a blockchain environment according to the application
- 5 is a detailed schematic diagram of the steps of sending channel detection instructions to the blockchain network to be constructed in the blockchain environment detection method of this application;
- Fig. 6 is a structural block diagram of an embodiment of a blockchain environment detection device of the present application.
- FIG. 1 is a schematic structural diagram of a blockchain environment detection device for a hardware operating environment involved in a solution of an embodiment of the application.
- the device may include a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
- the communication bus 1002 is used to implement connection and communication between these components.
- the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
- the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
- the memory 1005 can be a high-speed RAM memory or a stable memory (non-volatile memory), such as disk storage.
- the memory 1005 may also be a storage device independent of the foregoing processor 1001.
- FIG. 1 does not constitute a limitation on the above-mentioned device, and may include more or less components than shown in the figure, or combine certain components, or arrange different components.
- a memory 1005 which is a non-volatile computer-readable storage medium, may include an operating system, a data storage module, a network communication module, a user interface module, and computer-readable instructions.
- the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with users; the processor 1001 and the memory 1005 in the device of this application can be set in the device
- the device calls the computer-readable instructions stored in the memory 1005 through the processor 1001, and executes the blockchain environment detection method provided by the embodiment of the present application.
- FIG. 2 is a schematic flowchart of an embodiment of a method for detecting a blockchain environment in this application.
- the method includes the following steps:
- Step S10 obtaining node configuration information of all network nodes in the blockchain network to be constructed
- the blockchain network there are multiple network nodes, and one network node represents a participating member.
- the node configuration information of the network node includes the node type, node address, and node identifier of the current network node.
- the node type is used to classify network nodes according to the role of the network node; the node address is used to locate the network node to facilitate data transmission in the blockchain; the node identifier is used to distinguish each network node.
- Step S20 Query the deployment detection standard corresponding to the node configuration information of each network node in the preset deployment mechanism table;
- a deployment mechanism table is preset, and the mapping relationship between node configuration information and deployment detection standards is stored in the deployment mechanism table.
- the node configuration information of each network node is queried in the preset deployment mechanism table to obtain multiple deployments. Testing standards. It should be understood that each network node plays a different role in the entire blockchain, and its corresponding node configuration information is also different.
- the above node configuration information includes at least the current node's system version, application software registry, and Mirror file.
- different deployment detection standards are preset for different network nodes to improve the accuracy of the blockchain environment detection and avoid the failure of the blockchain environment deployment detection to cause subsequent changes to the blockchain technology. The application of is abnormal.
- Step S30 judging whether all the node configuration information meets their corresponding deployment detection standards
- the node configuration information of all network nodes is matched with their corresponding deployment detection standards to determine whether the environment configuration of the network nodes meets the preset rules, where the deployment detection standards include at least the system version standard , Application software standards and mirror file standards.
- the deployment detection standards include at least the system version standard , Application software standards and mirror file standards.
- Step S40 when all the node configuration information meets their corresponding deployment detection standards, generate deployment normal information
- the blockchain when all network node configuration information meets their corresponding deployment detection standards, it means that the environmental deployment of the blockchain meets the predetermined acceptance standard.
- the blockchain can be used by participating users for normal use or For further functional development, normal deployment information is generated to remind developers to enter the next stage of development. Special attention is paid to the fact that because the essence of the blockchain is a distributed ledger, it has the characteristics of decentralization, that is to say, all participants can become the center, therefore, only all network nodes in the blockchain meet the deployment detection When it is standard, the blockchain can be deployed or directly operated by other components.
- Step S50 when it is detected that the configuration information of the node does not meet the corresponding deployment detection standard, the deployment exception information is generated.
- the node configuration information of a network node when it is detected that the node configuration information of a network node does not meet the corresponding deployment detection standard, it indicates that the environment deployment of the network node is abnormal. If the environment is not re-built, the operation of the entire blockchain network will be affected. At this time, the deployment exception information is generated, and the deployment exception information records the reason for the deployment exception and the location of the abnormal deployment network node, and feeds back the deployment exception information so that the developer can rebuild the blockchain environment based on the deployment exception information, and then Improve the deployment efficiency of blockchain networks.
- This embodiment provides a blockchain environment detection method. First, obtain the node configuration information of all network nodes in the blockchain network to be constructed, query in the preset deployment mechanism table, and obtain the deployment detection corresponding to the configuration information of each node Standards, and then determine whether all the node configuration information meets their corresponding deployment detection standards to determine whether to generate deployment normal information or deployment abnormal information. In this embodiment, before the full deployment of the blockchain, the environment of the blockchain is tested to avoid the interruption of the deployment of the entire blockchain network or the need to re-deploy due to the abnormal blockchain environment, thereby improving the block The deployment efficiency of the chain network.
- FIG. 3 is a schematic flowchart of another embodiment of the blockchain environment detection method of this application.
- the deployment detection standard corresponding to the node configuration information of each network node is queried in the preset deployment mechanism table
- the steps include:
- Step S21 Determine the node type of all network nodes according to the node configuration information, and query the deployment detection standard corresponding to the node type in the preset deployment mechanism table;
- the node configuration information includes the node type
- the node type of all network nodes can be determined, and the network nodes can be divided into different types of network nodes for performing transactions according to the different functions of the network nodes in the blockchain. Consensus nodes for consensus processing, endorsement nodes for endorsement processing for initiated transactions, and transaction nodes for converting external requests into blockchain transaction requests.
- the node types of network nodes are not limited to the above three types of nodes.
- the node configuration information corresponds to the node type, and the node configuration information for nodes of the same type is also consistent.
- a deployment mechanism table is preset in this embodiment, and the deployment mechanism table reflects the mapping relationship between node configuration information and deployment detection standards. Therefore, the node type can be determined in the preset deployment mechanism table. In the query, the deployment detection standard corresponding to the node configuration information is obtained.
- the node configuration information of the network node is first obtained.
- the node configuration information contains the node type. Since the configuration information of the network nodes of the same node type is consistent, the node type of the network node can be determined, and then the preset deployment mechanism The deployment detection standards corresponding to the categories are obtained in the table. Through the above method, the detection accuracy of the deployment of the blockchain environment is improved.
- the step of judging whether all node configuration information meets respective corresponding deployment detection standards includes:
- Step S31 if the network node is an endorsing node, judge whether the mirror file in the node configuration file of the endorsing node is a Fabric mirror;
- the network node After determining the node type of the network node, if the network node is an endorsing node, obtain the mirror file in the node configuration information of the endorsing node. It is easy to understand that the mirror file is all the basics currently installed by the network node Mirror, and determine whether the acquired mirror file includes fabric-peer mirror, fabric-ccenv mirror, and fabric-baseos mirror. The collection of the above three mirrors is the Fabric mirror.
- the step of generating deployment exception information includes:
- Step S41 When the mirror file is not a Fabric mirror, generate mirror abnormal information.
- the mirror file in the endorsing node does not include the Fabric mirror, it indicates that the environment configuration of the endorsing node is abnormal, and then the corresponding mirror abnormal information is generated.
- the mirror abnormal information includes the reason for the abnormal deployment of the environment and the node address of the failed node, which is convenient for development
- the personnel rebuild the blockchain environment based on the abnormal information in the mirror image, so as to avoid subsequent redeployment of the entire blockchain due to abnormalities in the blockchain environment, thereby improving the efficiency of blockchain deployment.
- the step of judging whether all the node configuration information meets respective corresponding deployment detection standards further includes:
- Step S32 run the secret-free detection script to verify the secret-free login status of all network nodes
- the developer has pre-edited a secret-free detection script, and after obtaining the node deployment information of all network nodes, runs the secret-free detection script to detect whether all network nodes have the secret-free login function enabled.
- the network node activates the secret-free login function
- the network node can participate in the blockchain through the node address or node name, and the blockchain does not need to verify the identity of the network node by means of verification keys.
- the login function improves the efficiency of blockchain data transmission.
- the secret-free login function is a commonly used technical means in blockchain technology. This embodiment evaluates the construction of the blockchain environment based on its open state to ensure the comprehensiveness of environment deployment and further ensure the comprehensiveness of subsequent blockchain networks Deploy or run directly.
- the step of generating deployment exception information includes:
- Step S52 when the secret-free status information is that the secret-free login is not activated, generate secret-free function exception information.
- the generated content is the secret-free state information that the secret-free login is not activated, which proves that there are network nodes that do not have the secret-free login function in the current blockchain environment.
- the blockchain environment that conforms to the developer's preconceptions will affect the operation of the blockchain, and then feedback abnormal information about the secret-free function, so that the developer can adjust the blockchain environment in time.
- the step of judging whether all the node configuration information meets respective corresponding deployment detection standards further includes:
- Step S33 sending a communication test signal to all network nodes to detect the network connection status of all network nodes
- a communication test signal is sent to all network nodes to detect the network connection status between each network node.
- the communication test signal may be a signal related to the sending of the ICMP protocol, which is used to test whether the IP address of each network node is correct by sending the ICMP protocol to each network node; the communication test signal may also be a signal related to the sending of the DNS protocol.
- the DNS protocol is sent to each network node to test whether the domain name of each network node is correct; the communication test signal can also be a routing instruction. By sending routing instructions to all network nodes, the network connection status of the network node is determined by way of route tracking.
- the normal connection of the server address and network port of each network node in the blockchain is the basis for network nodes to exchange information on the blockchain.
- the network connection status of the network node is detected by the above-mentioned method, and the loading situation of the blockchain environment is evaluated, thereby improving the deployment efficiency of the blockchain.
- the step of generating deployment exception information includes:
- Step S53 when there is network congestion of at least one network node, generate network abnormality information.
- the step of judging whether all the node configuration information meets respective corresponding deployment detection standards further includes:
- Step S34 acquiring the system version in all node configuration information, and determining whether the system version meets the corresponding deployment detection standard
- the step of generating deployment exception information includes:
- Step S54 when the system version of at least one network node is lower than Linux 7.0, generate version exception information.
- the system version installed by each network node must be Centos Linux Above version 7.0, when the system version of at least one network node does not meet the above requirements, the version exception information is generated so that the developer can update the system version of the failed node according to the version exception information.
- the application software installed on each network node should also meet the deployment detection standard, and all network nodes must also be installed with Docker.
- Compose and Python3, two third-party software meet the requirements of the blockchain environment.
- FIG. 4 is a schematic flowchart of another embodiment of the blockchain environment detection method of this application.
- the step of judging whether all node configuration information meets their corresponding deployment detection standards also includes:
- Step S35 Send a channel detection instruction to the blockchain network to be constructed to detect whether the blockchain network can create a message channel, and receive the corresponding detection result;
- network nodes generally include system channels, application channels, and message channels.
- the block chain by detecting whether the block chain can create a message channel, it is determined whether the channel of the network node in the block chain network is abnormal, and then the construction of the block chain environment is evaluated, thereby improving the deployment efficiency of the block chain.
- the received content is the detection result of successful creation.
- the received content is the detection result of failed creation.
- the step of generating deployment exception information includes:
- Step S55 when the detection result is that the creation fails, generate channel abnormal information.
- the received detection result is that the creation failed, it means that the blockchain network cannot create a message channel, and each network node cannot process each other's messages, then the corresponding channel exception information is generated so that the developer can use the above channel exception information Modify the message middleware in the blockchain network to improve the blockchain environment.
- the blockchain network can normally create a message channel to realize data communication between various network nodes.
- Figure 5 is a detailed schematic diagram of the steps of sending channel detection instructions to the blockchain network to be constructed in the blockchain environment detection method of this application.
- the steps of sending a channel detection instruction to detect whether the blockchain network can create a message channel and receiving the corresponding detection result include:
- Step S351 Send a channel detection instruction to the blockchain network to be constructed to select any network node to link to the Kafka service, and control the network node to create a corresponding message queue;
- Kafka is an open source stream processing platform developed by the Apache Software Foundation, written in Scala and Java.
- Kafka is a high-throughput distributed publish-subscribe messaging system that can process all action flow data in consumer-scale websites.
- Kafka message middleware is mainly composed of producers, agents and consumers. Producers publish messages, agents forward messages from producers to consumers, and consumers receive and process messages.
- the network node selected in this embodiment is equivalent to the publisher, and the created message is stored in the linked Kafka in the form of a queue, and the message queue in Kafka is tested to detect whether the blockchain can normally create a message channel.
- the above scheme is a supplementary detection method for the blockchain environment. Through the comprehensive detection of the blockchain environment, it avoids the interruption of the deployment due to the abnormal environment in the blockchain deployment process.
- Step S352 sends a detection signal to the Kafka service to detect whether the message queue created by the network node is stored in the Kafka service, and receives a corresponding detection result.
- a detection signal is sent to the Kafka service to detect whether Kafka stores the message queue sent by the network node, and receive the corresponding detection result to evaluate the blockchain message middle Whether the file is in an abnormal state.
- FIG. 6 is a structural block diagram of an embodiment of a blockchain environment detection device of this application.
- the blockchain environment detection device also proposed in the embodiment of the present application includes: a first acquisition module 601, a second acquisition module 602, and an environment detection module 603;
- the first obtaining module 601 is configured to obtain node configuration information of all network nodes in the blockchain network to be constructed;
- the second acquisition module 602 is configured to query the deployment detection standard corresponding to the node configuration information of each network node in the preset deployment mechanism table;
- the environment detection module 603 is used to determine whether all node configuration information meets their corresponding deployment detection standards
- the environment detection module 603 is also used to generate deployment normal information when all node configuration information meets their corresponding deployment detection standards;
- the environment detection module 603 is further configured to generate deployment exception information when it is detected that the configuration information of a node does not meet its corresponding deployment detection standard.
- This embodiment first obtains the node configuration information of all network nodes in the blockchain network to be constructed; then queries in the preset deployment mechanism table to obtain the deployment detection standards corresponding to the node configuration information of each network node; finally, judge Whether all node configuration information meets their corresponding deployment detection standards; when all node configuration information meets their corresponding deployment detection standards, the deployment normal information is generated; when it is detected that the node configuration information does not meet its corresponding deployment detection standards, it is generated Deployment exception information.
- the environmental deployment of the blockchain is tested to avoid redeployment of the blockchain network due to environmental abnormalities, thereby improving the deployment efficiency of the blockchain network.
- the method of the embodiment can be realized by means of software plus the necessary general hardware platform, of course, it can also be realized by Over hardware, but in many cases the former is a better implementation.
- the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product.
- the computer software product is stored in a non-volatile computer-readable storage medium (such as ROM/RAM, magnetic disk, optical The disk) includes several instructions to make a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the methods described in the various embodiments of the present application.
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910438264.8A CN110324174B (zh) | 2019-05-23 | 2019-05-23 | 区块链环境检测方法、设备、装置及存储介质 |
CN201910438264.8 | 2019-05-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020233073A1 true WO2020233073A1 (fr) | 2020-11-26 |
Family
ID=68119053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/122013 WO2020233073A1 (fr) | 2019-05-23 | 2019-11-29 | Procédé, dispositif et appareil de traitement de test d'environnement de chaîne de blocs, et support de stockage |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110324174B (fr) |
WO (1) | WO2020233073A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113904894A (zh) * | 2021-09-29 | 2022-01-07 | 智新科技股份有限公司 | Can网络数据安全监控方法、装置、设备及可读存储介质 |
CN114553917A (zh) * | 2021-12-30 | 2022-05-27 | 北京天成通链科技有限公司 | 一种基于区块链的网络智能治理方法 |
CN116893977A (zh) * | 2023-09-08 | 2023-10-17 | 中国空气动力研究与发展中心计算空气动力研究所 | 分布式仿真测试环境自动部署方法、装置、设备及介质 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110324174B (zh) * | 2019-05-23 | 2022-04-22 | 深圳壹账通智能科技有限公司 | 区块链环境检测方法、设备、装置及存储介质 |
CN110825776B (zh) * | 2019-11-07 | 2023-04-18 | 腾讯云计算(北京)有限责任公司 | 空气质量检测报告处理方法、装置及计算设备、存储介质 |
CN110855565B (zh) | 2019-11-22 | 2021-07-20 | 广州大学 | 一种基于区块链的可验证域间路由验证方法 |
CN113867735A (zh) * | 2021-09-03 | 2021-12-31 | 中国人民解放军军事科学院战争研究院 | 信息系统自动部署方法及装置 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180137465A1 (en) * | 2016-11-11 | 2018-05-17 | International Business Machines Corporation | Smart contract admission check and fault tolerance in a blockchain |
CN108416589A (zh) * | 2018-03-08 | 2018-08-17 | 深圳前海微众银行股份有限公司 | 区块链节点的连接方法、系统及计算机可读存储介质 |
CN109194506A (zh) * | 2018-08-16 | 2019-01-11 | 北京京东尚科信息技术有限公司 | 区块链网络部署方法、平台及计算机存储介质 |
CN109462508A (zh) * | 2018-11-30 | 2019-03-12 | 北京百度网讯科技有限公司 | 节点部署方法、装置和存储介质 |
CN110324174A (zh) * | 2019-05-23 | 2019-10-11 | 深圳壹账通智能科技有限公司 | 区块链环境检测方法、设备、装置及存储介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789920A (zh) * | 2016-11-25 | 2017-05-31 | 深圳前海微众银行股份有限公司 | 区块链的节点连接方法及装置 |
CN110050474A (zh) * | 2016-12-30 | 2019-07-23 | 英特尔公司 | 用于物联网网络中的复合对象的子对象的类型命名和区块链 |
CN109240900A (zh) * | 2018-08-16 | 2019-01-18 | 北京京东尚科信息技术有限公司 | 区块链网络服务平台及其智能合约检测方法、存储介质 |
CN109542767B (zh) * | 2018-10-25 | 2023-04-11 | 平安科技(深圳)有限公司 | 基于区块链的自动化测试方法、装置、计算机设备和存储介质 |
-
2019
- 2019-05-23 CN CN201910438264.8A patent/CN110324174B/zh active Active
- 2019-11-29 WO PCT/CN2019/122013 patent/WO2020233073A1/fr active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180137465A1 (en) * | 2016-11-11 | 2018-05-17 | International Business Machines Corporation | Smart contract admission check and fault tolerance in a blockchain |
CN108416589A (zh) * | 2018-03-08 | 2018-08-17 | 深圳前海微众银行股份有限公司 | 区块链节点的连接方法、系统及计算机可读存储介质 |
CN109194506A (zh) * | 2018-08-16 | 2019-01-11 | 北京京东尚科信息技术有限公司 | 区块链网络部署方法、平台及计算机存储介质 |
CN109462508A (zh) * | 2018-11-30 | 2019-03-12 | 北京百度网讯科技有限公司 | 节点部署方法、装置和存储介质 |
CN110324174A (zh) * | 2019-05-23 | 2019-10-11 | 深圳壹账通智能科技有限公司 | 区块链环境检测方法、设备、装置及存储介质 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113904894A (zh) * | 2021-09-29 | 2022-01-07 | 智新科技股份有限公司 | Can网络数据安全监控方法、装置、设备及可读存储介质 |
CN113904894B (zh) * | 2021-09-29 | 2023-05-30 | 智新科技股份有限公司 | Can网络数据安全监控方法、装置、设备及可读存储介质 |
CN114553917A (zh) * | 2021-12-30 | 2022-05-27 | 北京天成通链科技有限公司 | 一种基于区块链的网络智能治理方法 |
CN114553917B (zh) * | 2021-12-30 | 2024-01-26 | 北京天成通链科技有限公司 | 一种基于区块链的网络智能治理方法 |
CN116893977A (zh) * | 2023-09-08 | 2023-10-17 | 中国空气动力研究与发展中心计算空气动力研究所 | 分布式仿真测试环境自动部署方法、装置、设备及介质 |
CN116893977B (zh) * | 2023-09-08 | 2024-01-16 | 中国空气动力研究与发展中心计算空气动力研究所 | 分布式仿真测试环境自动部署方法、装置、设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN110324174A (zh) | 2019-10-11 |
CN110324174B (zh) | 2022-04-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020233073A1 (fr) | Procédé, dispositif et appareil de traitement de test d'environnement de chaîne de blocs, et support de stockage | |
WO2020155360A1 (fr) | Procédé de distribution de réseau pour appareil électroménager, appareil électroménager, terminal mobile et support de données | |
WO2020233077A1 (fr) | Procédé, dispositif et appareil de surveillance de service de système et support d'informations | |
WO2016137307A1 (fr) | Attestation par mandataire | |
WO2020224246A1 (fr) | Procédé et appareil de gestion de données fondée sur une chaîne de blocs, dispositif et support d'informations | |
WO2020220413A1 (fr) | Procédé et système de preuve à divulgation nulle de connaissance pour informations personnelles, et support de données | |
WO2020143297A1 (fr) | Procédé, appareil et dispositif de reprise après sinistre destinés à un centre d'appel, et support de stockage | |
WO2020147264A1 (fr) | Procédé, appareil et dispositif de surveillance de données de journal multisystème, support d'informations lisible | |
WO2020015064A1 (fr) | Procédé de traitement de défaillance de système, appareil, dispositif et support d'informations | |
WO2020258657A1 (fr) | Procédé et appareil de détection d'anomalie, dispositif informatique et support d'informations | |
WO2020186773A1 (fr) | Procédé, dispositif et appareil de surveillance de demandes d'appel, et support d'informations | |
WO2021072881A1 (fr) | Procédé, appareil et dispositif de traitement de demande fondée sur un stockage d'objet, et support de stockage | |
WO2020077832A1 (fr) | Procédé, appareil et dispositif d'accès à un bureau dans le nuage et support de stockage | |
WO2020119369A1 (fr) | Procédé, appareil et dispositif de positionnement de défaut de fonctionnement et de maintenance informatique intelligent, et support de stockage lisible | |
WO2019109957A1 (fr) | Procédé, appareil, et dispositif de fourniture de service basé sur un bus de service d'entreprise (esb), et support d'informations lisible | |
WO2021003923A1 (fr) | Procédé de surveillance de freeswitch, dispositif, support de stockage, et appareil | |
WO2015069018A1 (fr) | Système d'ouverture de session sécurisée et procédé et appareil pour celui-ci | |
WO2020042464A1 (fr) | Procédé, appareil et dispositif d'interaction de données, et support d'informations lisible | |
WO2018035929A1 (fr) | Procédé et appareil de traitement de code de vérification | |
WO2014204084A1 (fr) | Procédé de service de partage d'application et appareil appliqué à ce dernier | |
WO2015194829A2 (fr) | Procédé de détection d'un certain nombre de dispositifs sélectionnés parmi une pluralité de terminaux clients dans un réseau privé à l'aide du même ip public par un serveur web doté d'un nom de domaine non spécifié supplémentaire à partir d'un trafic de demandes d'accès à l'internet du terminal client faisant une demande d'accès à l'internet, et système de détection sélective pour un dispositif dans un état dans lequel un ip public est partagé | |
WO2015199271A1 (fr) | Procédé et système de partage de fichiers sur p2p | |
WO2020233060A1 (fr) | Procédé et appareil de notification d'événement, serveur de notification d'événement et support de stockage | |
WO2020062661A1 (fr) | Procédé, dispositif et appareil de vérification de cohérence de données de contrat et support d'enregistrement | |
WO2020224251A1 (fr) | Procédé de traitement de transactions de chaîne de blocs, dispositif, appareil et support de stockage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19929493 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19929493 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 18/03/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19929493 Country of ref document: EP Kind code of ref document: A1 |