WO2021254029A1 - 一种共识和资源传输方法、设备及存储介质 - Google Patents
一种共识和资源传输方法、设备及存储介质 Download PDFInfo
- Publication number
- WO2021254029A1 WO2021254029A1 PCT/CN2021/093096 CN2021093096W WO2021254029A1 WO 2021254029 A1 WO2021254029 A1 WO 2021254029A1 CN 2021093096 W CN2021093096 W CN 2021093096W WO 2021254029 A1 WO2021254029 A1 WO 2021254029A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- transaction
- join
- data
- visitor
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/085—Payment architectures involving remote charge determination or related payment systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0414—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Definitions
- the present invention relates to the technical field of data sharing, in particular to a consensus and resource transmission method, equipment and storage medium.
- the blockchain network system is quoted in various scenarios due to its security, resistance to tampering and other technical effects to solve technical problems such as resources, information, or data that are easily modified in various scenarios, but the consensus process is relatively time-consuming , In the actual implementation process, the speed is relatively slow, and there are few technical solutions that operate well.
- the present invention provides a consensus and resource transmission method, device and storage medium.
- resource transmission it can solve the technical problems of multiple activities in different places and data conflicts. It can also realize the transmission, sharing and distribution of value and data resources across chains, and realize the transmission and sharing of data and value resources between different platform institutions.
- a consensus method that is applicable to root chain nodes. It analyzes more than one first transaction that has passed the verification, and judges whether the first transaction includes a transaction requested by the node to join. If so, it is based on the consensus at least including the request of the node requesting to join.
- the first transaction content including the identity of the node requesting to join, network fragmentation of the node requesting to join, and assigning the node requesting to join to the first network; sending to the node requesting to join that the node requesting to join is assigned to the first network A network message; receive the response message of the node requesting to join, and determine whether the node requesting to join agrees, if so, the first transaction and the transaction including the allocation of the node requesting to join to the first network are packaged on the chain; if If no, then the first transaction and the transaction that includes the request to join the node to refuse to be assigned to the first network are packaged and uploaded; if the first transaction is not a transaction that includes the node request to join, the first transaction is packaged and uploaded .
- the communication mode of the consensus method is MQTT.
- the identity of the node requesting to join includes the physical IP address of the node requesting to join and the type of the node requesting to join.
- the timestamp of the National Time Service Center of the Chinese Academy of Sciences is added when the transaction is packaged and uploaded.
- the principle of network slicing the nodes requesting to join and allocating the nodes requesting to join to the first network is: the consensus method required by the nodes requesting to join is consistent with the consensus method of the first network, and Meet the networking principles of the first network.
- a method for resource transmission A node in the first network identifies and verifies the identity of the visitor. If the identity of the visitor is verified, the API interface of the first network or the second network is opened for the visitor; the request type of the visitor is judged, if For a resource data upload request, the resource data is hashed to obtain the resource data hash value, the resource data hash value is uploaded to the chain, and the resource data is stored to cloud computing or through the API interface of the first network or the second network In the fog computing storage space; if it is a resource data acquisition request, the resource data is obtained from the cloud computing or fog computing storage space through the API interface of the first network or the second network, and the hash value of the data resource is compared with Whether the hash value of the data resource data after the chain is consistent, if consistent, the resource data will be sent to the accessing party.
- the time stamp of the National Time Service Center of the Chinese Academy of Sciences is added.
- the verification uses a user verification token method for the data interface of the B/S architecture; and uses a verification interface method for the data interface of the C/S architecture.
- the verification interface mode is the process of identifying and verifying the identity of the visitor, which includes: the visitor performs a hash operation on the encryption key to be verified to obtain the hash value of the encryption key to be verified, and the first network Or compare the hash values of the encrypted keys on the chain in the second network. If they are consistent, the accessing party uses the encryption key to decrypt the ciphertext of the accessing party’s identity information and decrypt the plaintext of the accessing party’s identity information through the AES256 algorithm.
- the identity verification of the visitor passes; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key on the chain in the first network or the second network, the identity verification of the visitor fails; accordingly,
- the process of encrypting the identity of the visitor is: obtaining the ciphertext of the identity information of the visitor according to the AES256 algorithm from the plaintext of the identity information of the visitor through the encryption key; and obtaining the hash value of the encryption key after hashing the encryption key, The ciphertext of the hash value of the encryption key and the identity information of the visitor is uploaded on the first network or the second network.
- the nodes of the first network or the second network include fog computing nodes, cloud computing center nodes, and edge computing nodes.
- the verification interface mode is used for interface verification when the first network and the second network transmit data.
- the present invention provides a device that includes: one or more processors; a memory for storing one or more programs, when the one or more programs are used by the one or more processors When executed, the one or more processors are caused to execute the method as described above.
- the present invention provides a storage medium storing a computer program, which, when executed by a processor, implements the method described in any one of the above.
- Distributed cloud computing based on blockchain can adopt the consensus mechanism of blockchain, that is, through off-chain behaviors, such as real-time provision of data sets, transmission of files, execution of calculations, provision of professional services and other activities to trigger token transactions between participants . It provides a trusted platform for value or data resource sharing transactions for all computing resource-related suppliers (computing service providers, data providers, application program providers). Incorporating a unique consensus protocol to ensure the credibility of the platform and the security of the data on the platform, and support applications in multiple fields from high-performance computing to the Internet of Things.
- Figure 1 is a schematic diagram of a device structure of the present invention
- Figure 2 is a schematic flow diagram of a consensus method
- Figure 3 is a schematic flow diagram of a resource transmission method.
- a consensus method applicable to the root chain, as shown in Figure 2: S101, analyze and verify more than one first transaction that passed the verification; S102, determine whether the first transaction is a transaction that includes a node request to join, if so, then S103 , According to the first transaction content including at least the consensus method required by the node requesting to join, and the identity of the node requesting to join, network sharding the node requesting to join, and assigning the node requesting to join to the first network; S104.
- the node requesting to join sends a message for assigning the node requesting to join to the first network; S105, receiving the response message of the node requesting to join; S106, determining whether the node requesting to join agrees, if so, then S1061, the first transaction, and It includes packaging and uploading the transaction of the node requesting to join to the first network; if not, S1062, the first transaction, and including the packaging and uploading of the transaction that the node requesting to join refuses to be assigned to the first network; if The first transaction is not a transaction that includes the node request to join, then S107, the first transaction is packaged on the chain.
- An optional implementation is that when the first transaction and the block containing the first transaction are constructed, the timestamp of the National Time Service Center of the Chinese Academy of Sciences is used; combined with the construction of the first transaction and the block containing the first transaction. Hash operation to ensure the uniqueness of the first transaction and the block containing the first transaction to prevent data conflicts in subsequent queries, access and acquisition of data and value resources; improve resource transmission for multiple activities in different places Speed, reduce time delay. After the first transaction is verified, the hash value of the first transaction is packaged into a block on the chain, and the first transaction is stored in the cloud computing or fog computing space corresponding to the root chain.
- each sharded network is forwarded by various smart contracts deployed on the root chain, which realizes flexible traffic load and seamless switching between nodes, and realizes intelligent traffic management and distribution within cluster nodes.
- a two-tier logic is adopted-not only to select the node network interface with the best experience for users, but also to load balance Internet traffic to multiple nodes at the same time.
- the customer traffic can be immediately directed to the sub-optimal node network interface.
- the transmission of virtual value, data, and control commands between network nodes is carried out through dynamic routing.
- this architecture allows the use of "hops" to form new routes. Deliver the message to the transmission destination.
- Use smart contracts to distribute and manage intelligent traffic to the application system, while providing seamless communication between flexible application deployment and different networks.
- the root chain forms a two-layer blockchain network system with multiple shard networks.
- the root chain is responsible for the formation of the shard network, the joining and exiting of shard network nodes, the distribution and management of shard network nodes, from the source
- the upper control of the two-layer blockchain system to maintain the excellent characteristics of the blockchain network, such as decentralization, non-tampering, etc., to provide each independent node with a fair and equitable opportunity to participate in consensus, and it will not happen Such as the flaws in the POC consensus method.
- the consensus algorithm of the fragmented network is not limited, and can be any of the existing consensus algorithms to meet the application requirements of different operators for different application scenarios, and is flexible.
- the node requesting to join agrees to join the first network, it further includes: the node agreeing to request to join is configured with an API interface for receiving and sending the first network message that requires identity verification.
- the API interface By setting the API interface, adding identity verification, preventing secondary logins, solving risk problems such as network attacks, and combining with the hash calculation of the root chain node and DTS time stamp to ensure multiple activities in different places and prevent data conflicts.
- the root chain is composed of several virtual unit networks located on several hardware devices.
- the root chain is a point-to-point distributed computing network that can build smart contracts and transmit virtual currency resources with commercial value and data resources.
- Network sharding divides the entire blockchain network into multiple sub-networks, and each sub-network is a shard. In each sub-network of the entire blockchain network, different transactions in the network are processed in parallel.
- the root chain is a blockchain network constructed by several virtual unit networks. There are several smart contracts on the root chain, and the smart contracts can be used for setting Node joining rules and networking principles of the fragmented network.
- the root chain forms several fragmented networks, such as the first network, the second network, and the third network, by dividing the nodes that request to join.
- Different sharding networks have different consensus methods and different node access conditions.
- the identity of the node requesting to join includes the physical IP address of the node requesting to join and the type of the node requesting to join.
- the principle of network slicing the nodes requesting to join and allocating the nodes requesting to join to the first network is: the consensus method required by the nodes requesting to join is consistent with the consensus method of the first network, and meets the requirements of the first network Principles of networking.
- the root chain node Through the physical IP address and the type of the node requesting to join, the root chain node performs network fragmentation on the requesting node, plus the double constraints of the networking principle to maintain the excellent characteristics of the blockchain and avoid local centralization. Ensure that the node rights are fair and just.
- the communication mode of the consensus method is MQTT.
- MQTT On the basis of network fragmentation, each fragmented network uses MQTT to communicate in real time.
- the consensus method described above makes all network fragments protected by the root chain, making the security of each fragmented network in the entire system very high. , Even the newly added fragmented network will be protected by the root chain immediately.
- the way of protection is: for the data interface of the B/S architecture, the user token authentication method is adopted, for the data interface of the C/S architecture, the authentication interface method is adopted, and the double encryption of the AES256 algorithm and the hash algorithm is adopted to prevent malicious communication attacks.
- the above-mentioned consensus method completely change the risk of MQTT without a security mechanism.
- MQTT lies in its public subscription message queue mechanism and many-to-many broadcast capabilities. Through the support of long-term TCP connection pointing to the MQTT proxy, it is simple and easy to send and receive messages with limited bandwidth by MQTT. It has the following main characteristics:
- An alternative implementation is a consensus method running on any node of a fragmented network such as the first network, the second network, or the third network, including: accepting and verifying the second transaction, and verifying the second transaction after passing the verification. It is packaged and chained according to the established consensus algorithm of the established sharding network; when the second transaction and the block containing the second transaction are constructed, the timestamp of the National Time Service Center of the Chinese Academy of Sciences is used; combined to construct the second transaction and include the second transaction.
- the hash operation used in the transaction block to ensure the uniqueness of the second transaction and the block containing the second transaction to prevent data conflicts in subsequent queries, access, and acquisition of data and value resources ; Improve the resource transmission speed of multiple activities in different places and reduce the delay.
- the second transaction may be an asset transaction containing virtual value resources for value transmission, or a non-asset transaction in aspects of data storage, reading, and access.
- a consensus method corresponding to the root chain is built on the networking virtual machine of the root chain in the form of smart contracts, and the consensus algorithm corresponding to the above-mentioned fragmented network is built on each fragmented network in the form of smart contracts or node configuration applications. , While using the advantages of MQTT, it can overcome the security risks of MQTT.
- a resource transmission method is suitable for any node in the first network, the second network, the third network and other fragmented networks.
- S201. Identify and verify the identity of the visitor. If the identity of the visitor is verified, Open the API interface of the first network or the second network for the visitor;
- the resource data hash value uploading on the chain includes, but is not limited to: constructing a third transaction including a resource data upload request and a resource data hash value, and the third transaction is packaged after being verified on the corresponding sharding network
- the block, the third transaction, and the block containing the third transaction are constructed using the timestamp of the National Time Service Center of the Chinese Academy of Sciences, combined with the hash value of the third transaction and the hash value of the block containing the third transaction to ensure the on-chain transaction Uniqueness, using a decentralized consensus method to ensure that data cannot be tampered with on the chain, verify data access stored in cloud computing or fog computing storage space through hash value comparison, or obtain uniqueness to prevent data conflicts.
- the time stamp of the National Time Service Center of the Chinese Academy of Sciences is added. To ensure the uniqueness of resource data and prevent data conflicts.
- a user verification token mode is adopted; for the data interface of the C/S architecture, a verification interface mode is adopted.
- the verification interface mode is the process of identifying and verifying the identity of the visitor, including: the visitor performs a hash operation on the encryption key to be verified to obtain the hash value of the encryption key to be verified, which is compared with the first network or the second network The encryption key hash value of the upper chain is compared.
- the visitor uses the encryption key to decrypt the ciphertext of the visitor's identity information, decrypt the plaintext of the visitor's identity information through the AES256 algorithm, and verify the identity of the visitor Pass; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key on the chain in the first network or the second network, the identity verification of the visitor fails; accordingly, the visitor
- the process of identity encryption is: the plaintext of the identity information of the visitor is obtained by the AES256 algorithm through the encryption key to obtain the ciphertext of the identity information of the visitor; the encryption key is hashed to obtain the hash value of the encryption key, and the encryption key is The ciphertext of the hash value and the identity information of the visitor is uploaded on the first network or the second network.
- the nodes of the first network or the second network include fog computing nodes, cloud computing center nodes, and edge computing nodes.
- the verification interface mode is used for interface verification when the first network and the second network transmit data.
- the two-layer architecture of the blockchain network can be easily realized, and at the same time, it can meet the layout requirements of multiple operation scenarios; data resource sharing, value resource transmission, and dual transmission of data and value, the difference between different sharding networks
- the two-layer network architecture solves information islands and resource islands; at the same time, it ensures the authenticity and reliability of shared resources and cannot be tampered with.
- the time stamp of the National Time Service Center of the Chinese Academy of Sciences is added to prevent data conflicts.
- the process of encrypting the identity of the visitor is to sequentially perform the hash operation and the AES256 algorithm operation on the identity of the visitor, and upload the chain in the first network or the second network; accordingly, the method for automatically identifying and verifying the identity of the visitor To verify the token method for the visitor, or to verify the interface method.
- B/S and C/S require different authentication methods to prevent repeated logins, network attacks, and data conflicts.
- the nodes of the first network or the second network include cloud computing center nodes and edge computing nodes. Expand the network scale, realize the differentiated layout of node types, expand storage space, and give full play to the advantages of each node.
- the distributed point-to-point network composed of fog computing nodes, cloud computing center nodes, and edge computing nodes, as well as cloud computing or fog computing data storage space, multiple activities in different places are realized, data transmission speed is fast, and there is no data conflict.
- the time stamp of the National Time Service Center of the Chinese Academy of Sciences is added when the consensus is packaged on the chain.
- the asymmetric hash calculation and the authoritative time stamp of the National Time Service Center of the Chinese Academy of Sciences are used to solve the problem of data conflicts.
- the above-mentioned verification method When data communication is transmitted between different sharded networks, the above-mentioned verification method is used, and the visitor also uses the above-mentioned verification method when the transaction data is uploaded to the chain to ensure network security and data security, which greatly reduces Downtime caused by malicious access attacks.
- this embodiment proposes a resource transmission method suitable for the root chain, including: when the resources are data resources, they are all stored in the cloud computing or fog computing storage space accessible and obtained by the root chain; After the chain receives the resource acquisition request sent by the node on the shard network, it acquires the corresponding resource from the cloud computing or fog computing storage space, and transmits it to the client that needs to acquire the resource on the corresponding node on the corresponding shard network.
- the value transfer is carried out through the root chain. This involves account interaction and virtual value transfer of different sharded networks. If the sharding network X and Y, user A’s account on the sharding network needs to transfer money to the user B’s account on the sharding network Y, in order to maintain the atomicity of the transaction and prevent double spending, the root chain Smart contract C is used to manage the transfer process of this cross-shard operation.
- the processing methods include:
- Verifying the transaction includes verifying whether the format of the transaction is legal, and verifying whether the balance on the account A1 corresponding to user A in the
- the hash value H-Y1 of the transfer transaction on the shard network Y is fed back to the smart contract C, and the smart contract C will hash the transfer transaction on the shard network Y Value H-Y1, feedback to user A on shard network X, according to the actual transfer amount on shard network Y, user A on shard network X transfers to smart contract C corresponding to the actual transfer amount,
- add the hash value H-Y1 of the transfer transaction on shard network Y to the format content of the transaction, and the constructed one is recorded as transaction X1.
- the smart contract C on the root chain can charge a fee during the above-mentioned cross-shard transfer process to support the sustainable and stable development of the root chain.
- the cross-shard value transfer described above belongs to the value transfer process between different shard networks.
- the value transfer of the same shard network is similar to the transaction method commonly used in the prior art, and is based on the consensus set by different shard networks.
- the corresponding transaction content and format can be flexibly adapted to change to meet the value transfer process of each shard network.
- the two-layer blockchain network architecture model of the root chain and multiple shard networks proposed in the technical solution of this embodiment can exchange or transfer or redistribute the above-mentioned value resources and data resources, etc., and be promoted in different business scenarios When applied, it can be flexibly changed as needed; for example, when different users in the segmented network E and F interact, it can be accompanied by the acquisition of resources, and/or the transfer and exchange of value. It can be flexibly adapted to different types of business scenarios, can be flexibly switched according to different business scenarios, and compatible with multiple parties.
- gateway separation technology clients in enterprise parks or branch offices access various data center nodes (including fog computing nodes, cloud computing Central node or edge computing node), which allocates computing, communication, control, storage resources and services to users or distributes them on devices and systems close to users, extending cloud computing to network edge nodes.
- fog computing nodes including fog computing nodes, cloud computing Central node or edge computing node
- cloud computing Central node or edge computing node which allocates computing, communication, control, storage resources and services to users or distributes them on devices and systems close to users, extending cloud computing to network edge nodes.
- the small cloud located at the edge of the network, that is, the local small cloud, fog computing. It has limited processing power and storage equipment, and provides a method of screening information flows from IoT components, with the following characteristics:
- Fog computing is not as decentralized as edge computing, but it further reduces the amount of data transmitted to the cloud computing layer through the network or up, and it helps the communication and collaboration between "nodes" in the edge layer.
- the fog computing layer can be used to "check and balance" materials, equipment, and supply levels in multiple locations, and automatically trigger the creation, sending, and receiving of orders.
- Fog computing can help reduce bandwidth usage, even slow down the need for expensive upgrades, and help companies keep their IT infrastructure running smoothly.
- Cross-center storage network interoperability storage space network interoperability between different cloud computing or fog computing centers, or interoperability between different types of nodes
- Cross-center storage network interoperability storage space network interoperability between different cloud computing or fog computing centers, or interoperability between different types of nodes
- Layer 2 network interconnection After the virtual machine is dynamically migrated, the IP address remains unchanged, so a cross-center Layer 2 network should be constructed at the virtual machine network access layer. It can be realized by EVI, VPLS, DWDM/Dark Fiber and other technologies.
- Three-tier network interconnection Networking nodes or visiting parties such as clients in enterprise parks or branches visit each data center through a three-layer network.
- Networking nodes or visiting parties such as clients in enterprise parks or branches visit each data center through a three-layer network.
- the traditional three-layer network deployment solution is unified across centers Deploy VRRP to realize unilateral gateway egress.
- GSLB acts as a DNS server, and resolves to the client to different service IP addresses according to the physical location of the virtual machine (the virtual machine corresponding to the root chain node). How to notify GSLB of the physical location of the virtual machine and modify the technical issues of DNS records.
- RHI Radio Health Injection
- This feature is usually implemented by SLB equipment. The SLB equipment periodically checks the survival status of the server/virtual machine. When the check result is normal, the SLB sends to the backbone network.
- the Ingress traffic path from the client to the center A or B can be dynamically adjusted to ensure the health status of the virtual machine corresponding to the root chain node.
- Gateway separation technology in the egress direction (virtual machine to client where the visitor is located).
- the same VRRP configuration must be deployed on the aggregation switches on both sides of the distributed data center (the aggregation devices in a center A and B have the same VRRP VIP configuration), and VRRP must be guaranteed The inter-center Layer 2 intercommunication of the VLAN where it is located. If the aggregation device has adopted the VLAN extension based on H3C EVI technology, it supports the localized deployment of VRRP by default. If the technical features similar to EVI are not deployed, the user can also configure the corresponding command line to implement the localized deployment of VRRP.
- the root chain and any fragmented network can be any blockchain, such as a public chain, a consortium chain, or a private chain.
- cross-chain intercommunication and interconnection can be realized, and the problem of traffic islands can be solved.
- Under the premise of fully maintaining the protogenesis chain technology architecture, storage architecture, and governance organization, and without "chemical interaction" that is, between the root chain and any shard network, and between each shard network, the structure of self-governance and operation Under the premise of self-maintenance), provide circulation interaction and interconnection services for protogenesis chains.
- the technical solution of this embodiment can be promoted and used in value transfer in the financial field.
- a self-organizing cross-chain data transfer system between multiple financial entities can organize and control the root chain through an authoritative financial system center, and strictly control each
- the networking principles when financial entities form a fragmented network, and the network access conditions of the nodes of the fragmented network formed by financial entities ensure network security and data security. It can also be promoted and used on various resource learning and sharing platforms, breaking the barriers of data islands between platforms, and realizing diversified interaction.
- This embodiment provides a device that includes: one or more processors; a memory, used to store one or more programs, when the one or more programs are executed by the one or more processors At this time, the one or more processors are caused to execute the method as described above.
- this embodiment provides a storage medium storing a computer program, which, when executed by a processor, implements the method described in Embodiment 1 above.
- Fig. 1 is a schematic structural diagram of a device provided by an embodiment of the present invention.
- the present application also provides a device 500, including one or more central processing units (CPU) 501, which can be based on a program stored in a read-only memory (ROM) 502 or The program loaded from the storage section 508 into the random access memory (RAM) 503 executes various appropriate actions and processing. In the RAM 503, various programs and data required for the operation of the device 500 are also stored.
- the CPU501, ROM502, and RAM503 are connected to each other through a bus 504.
- An input/output (I/O) interface 505 is also connected to the bus 504.
- the following components are connected to the I/O interface 505: an input part 506 including a keyboard, a mouse, etc.; an output part 507 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker, etc.; a storage part 508 including a hard disk, etc. ; And a communication section 509 including a network interface card such as a LAN card, a modem, and the like. The communication section 509 performs communication processing via a network such as the Internet.
- the driver 510 is also connected to the I/O interface 505 as needed.
- a removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is installed on the drive 510 as needed, so that the computer program read from it is installed into the storage portion 508 as needed.
- the method described in any of the above embodiments may be implemented as a computer software program.
- the embodiments disclosed in the present application include a computer program product, which includes a computer program tangibly contained on a machine-readable medium, and the computer program includes program code for executing the method described in any of the foregoing embodiments.
- the computer program may be downloaded and installed from the network through the communication part 509, and/or installed from the removable medium 511.
- the present application also provides a computer-readable storage medium.
- the computer-readable storage medium may be the computer-readable storage medium included in the device of the above-mentioned embodiment;
- the computer-readable storage medium stores one or more programs, and the programs are used by one or more processors to execute the methods described in the present application.
- each block in the flowchart or block diagram can represent a module, program segment, or part of code, and the module, program segment, or part of code contains one or more for realizing the specified logic function.
- Executable instructions can also occur in a different order from the order marked in the drawings. For example, two blocks shown one after another can actually be executed substantially in parallel, and they can sometimes be executed in the reverse order, depending on the functions involved.
- each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or operations Or it can be realized by a combination of dedicated hardware and computer instructions.
- the units or modules involved in the embodiments described in this application can be implemented in software or hardware.
- the described units or modules may also be arranged in the processor.
- each of the described units may be a software program arranged in a computer or a mobile smart device, or may be a separately configured hardware device.
- the names of these units or modules do not constitute a limitation on the units or modules themselves under certain circumstances.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
一种共识和资源传输方法、设备及存储介质,属于数据共享技术领域,包括:解析验证通过的一笔以上的第一交易(S101),判断第一交易是否为包含有节点请求加入的交易(S102),若是,则根据至少包括请求加入的节点要求的共识方法、请求加入的节点身份在内的第一交易内容,对请求加入的节点进行网络分片,将请求加入的节点分配至第一网络(S103),接收请求加入的节点的响应消息(S105),判断请求加入的节点是否同意(S106),若是,则将第一交易,及包含有将请求加入的节点分配至第一网络的交易打包上链(S1061);若否,则将第一交易,及包含有将请求加入的节点拒绝分配至第一网络的交易打包上链(S1062);若第一交易不为包含有节点请求加入的交易,则将第一交易打包上链(S107)。资源传输时可以解决异地多活,数据冲突的技术问题。
Description
本发明涉及数据共享技术领域,尤其涉及一种共识和资源传输方法、设备及存储介质。
为推动社会进步,提高人们的知识水平,国家设立高等教育机构,开放各类网络教学平台,大力扶持各种教育教学机构,鼓励专业技术网站等类型的资源提供方发展,以拓展人们的知识面,提高人们的技能。不同教育平台及教育机构的资源各有特色,且互相独立经营维护,互不共享,对于资源或知识获取方而言,多有不便。此外,不同类型的资源提供方的资料库数据庞杂,多采用中心化系统管理,硬件化存储;较难应对各类复杂的网络攻击,受限于中心化系统的缺陷,且存在资源数据易丢失,易被篡改;而硬件化存储方式,存在成本高,读取速度受限,较难满足资源获取方的需求等问题。除此之外,现有的通信服务领域也存在类似问题,几大运营商之间互相独立,三网融合一直是目前国内通信领域的难点,硬件基础设施改造成本高,软件网络系统实现困难等。
区块链网络系统因其安全性、不易篡改等技术效果被在各类场景下引用,以解决各类场景下资源、信息或数据等易被修改的技术问题,但因其共识过程较为耗时,在实际实施过程中,速度较慢,良好运行的技术方案少之又少。
发明内容
1.发明要解决的技术问题
为了克服上述技术问题,本发明提供了一种共识和资源传输方法、设备及存储介质。资源传输时可以解决异地多活,数据冲突的技术问题,还可以跨链实现价值和数据资源传输、共享和分发,实现不同的平台机构之间的数据和价值资源传输、共享。
2.技术方案
为解决上述问题,本发明提供的技术方案为:
一种共识方法,适用于根链节点,解析验证通过的一笔以上的第一交易,判断第一交易是否为包含有节点请求加入的交易,若是,则根据至少包括请求加入的节点要求的共识方法、请求加入的节点身份在内的第一交易内容,对请求加入的节点进行网络分片,将请求加入的节点分配至第一网络;向请求加入的节点发送将请求加入的节点分配至第一网络的消息;接收请求加入的节点的响应消息,判断请求加入的节点是否同意,若是,则将第一交易,及包含有将请求加入的节点分配至第一网络的交易打包上链;若否,则将第一交易,及包含有将请求加入的节点拒绝分配至第一网络的交易打包上链;若第一交易不为包含有节点请求加入 的交易,则将第一交易打包上链。
可选的,所述共识方法的通信方式为MQTT。
可选的,所述请求加入的节点身份包括请求加入的节点的物理IP地址和请求加入的节点的类型。
可选的,所述交易打包上链时,加入中科院国家授时中心的时间戳。
可选的,所述对请求加入的节点进行网络分片,将请求加入的节点分配至第一网络的原则为:所述请求加入的节点要求的共识方法与第一网络的共识方法一致,且满足第一网络的组网原则。
一种资源传输方法,第一网络中的节点,识别验证访问方身份,若访问方身份验证通过,则为访问方开放第一网络或第二网络的API接口;判断访问方的请求类型,若为资源数据上传请求,则对资源数据进行哈希运算得到资源数据哈希值,将资源数据哈希值上链,并将资源数据通过第一网络或第二网络的API接口存储至云计算或雾计算存储空间中;若为资源数据获取请求,则通过第一网络或第二网络的API接口从云计算或雾计算存储空间中获取资源数据,通过哈希运算比对数据资源哈希值与上链后的数据资源数据哈希值是否一致,若一致则将资源数据发送给访问方。
可选的,所述将资源数据通过API接口存储至云计算或雾计算存储空间中时,加入中科院国家授时中心的时间戳。
可选的,所述验证,对于B/S架构的数据接口,采用用户验证令牌方式;对于C/S架构的数据接口,采用验证接口方式。
可选的,所述验证接口方式为所述识别验证访问方身份的过程,包括:访问方对待验证的加密密钥进行哈希运算,得到待验证的加密密钥哈希值,与第一网络或第二网络中上链的加密密钥哈希值比对,若一致,则访问方通过所述加密密钥对访问方身份信息的密文,通过AES256算法解密得到访问方身份信息的明文,访问方身份验证通过;若待验证的加密密钥哈希值,与第一网络或第二网络中上链的加密密钥哈希值比对不一致,则访问方身份验证不通过;相应地,所述访问方身份加密的过程为:通过加密密钥将访问方身份信息的明文根据AES256算法得到访问方身份信息的密文;对加密密钥进行哈希运算后得到加密密钥哈希值,将加密密钥哈希值及访问方身份信息的密文在第一网络或第二网络中上链。
可选的,所述第一网络或第二网络的节点包括雾计算节点、云计算中心节点和边缘计算节点。
可选的,所述验证接口方式用于所述第一网络与第二网络传输数据时接口验证使用。
此外,本发明提供了一种设备,所述设备包括:一个或多个处理器;存储器,用于存储 一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如以上所述的方法。
相应地,本发明提供了一种存储有计算机程序的存储介质,该程序被处理器执行时实现如以上任一项所述的方法。
采用本发明提供的技术方案,与现有技术相比,具有如下有益效果:
基于区块链的分布式云计算可采用区块链的共识机制,即通过链外行为,如实时提供数据集、传输文件、执行计算、提供专业服务等活动引发参与者之间的代币交易。为所有计算资源相关的供应商(计算服务商、数据供应商、应用程序供应商)提供了一个价值或数据资源共享交易的可信平台。融入独有的共识协议确保平台的可信度和平台上数据的安全性,支持从高性能计算到物联网在内的多个领域的应用程序。
图1为本发明的一种设备结构示意图;
图2为一种共识方法流程示意图;
图3为一种资源传输方法流程示意图。
为进一步了解本发明的内容,结合附图及实施例对本发明作详细描述。
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释相关发明,而非对该发明的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与发明相关的部分。本发明中所述的第一、第二等词语,是为了描述本发明的技术方案方便而设置,并没有特定的限定作用,均为泛指,对本发明的技术方案不构成限定作用。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。
实施例1
一种共识方法,适用于根链,如图2所示:S101、解析验证通过的一笔以上的第一交易;S102、判断第一交易是否为包含有节点请求加入的交易,若是,则S103、根据至少包括请求加入的节点要求的共识方法、请求加入的节点身份在内的第一交易内容,对请求加入的节点进行网络分片,将请求加入的节点分配至第一网络;S104、向请求加入的节点发送将请求加入的节点分配至第一网络的消息;S105、接收请求加入的节点的响应消息;S106、判断请求加入的节点是否同意,若是,则S1061、将第一交易,及包含有将请求加入的节点分配至第一网络的交易打包上链;若否,则S1062、将第一交易,及包含有将请求加入的节点拒绝分 配至第一网络的交易打包上链;若第一交易不为包含有节点请求加入的交易,则S107、将第一交易打包上链。
可选的实施方式是,第一交易、及包含第一交易的区块构建时,均采用中科院国家授时中心的时间戳;结合构建第一交易、及包含第一交易的区块中运用到的哈希运算,以确保第一交易、及包含第一交易的区块的唯一性,以防止出现在后续查询、访问及获取数据和价值资源时存在的数据冲突现象;提高异地多活的资源传输速度,降低时延。第一交易验证通过后,第一交易哈希值打包成区块上链,第一交易存储在与根链对应的云计算或雾计算的空间中。
各分片网络之间的通信由部署在根链上的各类智能合约转发,在节点之间实现灵活的流量负载与无缝切换,在集群节点内部实现智能的流量管理与分配。基于根链优先的原则,采用双层逻辑——不仅为用户选择体验最佳的节点网络接口,也同时对互联网流量进行负载均衡至多个节点。当某个节点网络接口故障时候,可以立即将客户流量引导至次优的节点网络接口。在网络节点间透过动态路由的方式进行虚拟价值、资料与控制指令等的传送,当网络拓扑中有某节点失效或无法服务时,这种架构允许使用“跳跃”的方式形成新的路由后将讯息送达传输目的地。利用智能合约对应用系统进行智能流量分配与管理,同时提供灵活应用部署与不同网络间的无缝通信。
通过根链,与多个分片网络共同组成两层的区块链网络系统,根链负责分片网络的组建,分片网络节点的加入和退出,分片网络节点的分配和管理,从源头上把控该两层区块链系统,以使其保持区块链网络的优良特性,比如去中心化,不可篡改等,为每一个独立的节点提供公平公正参与共识的机会,而不会发生如POC共识方法中的缺陷。分片网络的共识算法不受限制,可以是现有的共识算法中的任意一种,以满足不同运营商对不同应用场景的应用需求,灵活多变。
请求加入的节点若同意加入第一网络,还包括:同意请求加入的节点配置需身份验证的用于接收和发送第一网络消息的API接口。通过设定API接口,加入身份验证,防止二次登录,解决网络攻击等风险问题,同时与根链节点的哈希运算、DTS授时时间戳相结合,确保异地多活,防止数据冲突。
根链由位于若干硬件设备上的若干虚拟机组网构成,根链为一个点对点的分布式计算网络,可以构建智能合约,可以传输载有商业价值的虚拟货币资源,以及数据资源。
网络分片是将整个区块链网络分为多个子网络,每个子网络就是一个分片。在整个区块链网络的每个子网络中并行处理网络中不同交易,根链是由若干虚拟机组网构建形成的区块链网路,根链上设有若干智能合约,智能合约可用于设定分片网络的节点加入规则,组网原 则,在本实施例中,根链通过对请求加入的节点的划分,分别形成了若干分片网络,如第一网络、第二网络、第三网络等,不同的分片网络之间的共识方法不同,节点准入条件不同。
所述请求加入的节点身份包括请求加入的节点的物理IP地址和请求加入的节点的类型。所述对请求加入的节点进行网络分片,将请求加入的节点分配至第一网络的原则为:所述请求加入的节点要求的共识方法与第一网络的共识方法一致,且满足第一网络的组网原则。
通过物理IP地址和请求加入的节点的类型,根链节点对请求加入节点进行网络分片,加之组网原则的双重约束,以维持区块链的优良特性,免于局部中心化的情况发生,确保节点权利大小公平公正。
作为本实施例可选的实施方式是,所述共识方法的通信方式为MQTT。在网络分片的基础上每个分片网络单独用MQTT实时通信,以上所述的共识方法使所有网络分片都受到根链的保护,使得整个系统中每个分片网络安全性都很高,即使新加入的分片网络也会立即受到根链的保护。保护的方式为,对于B/S架构的数据接口,采用用户令牌验证方式,对于C/S架构的数据接口,采用验证接口方式,通过AES256算法和哈希算法双重加密,防止恶意的通信攻击等风险,保证通信传输安全;此外,结合以上所述共识方式,彻底改变MQTT没有安全机制的风险。
MQTT的最大优势在于其公共订阅消息队列机制以及多对多广播能力。通过指向MQTT代理端的长效TCP连接的支持,以使MQTT以有限带宽进行消息收发变得简单而轻松。具有以下主要的几项特性:
①使用发布/订阅消息模式,提供一对多的消息发布和应用程序之间的解耦;
②消息传输不需要知道负载内容;
③使用TCP/IP提供网络连接;
④有三种消息发布的服务质量。
可选的实施方式是,运行在分片网络如第一网络、第二网络或第三网络的任一节点上的共识方法,包括:接受第二交易并验证,将验证通过后的第二交易按照既定分片网络既定的共识算法进行打包并上链;第二交易、及包含第二交易的区块构建时,均采用中科院国家授时中心的时间戳;结合构建第二交易、及包含第二交易的区块中运用到的哈希运算,以确保第二交易、及包含第二交易的区块的唯一性,以防止出现在后续查询、访问及获取数据和价值资源时存在的数据冲突现象;提高异地多活的资源传输速度,降低时延。其中,第二交易可以是价值传输的包含有虚拟价值资源的资产交易,也可以是数据存储、读取、访问等方面的非资产交易。
根链与若干第一网络、第二网络、第三网络等分片网络间,以及各分片网络,如第一网 络、第二网络、第三网络等,均采用MQTT的通信方式,将上述根链上对应的一种共识方法以智能合约的方式构建在根链的组网虚拟机上,上述分片网络对应的共识算法以智能合约,或节点配置应用的方式构建在各分片网络上,利用MQTT优点的同时,可克服MQTT的安全隐患,通过在根链及各分片网络的共识方法、接口验证、以及中科院国家授时中心的时间戳和哈希运算结果的唯一性,确保构建的根链、分片网络的双层区块链网络系统的安全。在提高传输速度的同时,可抵抗各类网络攻击,确保网络安全、数据安全。
一种资源传输方法,如图3所示,适用于第一网络、第二网络、第三网络等分片网络中的任一节点,S201、识别验证访问方身份,若访问方身份验证通过,则为访问方开放第一网络或第二网络的API接口;S202、判断访问方的请求类型,是否为资源数据上传请求,若是,则S203、对资源数据进行哈希运算得到资源数据哈希值,将资源数据哈希值上链,并将资源数据通过第一网络或第二网络的API接口存储至云计算或雾计算存储空间中;若为资源数据获取请求,则S204、通过第一网络或第二网络的API接口从云计算或雾计算存储空间中获取资源数据,S205、通过哈希运算比对数据资源哈希值与上链后的数据资源数据哈希值是否一致,若一致则将资源数据发送给访问方。
所述资源数据哈希值上链包括但不限于:构建包含有资源数据上传的请求,及资源数据哈希值的第三交易,第三交易在对应的分片网络上验证通过后被打包进区块,第三交易及包含第三交易的区块构建时均采用中科院国家授时中心的时间戳,结合第三交易哈希值及包含第三交易的区块哈希值,确保上链交易的唯一性,利用去中心化的共识方法,确保数据上链不可篡改,通过哈希值比对验证存储在云计算或雾计算存储空间的数据访问,或获取唯一性,防止数据冲突。
所述将资源数据通过API接口存储至云计算存储空间中时,加入中科院国家授时中心的时间戳。以确保资源数据唯一性,防止数据冲突。
所述验证,对于B/S架构的数据接口,采用用户验证令牌方式;对于C/S架构的数据接口,采用验证接口方式。
所述验证接口方式为所述识别验证访问方身份的过程,包括:访问方对待验证的加密密钥进行哈希运算,得到待验证的加密密钥哈希值,与第一网络或第二网络中上链的加密密钥哈希值比对,若一致,则访问方通过所述加密密钥对访问方身份信息的密文,通过AES256算法解密得到访问方身份信息的明文,访问方身份验证通过;若待验证的加密密钥哈希值,与第一网络或第二网络中上链的加密密钥哈希值比对不一致,则访问方身份验证不通过;相应地,所述访问方身份加密的过程为:通过加密密钥将访问方身份信息的明文根据AES256算法得到访问方身份信息的密文;对加密密钥进行哈希运算后得到加密密钥哈希值,将加密 密钥哈希值及访问方身份信息的密文在第一网络或第二网络中上链。
所述第一网络或第二网络的节点包括雾计算节点、云计算中心节点和边缘计算节点。所述验证接口方式用于所述第一网络与第二网络传输数据时接口验证使用。
通过双层架构的区块链网络,可轻松实现跨链,同时可满足多种运作场景的布局需求;数据资源共享,价值资源传递,及数据和价值的双重传输,不同的分片网络的差异化特色,通过该双层网络架构,解决信息孤岛,资源孤岛;同时确保共享资源的真实可靠,不可篡改。
所述将资源数据通过API接口存储至云计算存储空间中时,加入中科院国家授时中心的时间戳,用以防止数据冲突。所述访问方身份加密的过程为依次对访问方身份依次进行哈希运算和AES256算法运算,并在第一网络或第二网络中上链;相应地,所述自动识别验证访问方身份的方法为访问方验证令牌方式,或验证接口方式。因B/S与C/S需不同的验证方式,以防止重复登录,防止网络攻击,以及数据冲突问题。所述第一网络或第二网络的节点包括云计算中心节点和边缘计算节点。扩展网络规模,实现节点类型的差异化布局,拓展存储空间,充分发挥各节点优势。
利用雾计算节点、云计算中心节点和边缘计算节点组成的分布式点对点网络,以及云计算或雾计算的数据存储空间,实现了异地多活,数据传输速度快,且不存在数据冲突,在包含有价值或数据资源的交易哈希计算后,打包共识上链时,加入中科院国家授时中心的时间戳。将资源数据通过API接口存储至云计算或雾计算存储空间中时,加入中科院国家授时中心的时间戳。通过不对称的哈希运算、具有权威性的中科院国家授时中心的时间戳,以解决数据冲突问题。在不同的分片网络之间进行数据通信传输时通过以上所述的验证方式,访问方进行交易数据上链时也采用以上所述的验证方式,以确保网络安全及数据安全,极大程度降低因恶意访问攻击所带来的宕机情况。
相应地,本实施例提出了适用于根链的一种资源传输方法,包括:当所述资源为数据资源时,均存储在根链可访问和获取的云计算或雾计算存储空间中;根链接收分片网络上的节点发来的获取资源的请求后,向云计算或雾计算存储空间获取对应的资源,传输给对应分片网络上的对应节点需获取资源的客户端。
当处于不同分片网络的两个用户需进行价值交换的时候,通过根链进行价值转移。此处涉及不同分片网络的账户交互、虚拟价值转移。假如分片网络X和Y,用户A在分片网络的账户,需向用户B在分片网络Y上的账户转账,为保持交易的原子性,及防止产生双花,所述根链上的智能合约C用于管理该跨片处操作的转账流程,对于根链上的智能合约,处理的方法包括:
接收用户A发来的将分片网络X的用户A的虚拟价值(如代币数量,代币对应的价值 额度)转账到分片网络Y的用户B的交易请求;验证交易请求无误后,其中,验证交易包括验证该笔交易的格式是否合法,验证分片网络Y中用户A对应的账户A1上的余额是否大于等于转账金额+预留的交易费用之和,若交易合法,且账户A1上的余额满足上述要求,则冻结用户A在分片网络X上的对应转账金额+预留的交易费用;上述冻结完成后,智能合约通过用户A在分片网络Y中的账户A1,向用户B发起对应的转账交易,记为交易Y1,同时将该分片网络Y上的转账交易的哈希值H-Y1反馈到智能合约C,智能合约C将分片网络Y上的转账交易的哈希值H-Y1,反馈到分片网络X上的用户A,根据在分片网络Y上实际发生的转账金额,在分片网络X上的用户A向智能合约C转账对应实际发生的转账金额,同时在该笔交易的格式内容中加入分片网络Y上的转账交易的哈希值H-Y1,构建后的记为交易X1,解冻多余的部分,退还到用户A在分片网络X的地址上;将交易X1的哈希值H-X1反馈到智能合约C;智能合约C在交易Y1的格式内容中,重新加入哈希值H-X1,构建分片网络Y的交易Y11,在分片网络X上对交易X1进行共识,在分片网络Y上对交易Y11进行共识,智能合约C监控分片网络X上包含交易X1的区块,以及分片网络Y上包含交易Y11的区块,当两者均共识成功后,则标识跨片转账成功;因智能合约C监控两者的执行状态,即使发生恶意的攻击,或者分叉等操作,也不会出现双花现象,确保交易的原子性。
为确保根链的积极性,在上述跨片转移过程中,根链上的智能合约C可从中收取手续费,以支持根链的可持续稳定发展。综上所述的跨片价值转移属于不同分片网络之间的价值转移过程,对于同一分片网络的价值转移,与现有技术中常用的交易方法类似,根据不同分片网络设定的共识方法的不同,对应的交易内容和格式可灵活适应改变,以满足各分片网络价值转移过程。
本实施例技术方案提出的根链以及多个分片网络的两层区块链网络的架构模式,可进行上述价值资源与数据资源的交换或转移或重新分配等,在不同的商业场景中推广应用时,可根据需要进行灵活变换;如当分片网络E和F中的不同用户进行交互时,可伴随着资源的获取,和/或价值的转移及交换。即可灵活适应不同种类商业场景,可根据不同商业场景进行灵活切换,多方兼容。
采用“网关分离技术”,企业园区或分支机构等的客户机通过三层网络(根链、分片网络和云计算或雾计算的存储空间)访问各数据中心节点(包括雾计算节点、云计算中心节点或边缘计算节点),将计算,通信,控制,存储资源和服务分配给用户或分布在靠近用户的设备与系统上,将云计算扩展至网络边缘节点。位于网络边缘的小型云,即本地小型云,雾计算。具有有限的处理能力和存储设备,并提供了一种筛选来自物联网组件信息流的方法,具有以下特点:
①雾计算并不像边缘计算那样分散,但进一步减少了通过网络或向上传输到云计算层的数据量,它有助于边缘层中“节点”之间的通信和协作。
②应用于工业物联网中,位于供应链中的多个仓库和工厂之间。雾计算层可以用于“检查和平衡”多个位置的材料、设备和供应水平,并自动触发创建、发送和接收订单。
③控制着运营数据,通过组织的设备和局域网以及决策者(或工业级云数据服务)的移动量和类型。雾计算可以帮助减少带宽使用,甚至减缓企业进行昂贵升级的需求,以及帮助企业保持IT基础设施平稳运行。
存储网络互联。跨中心的存储网络互通(不同的云计算或雾计算中心之间的存储空间网络互通,或者不同类型的节点之间的互通)是保证虚拟机动态迁移的必备条件,可采用“共享存储方式”或“双活存储方式”。
二层网络互联。虚拟机动态迁移之后IP地址不变,所以在虚机网络接入层应构建跨中心二层网络。可采用EVI、VPLS、DWDM/Dark Fiber等技术来实现。
三层网络互联。企业园区或分支机构的客户机等组网节点或访问方通过三层网络访问各数据中心,对于能支持虚拟机跨中心迁移的分布式数据中心来说,传统三层网络部署方案通过跨中心统一部署VRRP实现单侧网关出口。
在物理介质层实现数据中心间互联,可以为跨中心二层扩展(根链与分片网络的两层网络)提供灵活的部署形式,先在数据中心间建立三层(根链、分片网络和存储中心互联互通)互联通道,再基于MAC Over IP技术实现VLAN扩展,后者的好处在于可以利用MAC Over IP提供了技术特性简化分布式数据中心间MAC地址学习、三层路径优化等问题。
采用动态DNS解析技术解决三层次优路径,同一个虚拟机在不同数据中心通过NAT(由SLB设备实现)呈现不同的服务IP地址。GSLB作为DNS服务器,并根据虚拟机(根链节点对应的虚拟机)所在的物理位置向客户机解析成不同的服务IP地址。如何向GSLB通告虚拟机的物理位置并修改DNS记录的技术问题。采用RHI(Route Health Injection,路由健康注入)技术解决上述技术问题,该特性通常由SLB设备实现,SLB设备周期性的检测服务器/虚拟机的存活状态,当检查结果正常时,SLB向骨干网中发布一条该虚拟机地址的主机路由;当检查结果异常时,撤销该主机路由。由此就可以动态的调整从客户机到A或B中心的Ingress流量路径,确保根链节点对应虚拟机的健康状态。
Egress方向(虚拟机到访问方所在的客户机)的网关分离技术。为避免Egress方向的次优路径,必须在分布式数据中心两侧的汇聚交换机上同时部署相同的VRRP配置(某A、B中心的汇聚设备上具有相同的VRRP VIP配置),并且还要保证VRRP所在VLAN的跨中心二层互通。如果汇聚设备已经采用了基于H3C EVI技术的VLAN扩展,则缺省支持VRRP 的本地化部署,如果未部署类似EVI的技术特性,用户也可以通过配置相应的命令行实现该VRRP的本地化部署。
根链以及任一分片网络可以是公链、联盟链、私链等任一种区块链通过本实施例的方法可实现跨链互通互联,可以解决流量孤岛问题。在完全保持原生链技术架构、存储架构、治理组织的前提下,及在不发生“化学作用”(即根链与任一分片网络之间,及各分片网络之间架构自治理、运行自维护)的前提下,为原生链间提供流通交互、互联互通服务。
本实施例的技术方案,可在金融领域的价值传递中推广使用,比如多个金融主体之间的自组织的跨链数据传递系统,通过权威的金融体系中心组织控制根链,严格把控各金融主体形成分片网络时的组网原则,各金融主体形成的分片网络的节点入网条件等确保网络安全、数据安全。也可在各类资源学习分享平台推广使用,打破平台之间的数据孤岛壁垒,实现多元化交互。
实施例2
本实施例提供了一种设备,所述设备包括:一个或多个处理器;存储器,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如以上所述的方法。
此外,本实施例提供了一种存储有计算机程序的存储介质,该程序被处理器执行时实现如以上实施例1所述的方法。
图1为本发明一实施例提供的一种设备的结构示意图。
如图1所示,作为另一方面,本申请还提供了一种设备500,包括一个或多个中央处理单元(CPU)501,其可以根据存储在只读存储器(ROM)502中的程序或者从存储部分508加载到随机访问存储器(RAM)503中的程序而执行各种适当的动作和处理。在RAM503中,还存储有设备500操作所需的各种程序和数据。CPU501、ROM502以及RAM503通过总线504彼此相连。输入/输出(I/O)接口505也连接至总线504。
以下部件连接至I/O接口505:包括键盘、鼠标等的输入部分506;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分507;包括硬盘等的存储部分508;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分509。通信部分509经由诸如因特网的网络执行通信处理。驱动器510也根据需要连接至I/O接口505。可拆卸介质511,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器510上,以便于从其上读出的计算机程序根据需要被安装入存储部分508。
特别地,根据本申请公开的实施例,上述任一实施例描述的方法可以被实现为计算机软件程序。例如,本申请公开的实施例包括一种计算机程序产品,其包括有形地包含在机器可 读介质上的计算机程序,所述计算机程序包含用于执行上述任一实施例描述的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分509从网络上被下载和安装,和/或从可拆卸介质511被安装。
作为又一方面,本申请还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上述实施例的装置中所包含的计算机可读存储介质;也可以是单独存在,未装配入设备中的计算机可读存储介质。计算机可读存储介质存储有一个或者一个以上程序,该程序被一个或者一个以上的处理器用来执行描述于本申请的方法。
附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这根据所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以通过执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以通过专用硬件与计算机指令的组合来实现。
描述于本申请实施例中所涉及到的单元或模块可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的单元或模块也可以设置在处理器中,例如,各所述单元可以是设置在计算机或移动智能设备中的软件程序,也可以是单独配置的硬件装置。其中,这些单元或模块的名称在某种情况下并不构成对该单元或模块本身的限定。
以上描述仅为本申请的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本申请中所涉及的发明范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离本申请构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本申请中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。
Claims (11)
- 一种共识方法,其特征在于:解析验证通过的一笔以上的第一交易,判断第一交易是否为包含有节点请求加入的交易,若是,则根据至少包括请求加入的节点要求的共识方法、请求加入的节点身份在内的第一交易内容,对请求加入的节点进行网络分片,将请求加入的节点分配至第一网络;向请求加入的节点发送将请求加入的节点分配至第一网络的消息;接收请求加入的节点的响应消息,判断请求加入的节点是否同意,若是,则将第一交易,及包含有将请求加入的节点分配至第一网络的交易打包上链;若否,则将第一交易,及包含有将请求加入的节点拒绝分配至第一网络的交易打包上链;若第一交易不为包含有节点请求加入的交易,则将第一交易打包上链。
- 根据权利要求1所述的一种共识方法,其特征在于:所述方法的通信方式为MQTT。
- 根据权利要求1所述的一种共识方法,其特征在于:所述交易打包上链时,加入中科院国家授时中心的时间戳。
- 根据权利要求1所述的一种共识方法,其特征在于:所述对请求加入的节点进行网络分片,将请求加入的节点分配至第一网络的原则为:所述请求加入的节点要求的共识方法与第一网络的共识方法一致,且满足第一网络的组网原则。
- 一种资源传输方法,其特征在于:识别验证访问方身份,若访问方身份验证通过,则为访问方开放第一网络或第二网络的API接口;判断访问方的请求类型,若为资源数据上传请求,则对资源数据进行哈希运算得到资源数据哈希值,将资源数据哈希值上链,并将资源数据通过第一网络或第二网络的API接口存储至云计算或雾计算存储空间中;若为资源数据获取请求,则通过第一网络或第二网络的API接口从云计算或雾计算存储空间中获取资源数据,通过哈希运算比对数据资源哈希值与上链后的数据资源数据哈希值是否一致,若一致则将资源数据发送给访问方。
- 根据权利要求5所述的一种资源传输方法,其特征在于:所述验证,对于B/S架构的数据接口,采用用户验证令牌方式;对于C/S架构的数据接口,采用验证接口方式。
- 根据权利要求6所述的一种资源传输方法,其特征在于:所述验证接口方式为所述识别验证访问方身份的过程,包括:访问方对待验证的加密密钥进行哈希运算,得到待验证的加密密钥哈希值,与第一网络或第二网络中上链的加密密钥哈希值比对,若一致,则访问方通过所述加密密钥对访问方身份信息的密文,通过AES256算法解密得到访问方身份信息的明文,访问方身份验证通过;若待验证的加密密钥哈希值,与第一网络或第二网络中上链的加密密钥哈希值比对不一致,则访问方身份验证不通过;相应地,所述访问方身份加密的过程为:通过加密密钥将访问方身份信息的明文根据AES256算法得到访问方身份信息的密文;对加密密钥进行哈希运算后得到加密密钥哈希值,将加密密钥哈希值及访问方身份信息的密文在第一网络或第二网络中上链。
- 根据权利要求5所述的一种资源传输方法,其特征在于:所述第一网络或第二网络的节点包括雾计算节点、云计算中心节点和边缘计算节点。
- 根据权利要求7所述的一种资源传输方法,其特征在于:所述验证接口方式用于所述第一网络与第二网络传输数据时接口验证使用。
- 一种设备,其特征在于,所述设备包括:一个或多个处理器;存储器,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如权利要求1-9中任一项所述的方法。
- 一种存储有计算机程序的存储介质,其特征在于,该程序被处理器执行时实现如权利要求1-9中任一项所述的方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010054574 | 2020-01-17 | ||
CN202010551115.5A CN111612466B (zh) | 2020-01-17 | 2020-06-16 | 一种共识和资源传输方法、设备及存储介质 |
CN202010551115.5 | 2020-06-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021254029A1 true WO2021254029A1 (zh) | 2021-12-23 |
Family
ID=72197110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/093096 WO2021254029A1 (zh) | 2020-01-17 | 2021-05-11 | 一种共识和资源传输方法、设备及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN114418574A (zh) |
WO (1) | WO2021254029A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114430326A (zh) * | 2022-04-07 | 2022-05-03 | 中国工商银行股份有限公司 | 基于区块链的信息确认方法及装置、电子设备及存储介质 |
CN115348263A (zh) * | 2022-06-29 | 2022-11-15 | 中国工商银行股份有限公司 | 多层次区块链系统、多层次区块链的混合组网方法及装置 |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114418574A (zh) * | 2020-01-17 | 2022-04-29 | 厦门潭宏信息科技有限公司 | 一种共识和资源传输方法、设备及存储介质 |
CN114221972A (zh) * | 2020-09-03 | 2022-03-22 | 中国电信股份有限公司 | 中继区块链系统以及跨链交易方法 |
CN112235382B (zh) * | 2020-09-30 | 2021-09-10 | 厦门攸基数据科技有限公司 | 一种基于区块链分片的交易管理系统及方法 |
CN112950415B (zh) * | 2021-03-11 | 2024-01-16 | 全链通有限公司 | 基于区块链的司法固证方法、平台和系统 |
CN113516557B (zh) * | 2021-07-14 | 2022-09-23 | 桂林电子科技大学 | 一种有向无环图结构的区块链及其实现方法 |
CN113472534A (zh) * | 2021-07-23 | 2021-10-01 | 厦门潭宏信息科技有限公司 | 一种区块链数据加密方法、设备及存储介质 |
CN115473766B (zh) * | 2022-08-22 | 2024-01-26 | 苏州思萃工业互联网技术研究所有限公司 | 一种基于分布式网关的vip实现方法和系统 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107171829A (zh) * | 2017-04-24 | 2017-09-15 | 杭州趣链科技有限公司 | 一种基于bft共识算法实现的动态节点管理方法 |
US20190132295A1 (en) * | 2018-11-02 | 2019-05-02 | Oron Lenz | System and apparatus for data confidentiality in distributed ledger |
CN109949160A (zh) * | 2019-03-27 | 2019-06-28 | 上海优扬新媒信息技术有限公司 | 一种区块链的分片方法及装置 |
US20190311337A1 (en) * | 2018-04-04 | 2019-10-10 | Vijay K. Madisetti | Method and System for Exchange of Value or Tokens Between Blockchain Networks |
CN110545286A (zh) * | 2019-09-18 | 2019-12-06 | 腾讯科技(深圳)有限公司 | 加入联盟链、退出联盟链的方法及装置 |
CN110557403A (zh) * | 2019-09-26 | 2019-12-10 | 腾讯科技(深圳)有限公司 | 基于区块链的资源分配方法、装置、存储介质及节点设备 |
CN110727731A (zh) * | 2019-09-05 | 2020-01-24 | 阿里巴巴集团控股有限公司 | 区块链网络中加入节点的方法和区块链系统 |
CN111245836A (zh) * | 2020-01-13 | 2020-06-05 | 电子科技大学 | 一种基于多节点决策的区块链网络动态管理方法 |
CN111612466A (zh) * | 2020-01-17 | 2020-09-01 | 厦门潭宏信息科技有限公司 | 一种共识和资源传输方法、设备及存储介质 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475666B (zh) * | 2013-09-23 | 2017-01-04 | 中国科学院声学研究所 | 一种物联网资源的数字签名认证方法 |
CN109191124B (zh) * | 2018-08-16 | 2021-02-26 | 北京京东尚科信息技术有限公司 | 区块链网络、部署方法及存储介质 |
CN109345387A (zh) * | 2018-09-04 | 2019-02-15 | 湖南宸瀚信息科技有限责任公司 | 区块链跨链交易方法、跨链通信装置及存储介质 |
WO2020082213A1 (zh) * | 2018-10-22 | 2020-04-30 | 深圳市哈希树科技有限公司 | 一种网络可扩展性区块链实现方法 |
CN110753026B (zh) * | 2019-02-27 | 2020-10-30 | 北京嘀嘀无限科技发展有限公司 | 一种基于区块链的分片方法及装置 |
CN110535872B (zh) * | 2019-09-12 | 2021-06-01 | 腾讯科技(深圳)有限公司 | 在区块链网络中处理数据请求的方法和装置 |
CN110855761B (zh) * | 2019-10-29 | 2021-09-21 | 深圳前海微众银行股份有限公司 | 一种基于区块链系统的数据处理方法及装置 |
-
2020
- 2020-06-16 CN CN202210061763.1A patent/CN114418574A/zh active Pending
- 2020-06-16 CN CN202010551115.5A patent/CN111612466B/zh active Active
-
2021
- 2021-05-11 WO PCT/CN2021/093096 patent/WO2021254029A1/zh active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107171829A (zh) * | 2017-04-24 | 2017-09-15 | 杭州趣链科技有限公司 | 一种基于bft共识算法实现的动态节点管理方法 |
US20190311337A1 (en) * | 2018-04-04 | 2019-10-10 | Vijay K. Madisetti | Method and System for Exchange of Value or Tokens Between Blockchain Networks |
US20190132295A1 (en) * | 2018-11-02 | 2019-05-02 | Oron Lenz | System and apparatus for data confidentiality in distributed ledger |
CN109949160A (zh) * | 2019-03-27 | 2019-06-28 | 上海优扬新媒信息技术有限公司 | 一种区块链的分片方法及装置 |
CN110727731A (zh) * | 2019-09-05 | 2020-01-24 | 阿里巴巴集团控股有限公司 | 区块链网络中加入节点的方法和区块链系统 |
CN110545286A (zh) * | 2019-09-18 | 2019-12-06 | 腾讯科技(深圳)有限公司 | 加入联盟链、退出联盟链的方法及装置 |
CN110557403A (zh) * | 2019-09-26 | 2019-12-10 | 腾讯科技(深圳)有限公司 | 基于区块链的资源分配方法、装置、存储介质及节点设备 |
CN111245836A (zh) * | 2020-01-13 | 2020-06-05 | 电子科技大学 | 一种基于多节点决策的区块链网络动态管理方法 |
CN111612466A (zh) * | 2020-01-17 | 2020-09-01 | 厦门潭宏信息科技有限公司 | 一种共识和资源传输方法、设备及存储介质 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114430326A (zh) * | 2022-04-07 | 2022-05-03 | 中国工商银行股份有限公司 | 基于区块链的信息确认方法及装置、电子设备及存储介质 |
CN115348263A (zh) * | 2022-06-29 | 2022-11-15 | 中国工商银行股份有限公司 | 多层次区块链系统、多层次区块链的混合组网方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN114418574A (zh) | 2022-04-29 |
CN111612466B (zh) | 2022-02-18 |
CN111612466A (zh) | 2020-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021254029A1 (zh) | 一种共识和资源传输方法、设备及存储介质 | |
US11995618B2 (en) | Blockchain network interaction controller | |
Wu et al. | Big data analysis-based secure cluster management for optimized control plane in software-defined networks | |
CN108650182B (zh) | 网络通信方法、系统、装置、设备及存储介质 | |
WO2022105498A1 (zh) | 一种基于区块链网络的数据处理方法、装置、计算机设备以及计算机可读存储介质 | |
US8918835B2 (en) | Method and apparatus to create and manage virtual private groups in a content oriented network | |
WO2020113545A1 (zh) | 基于联盟链投票共识算法产生及管理多模标识网络的方法 | |
WO2018082345A1 (zh) | 一种基于集中管理与控制网络的量子密钥中继方法和装置 | |
US7403980B2 (en) | Methods and apparatus for scalable, distributed management of virtual private networks | |
CN101222406A (zh) | 双代理在虚拟专用网络(vpn)中进行应用层内容路由的方法 | |
EP2122483A2 (en) | Service insertion architecture | |
CN101151604A (zh) | 消息发布/订购系统中的设置和管理 | |
CN101277248A (zh) | 一种网络数据分发方法及系统 | |
Asaf et al. | Blockchain technology in named data networks: A detailed survey | |
CN105282191A (zh) | 负载均衡系统、控制器和方法 | |
CN104901825B (zh) | 一种实现零配置启动的方法和装置 | |
Zhong et al. | SCPLBS: A smart cooperative platform for load balancing and security on SDN distributed controllers | |
Dayananda et al. | Architecture for inter-cloud services using IPsec VPN | |
Yang | Optical and wireless convergence network based on blockchain | |
US12058024B1 (en) | Distributed ledger network discovery and cross-instance data routing | |
CN117729062B (zh) | 用于企业网络的组网方法、装置及系统 | |
KR102509279B1 (ko) | 군집 정차 차량 기반 차량 네트워킹 및 컴퓨팅 시스템 | |
WO2021103986A1 (zh) | 一种网络设备管理方法、装置、网络管理设备及介质 | |
Arnedo-Moreno et al. | Providing a collaborative mechanism for peer group access control | |
CN118157916A (zh) | 用于企业网络的访问方法、装置及系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21826179 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21826179 Country of ref document: EP Kind code of ref document: A1 |