WO2022067888A1 - 一种基于共治链的域名解析方法及装置 - Google Patents

一种基于共治链的域名解析方法及装置 Download PDF

Info

Publication number
WO2022067888A1
WO2022067888A1 PCT/CN2020/121069 CN2020121069W WO2022067888A1 WO 2022067888 A1 WO2022067888 A1 WO 2022067888A1 CN 2020121069 W CN2020121069 W CN 2020121069W WO 2022067888 A1 WO2022067888 A1 WO 2022067888A1
Authority
WO
WIPO (PCT)
Prior art keywords
domain name
governance
root
data
chain
Prior art date
Application number
PCT/CN2020/121069
Other languages
English (en)
French (fr)
Inventor
曾宇
李洪涛
胡安磊
董科军
延志伟
杨学
张海阔
张志勇
Original Assignee
中国互联网络信息中心
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国互联网络信息中心 filed Critical 中国互联网络信息中心
Priority to US17/250,225 priority Critical patent/US11558343B2/en
Publication of WO2022067888A1 publication Critical patent/WO2022067888A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Definitions

  • the present invention relates to the technical field of blockchain, and in particular, to a method and device for domain name resolution based on a co-governance chain.
  • the current domain name system Domain Name Server, DNS
  • DNS Domain Name Server
  • top-level domains .com, .cn, .org, .net
  • secondary domains CNNIC.CN, BAIDU.CN
  • CNNIC.CN includes subdomains: WWW.CNNIC.CN and MAIL.CNNIC.CN.
  • the root resolution system is the starting point of domain name resolution and the center of the system structure.
  • the data management of the root zone is mainly in charge of the Internet Digital Distribution Agency, and the domain name resolution adopts a centralized management method.
  • the inventors have studied the existing centralized management process and found that the centralized management method is determined by the Internet digital distribution agency when managing domain name data, and there are risks such as single-point management and centralization.
  • the present invention provides a method and device for domain name resolution based on a co-governance chain, which is used to solve the problem that the resolution of the domain name in the existing centralized management method requires the confirmation of the Internet digital distribution agency, and there is a single point. Management, centralization and other risks.
  • the specific plans are as follows:
  • a method for domain name resolution based on a co-governance chain comprising:
  • a recursive resolution mode is used to perform domain name resolution based on the co-governance root service and the corresponding data in the root domain name co-governance chain.
  • each data distribution node is determined, and a root domain name co-governance chain is constructed based on each data distribution node, including:
  • the top-level domain name data, the blacklist data and the whitelist data are backed up to the respective data distribution nodes, and the root domain name co-governance chain is constructed.
  • the above method optionally, obtains trusted root zone data based on the root domain name co-governance chain, and constructs a co-governance root service based on the trusted root zone data, including:
  • the DNS security extension function is configured in the co-governance service.
  • a recursive resolution mode is used to perform domain name resolution based on the co-governance root service and the corresponding data in the root domain name co-governance chain, including:
  • the above method optionally, further includes:
  • the service corresponding to the IP address is obtained.
  • the above method optionally, further includes:
  • a domain name resolution device based on a co-governance chain comprising:
  • a determination and construction module for determining each data distribution node, and constructing a root domain name co-governance chain based on each data distribution node;
  • a building module for acquiring trusted root zone data based on the root domain name co-governance chain, and constructing a co-governance root service based on the trusted root zone data;
  • a parsing module configured to use a recursive parsing mode to perform domain name parsing based on the co-governance service and the corresponding data in the root domain name co-governance chain when a domain name parsing request is received.
  • the determining and building modules include:
  • the determination unit is used to determine each data distribution node in the co-governance chain of the root domain name based on the national and regional top-level domain name system and the generic top-level domain name system;
  • the acquisition unit is used to acquire top-level domain data, blacklist data and whitelist data;
  • a backup unit configured to back up the top-level domain name data, the blacklist data and the whitelist data to the respective data distribution nodes, and construct the root domain name co-governance chain.
  • the building block includes:
  • a synchronization unit configured to synchronize the trusted root zone data to the co-governance root service through the data distribution node on the root domain name co-governance chain;
  • a mode configuration unit used for setting a recursive resolution service mode in the co-governance service
  • a function configuration unit configured to configure the DNS security extension function in the co-governance root service.
  • the parsing module includes:
  • an obtaining unit configured to obtain the IP address contained in the domain name resolution request when receiving the domain name resolution request
  • a first sending unit configured to send a resolution request to the co-governance root service when the recursive server fails to query the IP address
  • the obtaining and feedback unit is configured to send a resolution request to the root domain name co-governance chain when the IP address is not queried by the co-governance root service, obtain the top-level authoritative domain information associated with the IP address, and feed back all the top-level authoritative domain information.
  • the present invention includes the following advantages:
  • the invention discloses a domain name resolution method and device based on a co-governance chain.
  • the method includes: determining each data distribution node, constructing a root domain name co-governance chain based on the respective data distribution nodes; obtaining a root domain name co-governance chain based on the root domain name co-governance chain Trusted root zone data, build a co-governance root service based on the trusted root zone data; when receiving a domain name resolution request, adopt a recursive resolution mode based on the co-governance root service and the corresponding data in the root domain name co-governance chain Perform domain name resolution.
  • a root domain name co-governance chain is constructed based on blockchain technology.
  • the root domain name co-governance chain adopts a decentralized processing method, and each node is equal. , when the domain name is resolved, it only needs to be adjusted in the corresponding node, avoiding risks such as single-point management and centralization.
  • FIG. 1 is a schematic diagram of a domain name resolution architecture in the prior art
  • FIG. 2 is a schematic diagram of a domain name resolution architecture disclosed in an embodiment of the present application.
  • FIG. 3 is a flowchart of a method for domain name resolution based on a co-governance chain disclosed in an embodiment of the present application
  • FIG. 4 is a schematic structural diagram of a co-governance chain disclosed in an embodiment of the application.
  • FIG. 5 is a structural block diagram of a domain name resolution apparatus based on a co-governance chain disclosed in an embodiment of the present application.
  • the invention discloses a domain name resolution method and device based on a co-governance chain, which is applied in the domain name resolution process.
  • the current domain name system Domain Name Server, DNS [1] name space structure, domain name allocation and resolution process are strictly Hierarchical, the root resolution system is the starting point of domain name resolution and the center of the system structure.
  • the data management of the root zone is mainly carried out by the Internet Digital Distribution Agency, which centrally manages the domain name resolution process.
  • the centralized management method requires the confirmation of the Internet Digital Distribution Agency when the domain name is resolved.
  • the present invention adopts the blockchain technology to construct a domain name resolution architecture, wherein the blockchain is a new application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. It uses block chain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, uses cryptography to ensure the security of data transmission and access, uses automated script code (smart contract) to program and operate A new decentralized infrastructure and distributed storage system for data. There is no central node in the blockchain, all nodes have the same status, and the data consistency of each node is guaranteed through cryptography and consensus mechanism.
  • All nodes in the blockchain network are equal to each other and are not subject to a single node or a single individual and organization; blockchain data is stored on multiple nodes in the network, and traditional data is stored in There is a big difference on one or several nodes;
  • the information can be traced back: the hash value of each block in the blockchain identifies it, thus forming an interconnected chain structure. Therefore, the blockchain contains all transactions generated in the entire blockchain network, and each All new transactions are generated on the basis of the original transactions, and the continuity between transactions allows each transaction to be traced back to its source, which can verify the legitimacy of the transaction.
  • the co-governance chain is designed to realize a new type of root domain name data management system that is decentralized, participated by all parties, endogenously safe, and regulated. Among them, the co-governance chain consists of multiple data distribution nodes;
  • the co-governance root realizes a new root service system that is equal, open, efficient, scalable, compatible and evolvable.
  • the co-governance chain provides secure and credible data support for the co-governance root through the data distribution nodes on the chain.
  • the root is the co-governance root service (main root/mirror root) deployed globally;
  • the enhanced recursive node is a recursive server, and the recursive server client, Transfer requests between global co-governance services (top-level authoritative domain name services and other domain name authority services at all levels);
  • the Internet Assigned Numbers Authority (IANA) is used to supplement data in the evolution stage to achieve smooth evolution.
  • the new domain name resolution architecture system will be more conducive to safeguarding the cyberspace sovereignty of various countries, and can effectively support the Internet's multi-party co-governance management model, and is effectively compatible with the existing domain name resolution system.
  • the existing network experimental verification of the business, performance and security of the new domain name resolution system is carried out.
  • this architecture is suitable for gradual deployment and evolution in stages, and finally realizes a new type of domain name service system that is multilateral and multi-party co-governance and can be regulated.
  • the present invention provides a method for domain name resolution based on a co-governance chain.
  • the execution flow of the resolution method is shown in Figure 3, including steps:
  • the domain name system is mainly divided into country and region top-level domain names and generic top-level domain names.
  • each node is the country and region top-level domain management Organizations
  • the generic top-level domain (gTLD) system each node is a number of commercial organizations, so there are two types of committees in the role definition: the ccTLD committee and the gTLD committee.
  • the ccTLD Committee is responsible for ballot initiation and access related to national top-level domains; the gTLD Committee is responsible for the ballot initiation and access related to generic top-level domains.
  • each data distribution node is shown in Table 1.
  • a request for becoming a data distribution node is sent to the registry, and the committee (ccTLD committee and gTLD committee) conducts review. After the review is completed, each node is voted. When the number of votes allowed to join is greater than 2/3 of the total number of votes, the node is allowed to become a data distribution node, and it is written into the root domain name co-governance chain, and this data distribution node determination process ends.
  • top-level domain data such as phishing domain names
  • whitelist data important website domain names
  • the top-level domain name data, the blacklist data and the whitelist data are backed up to the respective data distribution nodes, and the root domain name co-governance chain is constructed.
  • the structural block diagram of the root domain name co-governance chain is shown in Figure 4, including: security and regulatory agencies, gTLD registry, gTLD multilateral coordination committee, ccTLD registry, ccTLD multilateral coordination committee, on-chain recursive resolution server and data Distribution node, among which, gTLD registry and gTLD multilateral coordination committee are used to realize gTLD management.
  • gTLD registry includes: intelligent domain name management interface, hybrid consensus mechanism (PBFT-DPOA and other algorithms), participation in gTLD chain consensus, synchronization of gTLD and ccTLD areas Block and publish TLD record information and black and white lists.
  • the ccTLD registry and the ccTLD multilateral coordination committee are used to implement ccTLD management.
  • the ccTLD registry includes: intelligent domain name management interface, hybrid consensus mechanism (PBFT-DPOA and other algorithms), participating in ccTLD chain consensus, synchronizing gTLD and ccTLD blocks and publishing TLD records information and black and white lists.
  • the PoA consensus algorithm uses the value of identity, which means that individuals are selected as producers and validators of blocks by virtue of their reputation and authority.
  • the members of this system are various national domain name registries and some well-known gTLD registries.
  • DPOA A certain number of representatives are generated by the voting mechanism. The system is represented by 2N-1 nodes, and only these 2N-1 nodes generate blocks.
  • PBFT-DPOA Byzantine Fault Tolerance
  • BFT Byzantine Fault Tolerance
  • the Byzantine hypothesis is a modeling of the real world, where computers and networks may behave unpredictably due to hardware errors, network congestion or outages, and malicious attacks.
  • Byzantine fault tolerance techniques are designed to handle these abnormal behaviors and meet the specification requirements of the problem to be solved.
  • PBFT is the abbreviation of Practical Byzantine Fault Tolerance, namely: Practical Byzantine Fault Tolerance.
  • the algorithm was proposed by Miguel Castro (Castro) and Barbara Liskov (Liskov) in 1999, and solved the problem of low efficiency of the original Byzantine fault-tolerant algorithm.
  • the "co-governance root” provides the root zone resolution function by acquiring trusted root zone data from the root domain name co-governance chain.
  • the main functions include: firstly, it supports “co-governance” to synchronize the latest data in the root zone through the data distribution nodes on the "root domain co-governance chain”; second, the co-governance design is fully compatible with the current recursive resolution service mode, and the preferred one is to judge IANA Whether there is unbacked-up TLD data in the TLD, the judgment process may be judged based on an identifier, a time point, or other preferred judgment methods. In this embodiment of the present invention, the specific judgment process is not limited. If there is unbacked TLD data in IANA, the smooth evolution of the co-governance architecture can be achieved by supplementing TLD data from IANA; the third is to support the DNSSEC function.
  • the enhanced recursive resolution node obtains the top-level domain name data and the domain name black and white list through the co-governance chain, and quickly responds to the user's domain name resolution request. Its main functions include: quickly respond to users' domain name resolution requests according to the black and white list of domain names, and accelerate the performance of recursive domain name resolution; obtain real-time global top-level domain name data and domain name black and white lists from the root domain name co-governance chain; Covered domain name resolution requests, as a general recursive server, iteratively query the top-level domain name server.
  • the parsing process is as follows: the client queries the domain name server, that is, the recursive server. If the recursive server query inquired by the client does not know the IP address of the queried domain name, the recursive server sends a query request message to the co-governing root as a client, and performs the next query. If the co-governance does not have the relevant information of the top-level authoritative domain of the queried domain name at all, it will initiate a request to the co-governance chain of the root domain name (in the transition period, IANA will also be asked to initiate a request) to obtain the relevant information of the top-level authoritative domain of the queried domain name. information.
  • the recursive service obtains the IP information of the top-level authoritative domain, starts the top-level authoritative domain service to query the IP address of the queried domain name, and returns the IP information of the domain name to the client after the query.
  • the client obtains the IP information of the query domain name and accesses the corresponding service.
  • the top-level domain management agency publishes its own root domain name and related resource records through its own public-private key pair, and writes it into the co-governance chain.
  • the co-governance root node receives the change notification of the root domain name record in the co-governance chain, and updates its own local records.
  • the invention discloses a domain name resolution method based on a co-governance chain, comprising: determining each data distribution node, constructing a root domain name co-governance chain based on the respective data distribution nodes; data, and build a co-governance root service based on the trusted root zone data; when a domain name resolution request is received, a recursive resolution mode is used to perform domain name resolution based on the co-governance root service and the corresponding data in the root domain name co-governance chain.
  • a root domain name co-governance chain is constructed based on blockchain technology.
  • the root domain name co-governance chain adopts a decentralized processing method, and each node is equal. , when the domain name is resolved, it only needs to be adjusted in the corresponding node, avoiding risks such as single-point management and centralization.
  • a new root service system that is equal, open, scalable, and supervised is realized through "co-governance of the root", and decentralization, participation of all parties, endogenous security
  • a supervised co-governance data management system the root domain name co-governance chain provides secure and credible data support for the co-governance through the data distribution nodes on the chain.
  • the root domain name co-governance chain includes domain name registration management agencies, multilateral coordination committees, security and regulatory agencies, data distribution nodes, on-chain resolution service agencies, etc., and supports multilateral and multi-party participation.
  • Phased deployment evolution of co-governance a potential model: Phase 1 is a deployment verification phase for a few TLDs, supplemented by IANA data; The second stage is that the co-governance root realizes the management of most ccTLD data, and IANA synchronizes data from the co-governance root; the third stage is that the co-governance root provides services independently.
  • an embodiment of the present invention further provides a domain name resolution apparatus based on a co-governance chain.
  • the structural block diagram of the resolution apparatus is shown in FIG. 5 , including:
  • the determining and constructing module 201 is used for determining each data distribution node, and constructing a root domain name co-governance chain based on each data distribution node;
  • the construction module 202 is configured to obtain trusted root zone data based on the root domain name co-governance chain, and build a co-governance root service based on the trusted root zone data;
  • the resolution module 203 is configured to perform domain name resolution based on the co-governance service and the corresponding data in the root domain name co-governance chain in a recursive resolution mode when a domain name resolution request is received.
  • the invention discloses a domain name resolution device based on a co-governance chain, comprising: determining each data distribution node, constructing a root domain name co-governance chain based on the respective data distribution nodes; data, and build a co-governance root service based on the trusted root zone data; when a domain name resolution request is received, a recursive resolution mode is used to perform domain name resolution based on the co-governance root service and the corresponding data in the root domain name co-governance chain.
  • the centralized management is no longer based on the Internet data distribution agency, but a root domain name co-governance chain is constructed based on blockchain technology.
  • the root domain name co-governance chain adopts a decentralized processing method, and each node is equal. , when the domain name is resolved, it only needs to be adjusted in the corresponding node, avoiding risks such as single-point management and centralization.
  • the determining and building module 201 includes:
  • a determination unit 204 an acquisition unit 205 and a backup unit 206 are provided.
  • the determining unit 204 is configured to determine each data distribution node in the co-governance chain of the root domain name based on the national and regional top-level domain name system and the generic top-level domain name system;
  • the obtaining unit 205 is used to obtain top-level domain data, blacklist data and whitelist data;
  • the backup unit 206 is configured to back up the top-level domain name data, the blacklist data and the whitelist data to the respective data distribution nodes, and construct the root domain name co-governance chain.
  • the building module 202 includes:
  • a synchronization unit 207 A synchronization unit 207 , a mode configuration unit 208 and a function configuration unit 209 .
  • the synchronization unit 207 is configured to synchronize the trusted root zone data to the co-governance root service through the data distribution node on the root domain name co-governance chain;
  • the mode configuration unit 208 configured to set a recursive resolution service mode in the co-governance service
  • the function configuration unit 209 is configured to configure the DNS security extension function in the co-governance root service.
  • the parsing module 203 includes:
  • An acquisition unit 210 An acquisition unit 210 , a first transmission unit 211 and an acquisition and feedback unit 212 .
  • the obtaining unit 210 is configured to obtain the IP address contained in the domain name resolution request when receiving the domain name resolution request;
  • the first sending unit 211 is configured to send a resolution request to the co-governance service when the recursive server fails to query the IP address;
  • the obtaining and feedback unit 212 is configured to send a resolution request to the root domain name co-governance chain when the IP address is not queried by the co-governance root service to obtain the top-level authoritative domain information associated with the IP address , to feed back the top-level authoritative domain information.
  • the present invention can be implemented by means of software plus a necessary general hardware platform. Based on this understanding, the technical solutions of the present invention can be embodied in the form of software products in essence or the parts that make contributions to the prior art.
  • the computer software products can be stored in storage media, such as ROM/RAM, magnetic disks, etc. , CD, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in various embodiments or some parts of the embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

本发明公开了一种基于共治链的域名解析方法及装置,该方法包括:确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。上述的解析方法中,不再基于互联网数据分配机构进行集中管理,而是基于区块链技术构建了根域名共治链,所述根域名共治链采用去中心化的处理方式,各个节点平等,在对域名进行解析时,只需要在对应的节点中调整即可,避免了单点管理、中心化等风险。

Description

一种基于共治链的域名解析方法及装置
本申请要求于2020年9月30日提交中国专利局、申请号为202011057496.8、发明名称为“一种基于共治链的域名解析方法及装置”的国内申请的优先权,其全部内容通过引用结合在本申请中
技术领域
本发明涉及区块链技术领域,尤其涉及一种基于共治链的域名解析方法及装置。
背景技术
当前域名系统(Domain Name Server,DNS)的名字空间结构、域名分配和解析过程都是严格层级化,如图1所示,包括:根域ROOT、顶级域:.com、.cn、.org、.net,二级域:CNNIC.CN、BAIDU.CN,其中,CNNIC.CN包括子域:WWW.CNNIC.CN和MAIL.CNNIC.CN。根解析体系是域名解析起点和系统结构中心。目前根区数据管理主要由互联网数字分配机构负责,域名解析采用集中式的管理方式,
发明人对现有的集中式管理过程进行研究发现,集中式管理方式在对域名数据进行管理时,由互联网数字分配机构确定,存在单点管理、中心化等风险。
发明内容
有鉴于此,本发明提供了一种基于共治链的域名解析方法及装置,用以解决现有集中式管理方式在对域名的进行解析时,都需要互联网数字分配机构的确认,存在单点管理、中心化等风险的问题。具体方案如下:
一种基于共治链的域名解析方法,包括:
确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;
基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构 建共治根服务;
当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。
上述的方法,可选的,确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链,包括:
基于国家及地区顶级域名体系和通用顶级域名体系确定根域名共治链中各个数据分发节点;
获取顶级域数据、黑名单数据和白名单数据;
将所述顶级域名数据、所述黑名单数据和所述白名单数据备份到所述各个数据分发节点,构建所述根域名共治链。
上述的方法,可选的,基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务,包括:
将所述可信根区数据通过所述根域名共治链上的数据分发节点同步到所述共治根服务;
在所述共治根服务中设置递归解析服务模式;
在所述共治根服务中配置DNS安全扩展功能。
上述的方法,可选的,当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析,包括:
当接收到域名解析请求时,获取所述域名解析请求中包含的IP地址;
在递归服务器未查询到所述IP地址时,向所述共治根服务发送解析请求;
在所述共治根服务未查询到所述IP地址时,向所述根域名共治链发送解析请求,获取与所述IP地址关联的顶级权威域信息,反馈所述顶级权威域信息。
上述的方法,可选的,还包括:
在查询到所述IP地址时,获取与所述IP地址对应的服务。
上述的方法,可选的,还包括:
获取互联网数字分配机构中未备份数据;
将所述未备份数据备份到所述根域名共治链中。
一种基于共治链的域名解析装置,包括:
确定和构建模块,用于确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;
构建模块,用于基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;
解析模块,用于当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。
上述的装置,可选的,所述确定和构建模块包括:
确定单元,用于基于国家及地区顶级域名体系和通用顶级域名体系确定根域名共治链中各个数据分发节点;
获取单元,用于获取顶级域数据、黑名单数据和白名单数据;
备份单元,用于将所述顶级域名数据、所述黑名单数据和所述白名单数据备份到所述各个数据分发节点,构建所述根域名共治链。
上述的装置,可选的,所述构建模块包括:
同步单元,用于将所述可信根区数据通过所述根域名共治链上的数据分发节点同步到所述共治根服务;
模式配置单元,用于在所述共治根服务中设置递归解析服务模式;
功能配置单元,用于在所述共治根服务中配置DNS安全扩展功能。
上述的装置,可选的,所述解析模块包括:
获取单元,用于当接收到域名解析请求时,获取所述域名解析请求中包含的IP地址;
第一发送单元,用于在递归服务器未查询到所述IP地址时,向所述共治根服务发送解析请求;
获取和反馈单元,用于在所述共治根服务未查询到所述IP地址时,向所述根域名共治链发送解析请求,获取与所述IP地址关联的顶级权威域信 息,反馈所述顶级权威域信息。
与现有技术相比,本发明包括以下优点:
本发明公开了一种基于共治链的域名解析方法及装置,该方法包括:确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。上述的解析方法中,不再基于互联网数据分配机构进行集中管理,而是基于区块链技术构建了根域名共治链,所述根域名共治链采用去中心化的处理方式,各个节点平等,在对域名进行解析时,只需要在对应的节点中调整即可,避免了单点管理、中心化等风险。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为现有技术中一种域名解析架构示意图;
图2为本申请实施例公开的一种域名解析架构示意图;
图3为本申请实施例公开的一种基于共治链的域名解析方法流程图;
图4为本申请实施例公开的一种共治链结构示意图;
图5为本申请实施例公开的一种基于共治链的域名解析装置结构框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进 行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本发明。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。
本发明公开了一种基于共治链的域名解析方法及装置,应用在域名解析过程中,当前域名系统(Domain Name Server,DNS)[1]的名字空间结构、域名分配和解析过程都是严格层级化,根解析体系是域名解析起点和系统结构中心。目前根区数据管理主要由互联网数字分配机构负责,对域名解析过程进行集中式管理,集中式管理方式在对域名的进行解析时,都需要互联网数字分配机构的确认,域名解析过程繁琐,进一步的,13个根服务器及其镜像服务器由12家机构负责运行,难以支撑和满足全球互联网开放互联、多方共治的网络空间管理趋势,也不利于保障全球各国的网络空间主权。
基于上述的问题,本发明采用区块链技术构建域名解析架构,其中,区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。它利用块链式数据结构来验证与存储数据、利用分布式节点共识算法来生成和更新数据、利用密码学的方式保证数据传输和访问的安全、利用自动化脚本代码(智能合约)来编程和操作数据的一种全新的去中心化基础架构和分布式存储系统。区块链中不存在中央节点,所有节点地位相同,并通过密码学与共识机制保证各节点数据的一致性。
区块链的特性主要体现在三个方面:
去中心化:区块链网络中所以节点相互平等,不受制于某个单独的节点或者单独的个体与组织;区块链的数据是存储在网络中多个节点上的,和传统数据存储在一个或者几个节点上有很大的不同;
信息不可篡改;区块链中每笔交易到区块链节点的时候,节点会验证这个交易的签名,如果签名不对,数据是会被丢弃的,只有持有私钥匙的人才可以修改这笔交易,其他人无法修改;区块链就是由区块线性连接而成的链。数据不可篡改,这个是由密码学、哈希函数等保障的。
信息可追溯:区块链中各区块的哈希散列值对其标识,从而形成相互连接的链式结构,因此区块链中包含了整个区块链网络中产生过的所有交易,同时每笔新交易都是基于原有交易的基础上产生的,交易之间的连续性使得每笔交易都可以追溯源头,可以验证交易的合法性。
因此,如何设计兼容当前业务逻辑的算法以实现无中心化、平等开放的名字系统且支撑多样化的安全保障及业务监管仍具有较大研究挑战,尤其是从体系结构角度设计基于区块链的新型域名根解析体系,是当前DNS技术研究与治理社群以及区块链从业机构共同关注的应用领域。新体系也对高效可靠存储管理、精准安全事件分析等提出新的挑战。基于区块链去中心化理念,在域名根解析领域进行体系革新不仅是对传统中心化服务架构在效率、可扩展性以及应对愈演愈烈的大规模分布式拒绝服务攻击(Distributed Denial of Service,DDoS)攻击方面的根本性改进,也是有利于保障全球各国的网络空间主权。
基于区块链技术构建无中心化、各方参与、平等开放、可监管的新型根域名和权威域名解析系统架构、协议与标准十分重要。以此为目标,提 出了如图2所示的解析架构。该架构
(1)设计共治链实现了无中心化、各方参与、内生安全、可监管的新型根域名数据管理体系,其中,共治链有多个数据分发节点组成;
(2)提出共治根实现了平等开放、高效可扩展、兼容可演进的新型根服务体系,共治链通过链上数据分发节点为共治根提供安全可信的数据支撑,其中,共治根为全球部署的共治根服务(主根/镜像根);
(3)通过设计包括共治根和增强递归节点在内的域名解析协议,满足高效安全、用户透明、兼容演进等域名解析需求,其中,增强递归节点为递归服务器,所述递归服务器客户端、全球共治根服务(顶级权威域名服务和其它各级域名权威服务)之间传递请求;
(4)通过互联网数字分配机构IANA(The Internet Assigned Numbers Authority)在演进阶段进行数据补充,实现平滑演进。
新型域名解析架构体系将更有利于保障各个国家的网络空间主权,能从技术上有效支撑互联网的多方共治管理模式,并有效兼容现有域名解析体系。同时开展新型域名解析系统的业务、性能和安全的现网实验验证。该架构在不改变现有权威、递归解析基础设施运作模式的基础上,适合分阶段逐步部署演进,最终实现多边多方共治、可监管的新型域名服务体系。
基于上述的问题,本发明提供了一种基于共治链的域名解析方法,所述解析方法的执行流程如图3所示,包括步骤:
S101、确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;
本发明实施例中,在域名体系中主要分为国家及地区顶级域名和通用 顶级域名,其中国家地区顶级域名(country code top-level domains,ccTLD)体系中,各节点为国家与地区顶级域管理机构,在通用顶级域名(generic top-level domain,gTLD)体系中,各节点为一些商业机构,所以在角色定义中分为两种委员会:ccTLD委员会和gTLD委员会。ccTLD委员会负责国家地区顶级域名相关的投票发起和准入的相关工作;gTLD委员会负责通用顶级域名相关的投票发起和准入的相关工作。
其中,所述各个数据分发节点的确定过程如表1所示,向注册局发送申请成为数据分发节点的请求,委员会(ccTLD委员会和gTLD委员会)进行审核,审核完成后,向各个节点发起投票,当允许加入的票数大于总票数的2/3时,允许该节点成为数据分发节点,将其写入根域名共治链,本次数据分发节点确定过程结束。
表1
Figure PCTCN2020121069-appb-000001
进一步的,获取ccTLD注册局、gTLD注册局、安全与监管机构、多边协调委员会等对顶级域数据及黑名单数据(如钓鱼域名)、白名单数据(重要网站域名)等多角色在内的多方共治根区管理,将所述顶级域名数据、所述黑名单数据和所述白名单数据备份到所述各个数据分发节点,构建所述根域名共治链。其中,所述根域名共治链的结构框图如图4所示,包括:安全与监管机构、gTLD注册局、gTLD多边协调委员会、ccTLD注册局、ccTLD多边协调委员会、链上递归解析服务器和数据分发节点,其中,gTLD注册局和gTLD多边协调委员会用于实现gTLD管理,gTLD注册局包括:智能域名管理接口、混合共识机制(PBFT-DPOA等算法)、参与gTLD链共识,同步gTLD和ccTLD区块和发布TLD记录信息及黑白名单。ccTLD注册局和ccTLD多边协调委员会用于实现ccTLD管理,ccTLD注册局包括:智能域名管理接口、混合共识机制(PBFT-DPOA等算法)、参与ccTLD 链共识,同步gTLD和ccTLD区块和发布TLD记录信息及黑白名单。PoA共识算法使用的是身份的价值,这意味着,凭借的个人的信誉和权威性而被选为区块的生产者和验证者。本系统的成员是各个国家域名注册局和一些著名的通用顶级域名的注册局。DPOA:由投票机制产生一定数量的代表本系统为2N-1个节点代表,只由这2N-1个节点生成区块。PBFT-DPOA:拜占庭容错技术(Byzantine Fault Tolerance,BFT)是一类分布式计算领域的容错技术。拜占庭假设是对现实世界的模型化,由于硬件错误、网络拥塞或中断以及遭到恶意攻击等原因,计算机和网络可能出现不可预料的行为。拜占庭容错技术被设计用来处理这些异常行为,并满足所要解决的问题的规范要求。PBFT是Practical Byzantine Fault Tolerance的缩写,即:实用拜占庭容错算法。该算法是Miguel Castro(卡斯特罗)和Barbara Liskov(利斯科夫)在1999年提出来的,解决了原始拜占庭容错算法效率不高的问题。
S102、基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;
本发明实施例中,“共治根”通过从所述根域名共治链获取可信根区数据,提供根区解析功能。功能主要包括一是支持“共治根”通过“根域名共治链”上的数据分发节点同步根区的最新数据,二是共治根设计完全兼容当前递归解析服务模式,优选的,判断IANA中是否存在未备份TLD数据,判断过程可以基于标识、时间点或者其它优选的判断方法进行判断,本发明实施例中,对具体的判断过程不进行限定。若IANA中存在未备份TLD数据,通过从IANA补充TLD数据实现共治根架构的平滑演进;三 是支持DNSSEC功能。
S103、当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。
本发明实施例中,增强递归解析节点通过共治链获取顶级域名数据和域名黑白名单,快速应答用户的域名解析请求。其主要功能包括:根据域名黑白名单,快速应答用户的域名解析请求,加速递归域名解析性能;从根域名共治链中,实时获取链上的全局顶级域名数据和域名黑白名单;针对黑白名单未覆盖的域名解析请求,作为通用递归服务器,迭代查询顶级域名服务器。
解析过程如下:客户端向域名服务器也就是递归服务器查询。如果客户端所询问的递归服务器查询不知道被查询的域名的IP地址,那么递归服务器就以客户的身份,向共治根发出查询请求报文,并进行下一步查询。如果共治根本地没有被查询域名的顶级权威域的相关信息,将会向根域名共治链发起请求(在过渡时期,同时会问IANA发起请求),获取被查询域名的顶级权威域的相关信息。
递归服务获取到顶级权威域的IP信息,开始顶级权威域服务询问被查询的域名的IP地址,查询后把该域名的IP信息返回给客户端。
客户端获得查询域名IP信息,访问对应服务。
进一步的,顶级域管理机构通过自己的公私钥对发布自己的根域名和相关的资源记录,写入共治链中。共治根节点收到共治链中关于根域名记录变更通知,并更新自己本地相关记录。
本发明公开了一种基于共治链的域名解析方法,包括:确定各个数据 分发节点,基于所述各个数据分发节点构建根域名共治链;基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。上述的解析方法中,不再基于互联网数据分配机构进行集中管理,而是基于区块链技术构建了根域名共治链,所述根域名共治链采用去中心化的处理方式,各个节点平等,在对域名进行解析时,只需要在对应的节点中调整即可,避免了单点管理、中心化等风险。
本发明实施例中,通过“共治根”实现了平等开放、可扩展、可监管的新型根服务体系,通过“根域名共治链”实现了无中心化、各方参与、内生安全、可监管的共治根数据管理体系,根域名共治链通过链上数据分发节点为共治根提供安全可信的数据支撑。根域名共治链包含域名注册管理机构、多边协调委员会、安全与监管机构、数据数据分发节点、链上解析服务机构等,支持多边多方参与。
兼容当前域名系统协议与现存的海量基础设施以实现可部署实施:共治根的分阶段部署演进,一种潜在的模式:第一阶段是针对少数TLD的部署验证阶段,IANA数据作为补充;第二阶段是,共治根实现绝大多数ccTLD数据管理,IANA从共治根同步数据;第三阶段是共治根独立提供服务。
基于上述的一种基于共治链的域名解析方法,本发明实施例中还提供了一种基于共治链的域名解析装置,所述解析装置的结构框图如图5所示,包括:
确定和构建模块201、构建模块202和解析模块203。
其中,
所述确定和构建模块201,用于确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;
所述构建模块202,用于基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;
所述解析模块203,用于当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。
本发明公开了一种基于共治链的域名解析装置,包括:确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。上述的解析装置中,不再基于互联网数据分配机构进行集中管理,而是基于区块链技术构建了根域名共治链,所述根域名共治链采用去中心化的处理方式,各个节点平等,在对域名进行解析时,只需要在对应的节点中调整即可,避免了单点管理、中心化等风险。
本发明实施例中,所述确定和构建模块201包括:
确定单元204、获取单元205和备份单元206。
其中,
所述确定单元204,用于基于国家及地区顶级域名体系和通用顶级域名体系确定根域名共治链中各个数据分发节点;
所述获取单元205,用于获取顶级域数据、黑名单数据和白名单数据;
所述备份单元206,用于将所述顶级域名数据、所述黑名单数据和所述白名单数据备份到所述各个数据分发节点,构建所述根域名共治链。
本发明实施例中,所述构建模块202包括:
同步单元207、模式配置单元208和功能配置单元209。
其中,
所述同步单元207,用于将所述可信根区数据通过所述根域名共治链上的数据分发节点同步到所述共治根服务;
所述模式配置单元208,用于在所述共治根服务中设置递归解析服务模式;
所述功能配置单元209,用于在所述共治根服务中配置DNS安全扩展功能。
本发明实施例中,所述解析模块203包括:
获取单元210、第一发送单元211和获取和反馈单元212。
其中,
所述获取单元210,用于当接收到域名解析请求时,获取所述域名解析请求中包含的IP地址;
所述第一发送单元211,用于在递归服务器未查询到所述IP地址时,向所述共治根服务发送解析请求;
所述获取和反馈单元212,用于在所述共治根服务未查询到所述IP地址时,向所述根域名共治链发送解析请求,获取与所述IP地址关联的顶级权威域信息,反馈所述顶级权威域信息。
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置类实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含, 从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本发明时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本发明可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例或者实施例的某些部分所述的方法。
以上对本发明所提供的一种基于共治链的域名解析方法及装置进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。

Claims (10)

  1. 一种基于共治链的域名解析方法,其特征在于,包括:
    确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;
    基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;
    当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。
  2. 根据权利要求1所述的方法,其特征在于,确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链,包括:
    基于国家及地区顶级域名体系和通用顶级域名体系确定根域名共治链中各个数据分发节点;
    获取顶级域数据、黑名单数据和白名单数据;
    将所述顶级域名数据、所述黑名单数据和所述白名单数据备份到所述各个数据分发节点,构建所述根域名共治链。
  3. 根据权利要求1所述的方法,其特征在于,基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务,包括:
    将所述可信根区数据通过所述根域名共治链上的数据分发节点同步到所述共治根服务;
    在所述共治根服务中设置递归解析服务模式;
    在所述共治根服务中配置DNS安全扩展功能。
  4. 根据权利要求1所述的方法,其特征在于,当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析,包括:
    当接收到域名解析请求时,获取所述域名解析请求中包含的IP地址;
    在递归服务器未查询到所述IP地址时,向所述共治根服务发送解析请求;
    在所述共治根服务未查询到所述IP地址时,向所述根域名共治链发送解析请求,获取与所述IP地址关联的顶级权威域信息,反馈所述顶级权威域信息。
  5. 根据权利要求4所述的方法,其特征在于,还包括:
    在查询到所述IP地址时,获取与所述IP地址对应的服务。
  6. 根据权利要求1所述的方法,其特征在于,还包括:
    获取互联网数字分配机构中未备份数据;
    将所述未备份数据备份到所述根域名共治链中。
  7. 一种基于共治链的域名解析装置,其特征在于,包括:
    确定和构建模块,用于确定各个数据分发节点,基于所述各个数据分发节点构建根域名共治链;
    构建模块,用于基于所述根域名共治链获取可信根区数据,基于所述可信根区数据构建共治根服务;
    解析模块,用于当接收到域名解析请求时,采用递归解析模式基于所述共治根服务和所述根域名共治链中对应数据进行域名解析。
  8. 根据权利要求7所述的装置,其特征在于,所述确定和构建模块包括:
    确定单元,用于基于国家及地区顶级域名体系和通用顶级域名体系确定根域名共治链中各个数据分发节点;
    获取单元,用于获取顶级域数据、黑名单数据和白名单数据;
    备份单元,用于将所述顶级域名数据、所述黑名单数据和所述白名单数据备份到所述各个数据分发节点,构建所述根域名共治链。
  9. 根据权利要求7所述的装置,其特征在于,所述构建模块包括:
    同步单元,用于将所述可信根区数据通过所述根域名共治链上的数据分发节点同步到所述共治根服务;
    模式配置单元,用于在所述共治根服务中设置递归解析服务模式;
    功能配置单元,用于在所述共治根服务中配置DNS安全扩展功能。
  10. 根据权利要求7所述的装置,其特征在于,所述解析模块包括:
    获取单元,用于当接收到域名解析请求时,获取所述域名解析请求中包含的IP地址;
    第一发送单元,用于在递归服务器未查询到所述IP地址时,向所述共治根服务发送解析请求;
    获取和反馈单元,用于在所述共治根服务未查询到所述IP地址时,向所述根域名共治链发送解析请求,获取与所述IP地址关联的顶级权威域信息,反馈所述顶级权威域信息。
PCT/CN2020/121069 2020-09-30 2020-10-15 一种基于共治链的域名解析方法及装置 WO2022067888A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/250,225 US11558343B2 (en) 2020-09-30 2020-10-15 Method and apparatus for resolving domain name based on co-governance chain

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011057496.8A CN112134967B (zh) 2020-09-30 2020-09-30 一种基于共治链的域名解析方法及装置
CN202011057496.8 2020-09-30

Publications (1)

Publication Number Publication Date
WO2022067888A1 true WO2022067888A1 (zh) 2022-04-07

Family

ID=73843393

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/121069 WO2022067888A1 (zh) 2020-09-30 2020-10-15 一种基于共治链的域名解析方法及装置

Country Status (2)

Country Link
CN (1) CN112134967B (zh)
WO (1) WO2022067888A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738294B (zh) * 2020-12-30 2023-01-20 北京百度网讯科技有限公司 基于区块链的域名解析方法、装置、电子设备和存储介质
CN113132384B (zh) * 2021-04-20 2022-04-19 哈尔滨工业大学 一种去中心化dns根区管理系统
CN114553884B (zh) * 2022-01-24 2023-05-30 中国科学院计算技术研究所 一种基于按需建域的区块链跨链交互方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160191243A1 (en) * 2014-12-31 2016-06-30 William Manning Out-of-band validation of domain name system records
CN108833603A (zh) * 2018-05-28 2018-11-16 北京奇虎科技有限公司 一种基于区块链实现域名解析的方法、服务器和系统
CN109327562A (zh) * 2018-12-10 2019-02-12 中共中央办公厅电子科技学院 一种基于区块链的域名存储系统及方法
CN109672760A (zh) * 2019-02-14 2019-04-23 中国互联网络信息中心 基于区块链的dns根数据分发方法及系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957286B (zh) * 2014-04-18 2016-04-06 北京奇虎科技有限公司 Dns安全系统及其故障处理方法
WO2018176406A1 (zh) * 2017-03-31 2018-10-04 北京大学深圳研究生院 一种基于联盟链的顶级域名管理方法及系统
CN108064444B (zh) * 2017-04-19 2020-05-19 北京大学深圳研究生院 一种基于区块链的域名解析系统
CN107613041B (zh) * 2017-09-22 2020-06-05 中国互联网络信息中心 基于区块链的域名管理系统、域名管理方法和域名解析方法
CN108366138B (zh) * 2018-05-28 2021-10-26 北京奇虎科技有限公司 域名操作方法、系统及电子设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160191243A1 (en) * 2014-12-31 2016-06-30 William Manning Out-of-band validation of domain name system records
CN108833603A (zh) * 2018-05-28 2018-11-16 北京奇虎科技有限公司 一种基于区块链实现域名解析的方法、服务器和系统
CN109327562A (zh) * 2018-12-10 2019-02-12 中共中央办公厅电子科技学院 一种基于区块链的域名存储系统及方法
CN109672760A (zh) * 2019-02-14 2019-04-23 中国互联网络信息中心 基于区块链的dns根数据分发方法及系统

Also Published As

Publication number Publication date
CN112134967A (zh) 2020-12-25
CN112134967B (zh) 2022-06-28

Similar Documents

Publication Publication Date Title
WO2022067888A1 (zh) 一种基于共治链的域名解析方法及装置
CN108064444B (zh) 一种基于区块链的域名解析系统
CN108124502B (zh) 一种基于联盟链的顶级域名管理方法及系统
Liu et al. A data storage method based on blockchain for decentralization DNS
CN108449444B (zh) 区域数据传输方法、自循环域名解析系统及方法
Pinkas et al. Delegated path validation and delegated path discovery protocol requirements
US20040122958A1 (en) Method and system for peer-to-peer authorization
WO2021042785A1 (zh) 基于智能合约的域名管理系统
KR20090098791A (ko) 링 일관성을 유지하는 방법, 데이터 액세스 트랜잭션을 수행하는 방법, 연합 인프라 내의 복제 세트로부터 데이터에 액세스하는 시스템, 연합 인프라 내에 일관성있는 복제 세트를 설정 및 유지하는 방법
Aberer et al. Efficient, self-contained handling of identity in peer-to-peer systems
CN111917896B (zh) 一种可信的域名解析方法、系统、电子设备及存储介质
CN112468525B (zh) 一种基于区块链的域名管理系统
CN111200642B (zh) 权威dns服务器信息分发方法及系统
Zhang et al. Blockchain‐Based DNS Root Zone Management Decentralization for Internet of Things
CN111107179A (zh) 一种去中心化域名服务方法、数据采集方法和系统
US11558343B2 (en) Method and apparatus for resolving domain name based on co-governance chain
CN111343292B (zh) 权威dns服务器信息更新方法及系统
CN111193816A (zh) 权威dns服务器信息更新方法及系统
Chen et al. Big data architecture for scalable and trustful DNS based on sharded DAG blockchain
Hu et al. Blockzone: a decentralized and trustworthy data plane for DNS
Osterweil et al. Interadministrative challenges in managing dnskeys
CN111181950A (zh) 权威dns服务器授权方法及系统
Liu et al. Domain Name Service Mechanism Based on Master-Slave Chain.
Rezende et al. A distributed online certificate status protocol for named data networks
CN113438214B (zh) 一种域名管理系统

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 10-07-2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20955908

Country of ref document: EP

Kind code of ref document: A1