WO2022095428A1 - Anchor node falsification detection method and apparatus, and medium and device - Google Patents

Anchor node falsification detection method and apparatus, and medium and device Download PDF

Info

Publication number
WO2022095428A1
WO2022095428A1 PCT/CN2021/097125 CN2021097125W WO2022095428A1 WO 2022095428 A1 WO2022095428 A1 WO 2022095428A1 CN 2021097125 W CN2021097125 W CN 2021097125W WO 2022095428 A1 WO2022095428 A1 WO 2022095428A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
regional
block
anchor node
blocks
Prior art date
Application number
PCT/CN2021/097125
Other languages
French (fr)
Chinese (zh)
Inventor
薄辰龙
李宁
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2022095428A1 publication Critical patent/WO2022095428A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Definitions

  • the present application relates to the field of blockchain technology, and more particularly, the present application relates to a method, device, medium and device for false anchor node detection.
  • the Delegate Proof of Stake (DPoS) algorithm further improves the accounting speed.
  • the consensus speed of a single blockchain at this stage is still unable to effectively meet the actual social needs.
  • blockchain still has a large performance gap.
  • consortium chain is only for members of a specific group and limited third parties. It internally designates multiple pre-selected nodes as bookkeepers. The generation of each block is performed by all The preselected nodes decide jointly.
  • the present application provides a method for detecting fake anchor nodes in the consortium chain fragmentation consensus system.
  • the nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
  • the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
  • Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  • the present application can also provide an anchor node fraud detection device in a consortium chain fragmentation consensus system, including:
  • An anchor node selection module which is used for the nodes in each of the described area blocks P i to select the anchor nodes representing all the nodes of this area block P i by voting;
  • the sending module is used to send verification information from the anchor node of the regional block Pi to the anchor nodes of other regional blocks when a transaction initiator initiates a transaction in the regional block Pi;
  • the verification module is used for other regional blocks to vote and verify the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  • the present application can also provide a computer storage medium on which computer program instructions are stored, wherein, when the program instructions are executed by the processor, the program instructions are used to implement false detection of anchor nodes in the consortium chain fragmentation consensus system. the corresponding steps of the method;
  • the method includes:
  • the nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
  • the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
  • Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  • the present application also provides an electronic device, comprising a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor implements the computer program when executing the computer program.
  • the nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
  • the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
  • Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  • the present application provides a method for detecting fraudulent anchor nodes in a sharding consensus system to ensure the credibility of transaction initiators.
  • the efficiency of mutual communication between cross-domain blocks is greatly improved, and the technical problem that forged data is difficult to identify in the prior art is solved.
  • FIG. 1 shows a schematic flowchart of Embodiment 1 of the present application
  • FIG. 2 shows a schematic flowchart of Embodiment 2 of the present application
  • Embodiment 3 shows a schematic structural diagram of Embodiment 3 of the present application
  • FIG. 4 shows a schematic structural diagram of Embodiment 4 of the present application.
  • Blockchain is a distributed shared accounting technology. What it does is to enable all parties involved to establish a trust relationship at the technical level.
  • the blockchain can be roughly divided into the underlying technology of the blockchain and the upper-layer application of the blockchain.
  • the so-called application of blockchain refers to the application of transformation, optimization or innovation based on blockchain technology.
  • the core meaning of blockchain technology is to establish data credit between participants.
  • Bitcoin is the first application of blockchain technology, but the application of blockchain technology goes far beyond the financial industry.
  • the communication industry is also enthusiastic, especially in the field of telecom operators, and blockchain technology is becoming a new favorite.
  • Blockchain technology can be understood as the role of a network infrastructure similar to the TCP/IP protocol, and will be one of the key infrastructure elements to support the new Internet format characterized by peer-to-peer openness in the future, which will affect many industries.
  • the specific application form is just like the impact the Web has brought to various industries around the world.
  • This application provides an anchor node fraud detection method in a consortium chain fragmentation consensus system, including:
  • the geographic location area may be:
  • the voting announcement information broadcast by the voting initiator node in the blockchain network is received through the supervisory node, and the voting announcement information includes: voting qualification conditions, identification information of the supervisory node, information to be voted, voting deadline and voting rules.
  • the blockchain network includes the voting initiator node, the supervisory node, the accounting node and the node to be voted.
  • the initiator node of electronic voting can be any participating node in the blockchain network, that is to say, any participating node in the blockchain network can be used as the initiator node of a vote, and the initiator node can set the voting node to meet the requirements. eligibility conditions, and specific information to be voted on.
  • the supervisory node may be a database storing complete user identity information, and the supervisory node may generate the identity authentication information of the voting node according to the qualifications of the voting node.
  • the supervisory node can be a notarized third-party node. For example, when an anchor node representing an Asian block is selected, the supervisory node can be a database of Asian transaction parties.
  • the node to be voted can be any one or more participating nodes in the blockchain network.
  • the electronic voting initiator node broadcasts voting announcement information in the blockchain network, and the voting announcement information includes: voting qualification conditions, identification information of the supervisory node, information to be voted, voting deadline and voting rules.
  • the supervisory node receives the electronic voting announcement information, it extracts the voting qualification conditions from the electronic voting announcement information.
  • the supervisory node queries and obtains the blockchain public keys and/or blockchain identifiers of multiple anchor nodes eligible for voting according to the voting qualification conditions.
  • the supervisory node searches the database of the supervisory node for an anchor node that is eligible for voting, and further, obtains the blockchain public key and/or blockchain identification of the anchor node that is eligible for voting.
  • the supervisory node performs a private key signature on the blockchain public keys and/or blockchain identifiers of the plurality of voting nodes eligible for voting.
  • the supervisory node broadcasts the blockchain public keys and/or blockchain identifiers of the plurality of voting anchor nodes that are eligible for voting and signed by the private key in the blockchain network.
  • the anchor node of the region block P i sends a message containing the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other region blocks. verify message.
  • the first hash value after hashing the transaction information is encrypted with the private key of the area block Pi to obtain an encrypted signature, and the The signature and transaction information are used as the verification information, and the anchor node of the area block Pi sends the verification information including the transaction information and the signature to the anchor nodes of other area blocks.
  • the first hash value is encrypted with a private key by the region block that initiates the transaction, which effectively prevents the first hash value from being artificially tampered with during the transmission process of the verification information, resulting in the deviation of the credibility verification of the anchor node.
  • the verification information is verification information including the transaction information and the signature of the area block Pi , the signature needs to be decrypted before hash verification.
  • the other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value
  • a hash value is a string of fixed-length binary values, which is calculated by a hash algorithm (Hash algorithm).
  • a hash algorithm can map a binary value of any length to a shorter fixed-length binary value, and this small binary value is called a hash value.
  • a hash value is a unique and extremely compact numerical representation of a piece of data. If the data being hashed changes even one letter of the paragraph, subsequent hashes will yield different values.
  • the hash value of the data can verify the integrity of the data; generally used for fast lookup and encryption algorithms.
  • a hash value is a value obtained by calculating a piece of data through a hash algorithm. This value has two properties: one-way and unique.
  • the one-way and unique hash value is used for verification, which is efficient and secure, and will not have any impact on the original transaction data.
  • the hash value cannot be reversed to get the original data. For example, a number "1234" can be obtained by hashing the hash value A, but the original number "1234" can never be decrypted through the hash value A.
  • the strength of hash encryption is that no matter what the encrypted content is, as long as the content is consistent, the hash value is consistent. In this way, it is simple and efficient to compare whether the two pieces of information are consistent, without having to care about the details of the data.
  • the present application utilizes the one-way and unique characteristics of the hash value of the hash operation. If the result of the second hash value is the same as the first hash value, it indicates the transaction information before transmission and the received transaction information. It is the same, it is the original transaction information, and it is not considered to be tampered with, which ensures the security of the transaction.
  • the transaction initiator wants to initiate a transaction to other regional blocks P2 - PN in a node of the regional block P1, it needs to send transaction information to other regional blocks P2 - PN through the P1 anchor node of the regional block. In order to ensure the transaction information It is safe and reliable and will not be tampered with by the anchor node of the regional block P 1 , and needs to be verified before the actual transaction.
  • the verification process is: the anchor node of the regional block P1 sends the verification information including the virtual transaction information and the signature of the virtual transaction information encrypted by the hash algorithm and encrypted by the private key of the anchor node;
  • the verification information is broadcast to the anchor nodes of other regional blocks P2 - PN .
  • the anchor nodes of other regional blocks P2 - PN first use the public information of the anchor nodes of the regional block P1.
  • the key decrypts the signature to obtain the first hash value after the anchor node operation of the regional block P1, and the anchor nodes of other regional blocks P2 - PN perform hash operation on the virtual transaction information in the received verification information
  • the second hash value is obtained. If the value of the first hash value is the same as the second hash value, it means that the anchor node of the region block P1 is credible, and the transaction information has not been tampered with, and the transaction can be performed.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • Embodiment 1 The application can also make the following improvements on the technical solution of Embodiment 1:
  • the anchor node fraud detection method in the consortium chain sharding consensus system of this application also includes:
  • the anchor node of the current region block to be transacted is not credible, a new node will be re-voted as the anchor node representing the region block to ensure the reliability of the transaction.
  • the present application can also provide an anchor node fraud detection device in a consortium chain fragmentation consensus system, including:
  • the geographic location area may be:
  • Anchor node selection module 302 for each node in the area block P i to select the anchor node representing all the nodes of the area block P i by voting;
  • the sending module 303 is used to send verification information to the anchor nodes of other regional blocks from the anchor node of the regional block Pi when a transaction initiator initiates a transaction in the regional block Pi;
  • the anchor node of the region block P i sends the first message containing the transaction information and the hash operation of the transaction information to the anchor nodes of the other region blocks.
  • a hash value of verification information when the sending module 303 initiates a transaction in the region block Pi, the anchor node of the region block P i sends the first message containing the transaction information and the hash operation of the transaction information to the anchor nodes of the other region blocks.
  • the sending module 3030 encrypts the first hash value after hashing the transaction information with the private key of the region block P i to obtain the encrypted
  • the signature and the transaction information are used as the verification information, and the anchor node of the area block P i sends the verification information including the transaction information and the signature to the anchor nodes of other area blocks.
  • the first hash value is encrypted with a private key by the region block that initiates the transaction, which effectively prevents the first hash value from being artificially tampered with during the transmission process of the verification information, resulting in the deviation of the credibility verification of the anchor node.
  • the verification module 304 is used for other regional blocks to perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  • the verification module 304 performs a hash operation on the transaction information in other regions to obtain a second hash value
  • the verification information is verification information including the transaction information and the signature of the area block Pi , the signature needs to be decrypted before hash verification.
  • the other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value
  • the block module 301 provided in this application is connected to the anchor node selection module 302 , the sending module 303 and the verification module 304 in sequence.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • the present application can also provide a computer storage medium on which computer program instructions are stored, wherein, when the program instructions are executed by a processor, the program instructions are used to implement the steps corresponding to the anchor node fraud detection method in the alliance chain sharding consensus system;
  • the method includes:
  • the nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
  • the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
  • Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  • the anchor node of the area block Pi sends verification information to the anchor nodes of other area blocks, specifically including:
  • the anchor node of the regional block Pi sends the verification information including the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other regional blocks.
  • the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node
  • the process is specifically as follows:
  • the other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value
  • the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node
  • the process is specifically as follows:
  • the other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value
  • the computer storage medium of the present application can be implemented with semiconductor memory or magnetic core memory.
  • Mos and bipolar Semiconductor memory, the semiconductor memory elements mainly used in computers are mainly Mos and bipolar.
  • Mos components have high integration, simple process but slow speed.
  • Bipolar components have complex process, high power consumption, low integration but fast speed.
  • NMos and CMos After the advent of NMos and CMos, Mos memory began to occupy a dominant position in semiconductor memory.
  • NMos is fast, such as Intel's 1K-bit SRAM access time of 45ns.
  • the CMos consumes less power, and the 4K-bit CMos static memory access time is 300ns.
  • the above semiconductor memories are all random access memories (RAM), that is, new contents can be read and written randomly during the working process.
  • ROM semiconductor read-only memory
  • ROM can be randomly read but not written in the working process, it is used to store the solidified program and data.
  • ROM is divided into two types of non-rewritable fuse-type read-only memory ⁇ ⁇ PROM and rewritable read-only memory EPROM.
  • Magnetic core memory has the characteristics of low cost and high reliability, and has more than 20 years of practical experience. Before the mid-1970s, magnetic core memory was widely used as main memory. Its storage capacity can reach more than 10 bits, and the fastest access time is 300ns. The international typical magnetic core memory capacity is 4MS ⁇ 8MB, and the access cycle is 1.0 ⁇ 1.5 ⁇ s. After the rapid development of semiconductor storage to replace the magnetic core memory as the main memory, the magnetic core memory can still be used as a large-capacity expansion memory.
  • Embodiment 5 is a diagrammatic representation of Embodiment 5:
  • the present application also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor implements the following steps when executing the computer program:
  • the nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
  • the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
  • Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  • the anchor node of the area block Pi sends verification information to the anchor nodes of other area blocks, specifically including:
  • the anchor node of the regional block Pi sends the verification information including the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other regional blocks.
  • the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node
  • the process is specifically as follows:
  • the other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value
  • the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node
  • the process is specifically as follows:
  • the other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value
  • FIG. 4 is a schematic diagram of the internal structure of an electronic device in one embodiment.
  • the electronic device includes a processor, a storage medium, a memory, and a network interface connected through a system bus.
  • the storage medium of the computer device stores an operating system, a database and computer-readable instructions
  • the database can store a control information sequence
  • the processor can be made to realize a kind of alliance chain distribution.
  • the processor of the electrical equipment is used to provide computing and control capabilities and support the operation of the entire computer equipment.
  • Computer-readable instructions may be stored in the memory of the computer device, and when the computer-readable instructions are executed by the processor, the processor may execute a method for detecting fake anchor nodes in a consortium chain sharding consensus system.
  • the network interface of the computer equipment is used for communication with the terminal connection.
  • the electronic devices include, but are not limited to, smart phones, computers, tablet computers, wearable smart devices, artificial intelligence devices, power banks, and the like.
  • the processor may be composed of integrated circuits, such as a single packaged integrated circuit, or a plurality of integrated circuits packaged with the same function or different functions, including one or more central Processor (Central Processing unit, CPU), microprocessor, digital processing chip, graphics processor and combination of various control chips, etc.
  • the processor is the control core (Control Unit) of the electronic device, and uses various interfaces and lines to connect various components of the entire electronic device, by running or executing programs or modules stored in the memory (for example, executing a remote control unit). data reading and writing programs, etc.), and call data stored in the memory to perform various functions of the electronic device and process data.
  • Control Unit Control Unit
  • the bus may be a peripheral component interconnect (PCI for short) bus or an extended industry standard architecture (Extended industry standard architecture, EISA for short) bus or the like.
  • PCI peripheral component interconnect
  • EISA Extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on.
  • the bus is configured to enable connection communication between the memory and at least one processor or the like.
  • FIG. 4 only shows an electronic device with components. Those skilled in the art can understand that the structure shown in FIG. 4 does not constitute a limitation on the electronic device, and may include fewer or more components than those shown in the drawings. , or a combination of certain components, or a different arrangement of components.
  • the electronic device may also include a power source (such as a battery) for powering the various components, preferably, the power source may be logically connected to the at least one processor through a power management device, so as to be implemented by the power management device Charge management, discharge management, and power management functions.
  • the power source may also include one or more DC or AC power sources, recharging devices, power failure detection circuits, power converters or inverters, power status indicators, and any other components.
  • the electronic device may further include various sensors, Bluetooth modules, Wi-Fi modules, etc., which will not be repeated here.
  • the electronic device may also include a network interface, optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.) Establish a communication connection between other electronic devices.
  • a network interface optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.) Establish a communication connection between other electronic devices.
  • the electronic device may further include a user interface
  • the user interface may be a display (Display), an input unit (such as a keyboard (Keyboard)), optionally, the user interface may also be a standard wired interface or a wireless interface.
  • the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode, organic light-emitting diode) touch device, and the like.
  • the display may also be appropriately called a display screen or a display unit, which is used for displaying information processed in the electronic device and for displaying a visual user interface.
  • the computer usable storage medium may mainly include a stored program area and a stored data area, wherein the stored program area may store an operating system, an application program required for at least one function, and the like; using the created data, etc.
  • modules described as separate components may or may not be physically separated, and components shown as modules may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional module in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware, or can be implemented in the form of hardware plus software function modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

An anchor node falsification detection method and apparatus, and a medium and a device, which relate to the technical field of blockchains. The method comprises: dividing a blockchain network into N regional blocks Pi (S1), wherein i = 1, 2, …, N, N being an integer greater than 2; for nodes in each of the regional blocks Pi, selecting, by voting, an anchor node which represents all nodes in the regional block Pi (S2); when a transaction initiator initiates a transaction in the regional block Pi, the anchor node of the regional block Pi sending verification information to anchor nodes of the other regional blocks (S3); and the other regional blocks performing voting verification on the verification information of the transaction initiator, and the result of the voting verification determining whether the anchor node of the regional block Pi where the transaction initiator initiates a transaction is a trusted anchor node (S4). By means of the method, the credibility of a transaction initiator is guaranteed, the efficiency of communication between cross-region blocks is greatly improved, and the problem in the prior art of it being difficult to identify falsified data is solved.

Description

一种锚节点作假检测方法、装置、介质及设备An anchor node fraud detection method, device, medium and equipment 技术领域technical field
本申请涉及区块链技术领域,更为具体来说,本申请涉及一种锚节点作假检测方法、装置、介质及设备。The present application relates to the field of blockchain technology, and more particularly, the present application relates to a method, device, medium and device for false anchor node detection.
背景技术Background technique
2008年,中本聪提出比特币,随着近年来的快速发展,作为其底层技术核心的区块链也随之进入人们的视线中。作为区块链技术核心的共识机制目前已经引起政府部门、金融机构、科技企业和资本市场的高度重视与广泛关注。在相关共识算法的研究中,工作量证明(Proof of Work,PoW)自比特币问世以来现已成为P2P电子货币的主流思想,其通过算力竞争来保证全网信息的可靠性,但存在较为严重的算力浪费问题。因此,部分Bitcointalk论坛中的数字货币爱好者提出了权益证明(Proof of Stake,PoS),通过引入币龄来大幅度降低资源消耗,在此基础上,Larimer团队在2014年3月提出了股份授权证明(Delegate Proof of Stake,DPoS)算法进一步提升记账速度。但现阶段单一区块链的共识速度任然无法有效满足实际社会需求。相较于传统的中心化结算系统每秒万笔以上的吞吐量,区块链仍有较大的性能差距。In 2008, Satoshi Nakamoto proposed Bitcoin. With the rapid development in recent years, the blockchain as the core of its underlying technology has also entered people's attention. As the core of blockchain technology, the consensus mechanism has attracted great attention and widespread attention from government departments, financial institutions, technology companies and capital markets. In the research of relevant consensus algorithms, Proof of Work (PoW) has become the mainstream idea of P2P electronic currency since the advent of Bitcoin. It ensures the reliability of the entire network information through computing power competition, but there are relatively Serious waste of computing power. Therefore, some digital currency enthusiasts in the Bitcointalk forum proposed Proof of Stake (PoS) to greatly reduce resource consumption by introducing currency age. On this basis, the Larimer team proposed a share authorization in March 2014. The Delegate Proof of Stake (DPoS) algorithm further improves the accounting speed. However, the consensus speed of a single blockchain at this stage is still unable to effectively meet the actual social needs. Compared with the throughput of more than 10,000 transactions per second in traditional centralized settlement systems, blockchain still has a large performance gap.
而现有技术中,提出了联盟链的概念,联盟链,只针对某个特定群体的成员和有限的第三方,其内部指定多个预选节点为记账人,每个块的生成由所有的预选节点共同决定。In the prior art, the concept of consortium chain is proposed. Consortium chain is only for members of a specific group and limited third parties. It internally designates multiple pre-selected nodes as bookkeepers. The generation of each block is performed by all The preselected nodes decide jointly.
发明人注意到对于联盟链而言,由于联盟链上的各节点独立工作,传输路径和验证手段较为复杂,导致数据传输的时效性非常差,由此带来伪造数据难以识别的技术问题。The inventor noticed that for the consortium chain, since each node on the consortium chain works independently, the transmission paths and verification methods are relatively complex, resulting in very poor timeliness of data transmission, which brings about the technical problem of difficult identification of forged data.
发明内容SUMMARY OF THE INVENTION
为解决现有技术的联盟链上各节点独立工作,传输路径和验证手段复杂,导致的伪造数据难以识别的技术问题,本申请提供了一种联盟链分片共识系统中锚节点作假检测方法,包括:In order to solve the technical problem that the nodes on the consortium chain in the prior art work independently, the transmission paths and verification methods are complex, and the forged data is difficult to identify, the present application provides a method for detecting fake anchor nodes in the consortium chain fragmentation consensus system. include:
将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i的锚节点是否为可信锚节点。 Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
为实现上述技术目的,本申请还能够提供一种联盟链分片共识系统中锚节点作假检测装置,包括:In order to achieve the above technical purpose, the present application can also provide an anchor node fraud detection device in a consortium chain fragmentation consensus system, including:
分块模块,用于将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; The block module is used to divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
锚节点选取模块,用于各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; An anchor node selection module, which is used for the nodes in each of the described area blocks P i to select the anchor nodes representing all the nodes of this area block P i by voting;
发送模块,用于当有交易发起人在地域块P i发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息; The sending module is used to send verification information from the anchor node of the regional block Pi to the anchor nodes of other regional blocks when a transaction initiator initiates a transaction in the regional block Pi;
验证模块,用于其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i是否为可信锚节点。 The verification module is used for other regional blocks to vote and verify the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
为实现上述技术目的,本申请还能够提供一种计算机存储介质,其上存储有计算机程序指令,其中,所述程序指令被处理器执行时用于实现联盟链分片共识系统中锚节点作假检测方法对应的步骤;In order to achieve the above technical purpose, the present application can also provide a computer storage medium on which computer program instructions are stored, wherein, when the program instructions are executed by the processor, the program instructions are used to implement false detection of anchor nodes in the consortium chain fragmentation consensus system. the corresponding steps of the method;
所述方法包括:The method includes:
将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i的锚节点是否为可信锚节点。 Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
为实现上述技术目的,本申请还提供了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如下步骤:To achieve the above technical purpose, the present application also provides an electronic device, comprising a memory, a processor, and a computer program stored in the memory and running on the processor, wherein the processor implements the computer program when executing the computer program. Follow the steps below:
将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi的锚节点是否为可信锚节点。Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
本申请的有益效果为:The beneficial effects of this application are:
本申请提供了一种分片共识系统中锚节点作假的检验方法,保证交易发起人的可信度。极大的提高了跨域区块之间的相互通信的效率,解决了现有技术伪造数据难以识别的技术问题。The present application provides a method for detecting fraudulent anchor nodes in a sharding consensus system to ensure the credibility of transaction initiators. The efficiency of mutual communication between cross-domain blocks is greatly improved, and the technical problem that forged data is difficult to identify in the prior art is solved.
附图说明Description of drawings
图1示出了本申请的实施例1的流程示意图;FIG. 1 shows a schematic flowchart of Embodiment 1 of the present application;
图2示出了本申请的实施例2的流程示意图;FIG. 2 shows a schematic flowchart of Embodiment 2 of the present application;
图3示出了本申请的实施例3的结构示意图;3 shows a schematic structural diagram of Embodiment 3 of the present application;
图4示出了本申请的实施例4的结构示意图。FIG. 4 shows a schematic structural diagram of Embodiment 4 of the present application.
具体实施方式Detailed ways
以下,将参照附图来描述本申请的实施例。但是应该理解,这些描述只是示例性的,而并非要限制本申请的范围。此外,在以下说明中,省略了对公知结构和技术的描述,以避免不必要地混淆本申请的概念。Hereinafter, embodiments of the present application will be described with reference to the accompanying drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the application. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present application.
在附图中示出了根据本申请实施例的各种结构示意图。这些图并非是按比例绘制的,其中为了清楚表达的目的,放大了某些细节,并且可能省略了某些细节。图中所示出的各种区域、层的形状以及它们之间的相对大小、位置关系仅是示例性的,实际中可能由于制造公差或技术限制而有所偏差,并且本领域技术人员根据实际所需可以另外设计具有不同形状、大小、相对位置的区域/层。Various schematic diagrams of structures according to embodiments of the present application are shown in the accompanying drawings. The figures are not to scale, some details have been exaggerated for clarity, and some details may have been omitted. The shapes of the various regions and layers shown in the figures, as well as their relative sizes and positional relationships are only exemplary, and in practice, there may be deviations due to manufacturing tolerances or technical limitations, and those skilled in the art should Regions/layers with different shapes, sizes, relative positions can be additionally designed as desired.
区块链(Block chain)是一种分布式共享记账的技术,它要做的事情就是让参与的各方能够在技术层面建立信任关系。区块链可以大致分成区块链底层技术和区块链上层应用。所谓区块链的应用,就是基于区块链技术的改造、优化或者创新等应用。区块链技术最为核心的意义是参与方之间建立数据信用。Blockchain is a distributed shared accounting technology. What it does is to enable all parties involved to establish a trust relationship at the technical level. The blockchain can be roughly divided into the underlying technology of the blockchain and the upper-layer application of the blockchain. The so-called application of blockchain refers to the application of transformation, optimization or innovation based on blockchain technology. The core meaning of blockchain technology is to establish data credit between participants.
比特币是区块链技术的第一个应用,但区块链技术的应用领域远不止金融行业。通信业者同样投以热情,特别是电信运营商领域,区块链技术正在成为新宠。区块链技术可以理解为类似TCP/IP协议这样的一种网络基础设施的角色,将是支撑未来以对等开放为特征的新型互联网业态的关键设施要素之一,进而影响到众多行业领域的具体应用形态,就像Web带给全世界各行业的影响一样。Bitcoin is the first application of blockchain technology, but the application of blockchain technology goes far beyond the financial industry. The communication industry is also enthusiastic, especially in the field of telecom operators, and blockchain technology is becoming a new favorite. Blockchain technology can be understood as the role of a network infrastructure similar to the TCP/IP protocol, and will be one of the key infrastructure elements to support the new Internet format characterized by peer-to-peer openness in the future, which will affect many industries. The specific application form is just like the impact the Web has brought to various industries around the world.
在通信领域,传统方式下的信息都是通过点对点传输来完成,这使得追踪者可以通过追踪信息传输的路径来拦截信息,这就带来了一个安全问题,由此也就产生了保障信息传输路径绝对安全的迫切需求。区块链技术的原理可能正好可以帮助解决这一问题。区块链在通信领域的全新应用可以完全改变信息传输的渠道,从根本上解决信息传递的 路径安全问题,区块链技术为未来通信信息传递模式的改变打开了一扇大门。In the field of communication, information in the traditional way is completed through point-to-point transmission, which allows the tracker to intercept the information by tracking the path of information transmission, which brings a security problem, which leads to the guarantee of information transmission. The urgent need for absolute safety of the path. The principles of blockchain technology may be just right to help solve this problem. The new application of block chain in the field of communication can completely change the channel of information transmission, and fundamentally solve the problem of path security of information transmission.
实施例一:Example 1:
如图1所示:As shown in Figure 1:
本申请提供了一种联盟链分片共识系统中锚节点作假检测方法,包括:This application provides an anchor node fraud detection method in a consortium chain fragmentation consensus system, including:
S1:将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数。 S1: Divide the blockchain network into N regional blocks Pi, i =1, 2..., N, where N is an integer greater than 2.
优选的,可以按照地理位置区域将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Preferably, the blockchain network can be divided into N geographic blocks P i according to geographic location areas, i=1, 2..., N, where N is an integer greater than 2;
所述地理位置区域可以是:The geographic location area may be:
将全球区块链网络按照地理位置区域划分为4个地域块:欧洲块、亚洲块、美洲块和其他地域块。Divide the global blockchain network into 4 geographic blocks according to geographic regions: Europe block, Asia block, America block and other geographic blocks.
S2:各个所述地域块P i中的节点经投票选出代表该地域块Pi全部节点的锚节点; S2: The nodes in each of the geographical blocks Pi are voted to select anchor nodes representing all the nodes of the geographical block Pi;
具体地,specifically,
通过监督节点接收投票发起方节点在区块链网络中广播的投票公告信息,所述投票公告信息包括∶投票资格条件、所述监督节点的标识信息、待投票信息、投票截止时间和投票规则。The voting announcement information broadcast by the voting initiator node in the blockchain network is received through the supervisory node, and the voting announcement information includes: voting qualification conditions, identification information of the supervisory node, information to be voted, voting deadline and voting rules.
所述区块链网络包括所述投票发起方节点、所述监督节点、记账节点和待投票的节点。The blockchain network includes the voting initiator node, the supervisory node, the accounting node and the node to be voted.
电子投票发起方节点可以是区块链网络中任意的参与节点,也就是说,区块链网络中任意的参与节点可作为一次投票的发起方节点,该发起方节点可设定投票节点需要满足的资格条件、以及具体的待投票信息。The initiator node of electronic voting can be any participating node in the blockchain network, that is to say, any participating node in the blockchain network can be used as the initiator node of a vote, and the initiator node can set the voting node to meet the requirements. eligibility conditions, and specific information to be voted on.
监督节点具体可以是存储有完备的用户身份信息的数据库,监督节点可根据投票节点的资格条件生成投票节点的身份认证信息。该监督节点具体可以是公证的第三方节点,例如选出代表亚洲区块的锚节点时,监督节点可以是亚洲交易方的数据库。Specifically, the supervisory node may be a database storing complete user identity information, and the supervisory node may generate the identity authentication information of the voting node according to the qualifications of the voting node. Specifically, the supervisory node can be a notarized third-party node. For example, when an anchor node representing an Asian block is selected, the supervisory node can be a database of Asian transaction parties.
待投票的节点可以是区块链网络中任意的一个或多个参与节点。The node to be voted can be any one or more participating nodes in the blockchain network.
具体的,电子投票发起方节点在区块链网络中广播投票公告信息,所述投票公告信息包括∶投票资格条件、所述监督节点的标识信息、待投票信息、投票截止时间和投票规则。当监督节点接收到该电子投票公告信息后,从该电子投票公告信息中提取投票资格条件。Specifically, the electronic voting initiator node broadcasts voting announcement information in the blockchain network, and the voting announcement information includes: voting qualification conditions, identification information of the supervisory node, information to be voted, voting deadline and voting rules. When the supervisory node receives the electronic voting announcement information, it extracts the voting qualification conditions from the electronic voting announcement information.
所述监督节点根据所述投票资格条件,查询获得多个符合投票资格的锚节点的区块链公钥和/或区块链标识。The supervisory node queries and obtains the blockchain public keys and/or blockchain identifiers of multiple anchor nodes eligible for voting according to the voting qualification conditions.
该监督节点根据该投票资格条件,并在该监督节点的数据库中查询符合投票资格的锚节点,进一步,查询获得该符合投票资格的锚节点的区块链公钥和/或区块链标识。According to the voting qualification conditions, the supervisory node searches the database of the supervisory node for an anchor node that is eligible for voting, and further, obtains the blockchain public key and/or blockchain identification of the anchor node that is eligible for voting.
所述监督节点对所述多个符合投票资格的投票节点的区块链公钥和/或区块链标识进行私钥签名。The supervisory node performs a private key signature on the blockchain public keys and/or blockchain identifiers of the plurality of voting nodes eligible for voting.
所述监督节点将私钥签名后的所述多个符合投票资格的投票选出的锚节点的区块链公钥和/或区块链标识广播在区块链网络中。The supervisory node broadcasts the blockchain public keys and/or blockchain identifiers of the plurality of voting anchor nodes that are eligible for voting and signed by the private key in the blockchain network.
S3:当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; S3: When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
具体地,当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出包含交易信息以及交易信息经哈希运算后的第一哈希值的验证信息。 Specifically, when a transaction initiator initiates a transaction in the region block P i , the anchor node of the region block P i sends a message containing the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other region blocks. verify message.
优选地,当有交易发起人在地域块P i发起交易时,对交易信息进行哈希运算后的第一哈希值用地域块P i的私钥进行加密得到加密后的签名,将所述签名和交易信息作为所述验证信息,地域块P i的锚节点向其他地域块的锚节点发出包含交易信息以及所述签名的验证信息。 Preferably, when a transaction initiator initiates a transaction in the area block Pi, the first hash value after hashing the transaction information is encrypted with the private key of the area block Pi to obtain an encrypted signature, and the The signature and transaction information are used as the verification information, and the anchor node of the area block Pi sends the verification information including the transaction information and the signature to the anchor nodes of other area blocks.
上述优选技术方案的有益效果是:The beneficial effects of the above-mentioned preferred technical scheme are:
发起交易的地域块对第一哈希值进行一次私钥加密,有效防止了验证信息在传输过程中,第一哈希值被人为篡改导致锚节点可信度验证的偏差。The first hash value is encrypted with a private key by the region block that initiates the transaction, which effectively prevents the first hash value from being artificially tampered with during the transmission process of the verification information, resulting in the deviation of the credibility verification of the anchor node.
S4:其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i的锚节点是否为可信锚节点。 S4: other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
具体地,其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;Specifically, other regional blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块P i为可信锚节点。 Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
优选地,若所述验证信息为包含了交易信息和地域块P i的签名的验证信息,进行哈希校验前还需对所述签名进行解密。 Preferably, if the verification information is verification information including the transaction information and the signature of the area block Pi , the signature needs to be decrypted before hash verification.
其他地域块分别用所述地域块P i的公钥对所述签名进行解密得到所述第一哈希值; Other area blocks respectively use the public key of the area block P i to decrypt the signature to obtain the first hash value;
其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块P i的锚节点为可信锚节点。 Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
哈希值是一串固定长度的二进制数值,它是哈希算法(Hash算法)计算的出来的。A hash value is a string of fixed-length binary values, which is calculated by a hash algorithm (Hash algorithm).
哈希算法可以将任意长度的二进制值映射为较短的固定长度的二进制值,这个小的二进制值称为哈希值。哈希值是一段数据唯一且极其紧凑的数值表示形式。如果进行哈希运算的数据哪怕只更改该段落的一个字母,随后的哈希都将产生不同的值。A hash algorithm can map a binary value of any length to a shorter fixed-length binary value, and this small binary value is called a hash value. A hash value is a unique and extremely compact numerical representation of a piece of data. If the data being hashed changes even one letter of the paragraph, subsequent hashes will yield different values.
要找到哈希值为同一个值的两个不同的输入,在计算上是不可能的,所以数据的哈希值可以检验数据的完整性;一般用于快速查找和加密算法。It is computationally impossible to find two different inputs with the same hash value, so the hash value of the data can verify the integrity of the data; generally used for fast lookup and encryption algorithms.
哈希值就是通过哈希算法将一段数据进行计算,得出的一个数值。这个数值它有两个特性:单向性和唯一性。A hash value is a value obtained by calculating a piece of data through a hash algorithm. This value has two properties: one-way and unique.
采用具有单向性和唯一性的哈希值来进行验证,既高效又安全,也不会对交易原始数据产生任何影响。The one-way and unique hash value is used for verification, which is efficient and secure, and will not have any impact on the original transaction data.
单向性Unidirectional
哈希值是无法通过反向运算得出原始数据的。比如一段数字“1234”可以通过哈希算法得出哈希值A,但是通过哈希值A是永远也没有办法解密出原始数字“1234”的。The hash value cannot be reversed to get the original data. For example, a number "1234" can be obtained by hashing the hash value A, but the original number "1234" can never be decrypted through the hash value A.
唯一性uniqueness
只有完全相同的数据进行哈希计算得到的哈希值才是相同的,也就是说哈希值和原始数据是唯一对应的,不存在两个不一样的数据得出相同哈希值这种情况。Only the hash value obtained by hashing the exact same data is the same, that is to say, the hash value and the original data are uniquely corresponding, and there is no such situation that the same hash value is obtained from two different data .
哈希加密的强大之处在于,无论加密的内容是什么,只要内容一致得出哈希值就是一致的。这样就可以简单高效的对比两条信息是否一致,而不需要去关心数据的细节是什么。The strength of hash encryption is that no matter what the encrypted content is, as long as the content is consistent, the hash value is consistent. In this way, it is simple and efficient to compare whether the two pieces of information are consistent, without having to care about the details of the data.
本申请利用了哈希运算的哈希值具有单向性和唯一性的特性,若第二哈希值的结果和第一哈希值相同,则说明传输前的交易信息和接收到的交易信息是相同的,都是原始交易信息,未被认为篡改,保障了交易的安全性。The present application utilizes the one-way and unique characteristics of the hash value of the hash operation. If the result of the second hash value is the same as the first hash value, it indicates the transaction information before transmission and the received transaction information. It is the same, it is the original transaction information, and it is not considered to be tampered with, which ensures the security of the transaction.
下面结合一个具体实例详解本申请的技术方案:The technical solution of the present application is explained in detail below in conjunction with a specific example:
交易发起人在地域块P 1的一个节点要向其他地域块P 2-P N发起交易,需要通过地域块的P 1锚节点向其他地域块P 2-P N发送交易信息,为了保证交易信息的安全可靠不被地域块P 1的锚节点所篡改,在进行实际交易前需要进行验证。 If the transaction initiator wants to initiate a transaction to other regional blocks P2 - PN in a node of the regional block P1, it needs to send transaction information to other regional blocks P2 - PN through the P1 anchor node of the regional block. In order to ensure the transaction information It is safe and reliable and will not be tampered with by the anchor node of the regional block P 1 , and needs to be verified before the actual transaction.
验证过程为:地域块P 1的锚节点发送包含虚拟交易信息以及所述虚拟交易信息经哈希算法加密后并通过所述锚节点的私钥加密后的签名的验证信息; The verification process is: the anchor node of the regional block P1 sends the verification information including the virtual transaction information and the signature of the virtual transaction information encrypted by the hash algorithm and encrypted by the private key of the anchor node;
所述验证信息经过广播传播给其他地域块P 2-P N的锚节点,其他地域块P 2-P N的锚节点收到所述验证信息后,先利用地域块P 1的锚节点的公钥对所述签名进行解密得到地域块P 1的锚节点运算后的第一哈希值,其他地域块P 2-P N的锚节点对接收到的验证信息中的虚拟交易信息进行哈希运算得到第二哈希值,若第一哈希值的数值和第二哈希值相同则说 明地域块P 1的锚节点可信,未对交易信息进行篡改,可以进行交易。 The verification information is broadcast to the anchor nodes of other regional blocks P2 - PN . After receiving the verification information, the anchor nodes of other regional blocks P2 - PN first use the public information of the anchor nodes of the regional block P1. The key decrypts the signature to obtain the first hash value after the anchor node operation of the regional block P1, and the anchor nodes of other regional blocks P2 - PN perform hash operation on the virtual transaction information in the received verification information The second hash value is obtained. If the value of the first hash value is the same as the second hash value, it means that the anchor node of the region block P1 is credible, and the transaction information has not been tampered with, and the transaction can be performed.
实施例二:Embodiment 2:
本申请还可以在实施例一的技术方案上做如下改进:The application can also make the following improvements on the technical solution of Embodiment 1:
本申请的联盟链分片共识系统中锚节点作假检测方法还包括:The anchor node fraud detection method in the consortium chain sharding consensus system of this application also includes:
S5:若发起交易的地域块P i的锚节点为不可信锚节点,则所述地域块P i重新投票选出一个新的节点作为代表该地域块P i的锚节点。 S5: If the anchor node of the region block P i that initiates the transaction is an untrusted anchor node, the region block P i re-votes to elect a new node as the anchor node representing the region block P i .
上述技术方案的有益效果是:The beneficial effects of the above technical solutions are:
若当前将要进行交易的地域块的锚节点不可信,则重新投票选择以一个新的节点作为代表该地域块的锚节点,保证了交易的可靠性。If the anchor node of the current region block to be transacted is not credible, a new node will be re-voted as the anchor node representing the region block to ensure the reliability of the transaction.
实施例三:Embodiment three:
如图3所示,As shown in Figure 3,
本申请还能够提供一种联盟链分片共识系统中锚节点作假检测装置,包括:The present application can also provide an anchor node fraud detection device in a consortium chain fragmentation consensus system, including:
分块模块301,用于将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; The block module 301 is used to divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
优选地,可以按照地理位置区域将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Preferably, the blockchain network can be divided into N geographic blocks P i according to geographic locations, i=1, 2..., N, where N is an integer greater than 2;
所述地理位置区域可以是:The geographic location area may be:
将全球区块链网络按照地理位置区域划分为4个地域块:欧洲块、亚洲块、美洲块和其他地域块。Divide the global blockchain network into 4 geographic blocks according to geographic regions: Europe block, Asia block, America block and other geographic blocks.
锚节点选取模块302,用于各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; Anchor node selection module 302, for each node in the area block P i to select the anchor node representing all the nodes of the area block P i by voting;
发送模块303,用于当有交易发起人在地域块P i发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息; The sending module 303 is used to send verification information to the anchor nodes of other regional blocks from the anchor node of the regional block Pi when a transaction initiator initiates a transaction in the regional block Pi;
具体地,所述发送模块303当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出包含交易信息以及交易信息经哈希运算后的第一哈希值的验证信息。 Specifically, when the sending module 303 initiates a transaction in the region block Pi, the anchor node of the region block P i sends the first message containing the transaction information and the hash operation of the transaction information to the anchor nodes of the other region blocks. A hash value of verification information.
优选地,所述发送模块3030当有交易发起人在地域块P i发起交易时,对交易信息进行哈希运算后的第一哈希值用地域块P i的私钥进行加密得到加密后的签名,将所述签名和交易信息作为所述验证信息,地域块P i的锚节点向其他地域块的锚节点发出包含交易信息以及所述签名的验证信息。 Preferably, the sending module 3030 encrypts the first hash value after hashing the transaction information with the private key of the region block P i to obtain the encrypted The signature and the transaction information are used as the verification information, and the anchor node of the area block P i sends the verification information including the transaction information and the signature to the anchor nodes of other area blocks.
上述优选技术方案的有益效果是:The beneficial effects of the above-mentioned preferred technical scheme are:
发起交易的地域块对第一哈希值进行一次私钥加密,有效防止了验证信息在传输过程中,第一哈希值被人为篡改导致锚节点可信度验证的偏差。The first hash value is encrypted with a private key by the region block that initiates the transaction, which effectively prevents the first hash value from being artificially tampered with during the transmission process of the verification information, resulting in the deviation of the credibility verification of the anchor node.
验证模块304,用于其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i是否为可信锚节点。 The verification module 304 is used for other regional blocks to perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
具体地,所述验证模块304在其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;Specifically, the verification module 304 performs a hash operation on the transaction information in other regions to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块P i为可信锚节点。 Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
优选地,若所述验证信息为包含了交易信息和地域块P i的签名的验证信息,进行哈希校验前还需对所述签名进行解密。 Preferably, if the verification information is verification information including the transaction information and the signature of the area block Pi , the signature needs to be decrypted before hash verification.
其他地域块分别用所述地域块P i的公钥对所述签名进行解密得到所述第一哈希值; Other area blocks respectively use the public key of the area block P i to decrypt the signature to obtain the first hash value;
其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块P i的锚节点为可信锚节点。 Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
其中,本申请所提供的所述分块模块301依次与所述锚节点选取模块302、所述发送模块303以及所述验证模块304相连接。Wherein, the block module 301 provided in this application is connected to the anchor node selection module 302 , the sending module 303 and the verification module 304 in sequence.
实施例四:Embodiment 4:
本申请还能够提供一种计算机存储介质,其上存储有计算机程序指令,其中,所述程序指令被处理器执行时用于实现联盟链分片共识系统中锚节点作假检测方法对应的步骤;The present application can also provide a computer storage medium on which computer program instructions are stored, wherein, when the program instructions are executed by a processor, the program instructions are used to implement the steps corresponding to the anchor node fraud detection method in the alliance chain sharding consensus system;
所述方法包括:The method includes:
将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i的锚节点是否为可信锚节点。 Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
进一步,所述当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息,具体包括:Further, when a transaction initiator initiates a transaction in the area block Pi, the anchor node of the area block Pi sends verification information to the anchor nodes of other area blocks, specifically including:
当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出包含交易信息以及交易信息经哈希运算后的第一哈希值的验证信息。When a transaction initiator initiates a transaction in the regional block Pi, the anchor node of the regional block Pi sends the verification information including the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other regional blocks.
进一步,对所述哈希运算后的第一哈希值用地域块Pi的私钥进行加密得到加密后的签名,所述签名和交易信息作为所述验证信息。Further, encrypting the first hash value after the hash operation with the private key of the area block Pi to obtain an encrypted signature, and the signature and transaction information are used as the verification information.
进一步,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:Further, the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node The process is specifically as follows:
其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
进一步,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:Further, the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node The process is specifically as follows:
其他地域块分别用所述地域块Pi的公钥对所述签名进行解密得到所述第一哈希值;Other area blocks respectively use the public key of the area block Pi to decrypt the signature to obtain the first hash value;
其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
进一步,所述将区块链网络划分为N个地域块Pi具体为:Further, the division of the blockchain network into N regional blocks Pi is specifically:
将全部区块链网络中的节点按照节点所处的地理位置划分为N个地域块Pi、i=1,2,……,N,其中N为大于2的整数。The nodes in the entire blockchain network are divided into N regional blocks Pi, i=1, 2, ..., N according to the geographical location of the nodes, where N is an integer greater than 2.
本申请的计算机存储介质可以采用半导体存储器或磁芯存储器实现。The computer storage medium of the present application can be implemented with semiconductor memory or magnetic core memory.
半导体存储器,主要用于计算机的半导体存储元件主要有Mos和双极型两种。Mos元件集成度高、工艺简单但速度较慢。双极型元件工艺复杂、功耗大、集成度低但速度快。NMos和CMos问世后,使Mos存储器在半导体存储器中开始占主要地位。NMos速度快,如英特尔公司的1K位静态随机存储器的存取时间为45ns。而CMos耗电省,4K位的CMos静态存储器存取时间为300ns。上述半导体存储器都是随机存取存储器(RAM),即在工作过程中可随机进行读出和写入新内容。而半导体只读存储器(ROM)在工作过程中可随机读出但不能写入,它用来存放已固化好的程序和数据。ROM又分为不可改写的熔断丝式只读存储器──PROM和可改写的只读存储器EPROM两种。Semiconductor memory, the semiconductor memory elements mainly used in computers are mainly Mos and bipolar. Mos components have high integration, simple process but slow speed. Bipolar components have complex process, high power consumption, low integration but fast speed. After the advent of NMos and CMos, Mos memory began to occupy a dominant position in semiconductor memory. NMos is fast, such as Intel's 1K-bit SRAM access time of 45ns. The CMos consumes less power, and the 4K-bit CMos static memory access time is 300ns. The above semiconductor memories are all random access memories (RAM), that is, new contents can be read and written randomly during the working process. The semiconductor read-only memory (ROM) can be randomly read but not written in the working process, it is used to store the solidified program and data. ROM is divided into two types of non-rewritable fuse-type read-only memory ─ ─ PROM and rewritable read-only memory EPROM.
磁芯存储器,具有成本低,可靠性高的特点,且有20多年的实际使用经验。70年代中期以前广泛使用磁芯存储器作为主存储器。其存储容量可达10位以上,存取时间最快为300ns。国际上典型的磁芯存储器容量为4MS~8MB,存取周期为1.0~1.5μs。在半 导体存储快速发展取代磁芯存储器作为主存储器的位置之后,磁芯存储器仍然可以作为大容量扩充存储器而得到应用。Magnetic core memory has the characteristics of low cost and high reliability, and has more than 20 years of practical experience. Before the mid-1970s, magnetic core memory was widely used as main memory. Its storage capacity can reach more than 10 bits, and the fastest access time is 300ns. The international typical magnetic core memory capacity is 4MS ~ 8MB, and the access cycle is 1.0 ~ 1.5μs. After the rapid development of semiconductor storage to replace the magnetic core memory as the main memory, the magnetic core memory can still be used as a large-capacity expansion memory.
实施例五:Embodiment 5:
本申请还提供了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如下步骤:The present application also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor implements the following steps when executing the computer program:
将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi的锚节点是否为可信锚节点。Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
进一步,所述当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息,具体包括:Further, when a transaction initiator initiates a transaction in the area block Pi, the anchor node of the area block Pi sends verification information to the anchor nodes of other area blocks, specifically including:
当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出包含交易信息以及交易信息经哈希运算后的第一哈希值的验证信息。When a transaction initiator initiates a transaction in the regional block Pi, the anchor node of the regional block Pi sends the verification information including the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other regional blocks.
进一步,对所述哈希运算后的第一哈希值用地域块Pi的私钥进行加密得到加密后的签名,所述签名和交易信息作为所述验证信息。Further, encrypting the first hash value after the hash operation with the private key of the area block Pi to obtain an encrypted signature, and the signature and transaction information are used as the verification information.
进一步,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:Further, the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node The process is specifically as follows:
其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
进一步,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:Further, the other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node The process is specifically as follows:
其他地域块分别用所述地域块Pi的公钥对所述签名进行解密得到所述第一哈希值;Other area blocks respectively use the public key of the area block Pi to decrypt the signature to obtain the first hash value;
其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
进一步,所述将区块链网络划分为N个地域块Pi具体为:Further, the division of the blockchain network into N regional blocks Pi is specifically:
将全部区块链网络中的节点按照节点所处的地理位置划分为N个地域块Pi、i=1,2,……,N,其中N为大于2的整数。The nodes in the entire blockchain network are divided into N regional blocks Pi, i=1, 2, ..., N according to the geographical location of the nodes, where N is an integer greater than 2.
图4为一个实施例中电子设备的内部结构示意图。如图4所示,该电子设备包括通过系统总线连接的处理器、存储介质、存储器和网络接口。其中,该计算机设备的存储介质存储有操作系统、数据库和计算机可读指令,数据库中可存储有控件信息序列,该计算机可读指令被处理器执行时,可使得处理器实现一种联盟链分片共识系统中锚节点作假检测方法。该电设备的处理器用于提供计算和控制能力,支撑整个计算机设备的运行。该计算机设备的存储器中可存储有计算机可读指令,该计算机可读指令被处理器执行时,可使得处理器执行一种联盟链分片共识系统中锚节点作假检测方法。该计算机设备的网络接口用于与终端连接通信。本领域技术人员可以理解,图4中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。FIG. 4 is a schematic diagram of the internal structure of an electronic device in one embodiment. As shown in FIG. 4 , the electronic device includes a processor, a storage medium, a memory, and a network interface connected through a system bus. Wherein, the storage medium of the computer device stores an operating system, a database and computer-readable instructions, the database can store a control information sequence, and when the computer-readable instructions are executed by the processor, the processor can be made to realize a kind of alliance chain distribution. Anchor node forgery detection method in slice consensus system. The processor of the electrical equipment is used to provide computing and control capabilities and support the operation of the entire computer equipment. Computer-readable instructions may be stored in the memory of the computer device, and when the computer-readable instructions are executed by the processor, the processor may execute a method for detecting fake anchor nodes in a consortium chain sharding consensus system. The network interface of the computer equipment is used for communication with the terminal connection. Those skilled in the art can understand that the structure shown in FIG. 4 is only a block diagram of a partial structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied. Include more or fewer components than shown in the figures, or combine certain components, or have a different arrangement of components.
该电子设备包括但不限于智能电话、计算机、平板电脑、可穿戴智能设备、人工智能设备、移动电源等。The electronic devices include, but are not limited to, smart phones, computers, tablet computers, wearable smart devices, artificial intelligence devices, power banks, and the like.
所述处理器在一些实施例中可以由集成电路组成,例如可以由单个封装的集成电路 所组成,也可以是由多个相同功能或不同功能封装的集成电路所组成,包括一个或者多个中央处理器(Central Processing unit,CPU)、微处理器、数字处理芯片、图形处理器及各种控制芯片的组合等。所述处理器是所述电子设备的控制核心(Control Unit),利用各种接口和线路连接整个电子设备的各个部件,通过运行或执行存储在所述存储器内的程序或者模块(例如执行远端数据读写程序等),以及调用存储在所述存储器内的数据,以执行电子设备的各种功能和处理数据。In some embodiments, the processor may be composed of integrated circuits, such as a single packaged integrated circuit, or a plurality of integrated circuits packaged with the same function or different functions, including one or more central Processor (Central Processing unit, CPU), microprocessor, digital processing chip, graphics processor and combination of various control chips, etc. The processor is the control core (Control Unit) of the electronic device, and uses various interfaces and lines to connect various components of the entire electronic device, by running or executing programs or modules stored in the memory (for example, executing a remote control unit). data reading and writing programs, etc.), and call data stored in the memory to perform various functions of the electronic device and process data.
所述总线可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。所述总线被设置为实现所述存储器以及至少一个处理器等之间的连接通信。The bus may be a peripheral component interconnect (PCI for short) bus or an extended industry standard architecture (Extended industry standard architecture, EISA for short) bus or the like. The bus can be divided into address bus, data bus, control bus and so on. The bus is configured to enable connection communication between the memory and at least one processor or the like.
图4仅示出了具有部件的电子设备,本领域技术人员可以理解的是,图4示出的结构并不构成对所述电子设备的限定,可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。FIG. 4 only shows an electronic device with components. Those skilled in the art can understand that the structure shown in FIG. 4 does not constitute a limitation on the electronic device, and may include fewer or more components than those shown in the drawings. , or a combination of certain components, or a different arrangement of components.
例如,尽管未示出,所述电子设备还可以包括给各个部件供电的电源(比如电池),优选地,电源可以通过电源管理装置与所述至少一个处理器逻辑相连,从而通过电源管理装置实现充电管理、放电管理、以及功耗管理等功能。电源还可以包括一个或一个以上的直流或交流电源、再充电装置、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。所述电子设备还可以包括多种传感器、蓝牙模块、Wi-Fi模块等,在此不再赘述。For example, although not shown, the electronic device may also include a power source (such as a battery) for powering the various components, preferably, the power source may be logically connected to the at least one processor through a power management device, so as to be implemented by the power management device Charge management, discharge management, and power management functions. The power source may also include one or more DC or AC power sources, recharging devices, power failure detection circuits, power converters or inverters, power status indicators, and any other components. The electronic device may further include various sensors, Bluetooth modules, Wi-Fi modules, etc., which will not be repeated here.
进一步地,所述电子设备还可以包括网络接口,可选地,所述网络接口可以包括有线接口和/或无线接口(如WI-FI接口、蓝牙接口等),通常用于在该电子设备与其他电子设备之间建立通信连接。Further, the electronic device may also include a network interface, optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.) Establish a communication connection between other electronic devices.
可选地,该电子设备还可以包括用户接口,用户接口可以是显示器(Display)、输入单元(比如键盘(Keyboard)),可选地,用户接口还可以是标准的有线接口、无线接口。可选地,在一些实施例中,显示器可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。其中,显示器也可以适当的称为显示屏或显示单元,用于显示在电子设备中处理的信息以及用于显示可视化的用户界面。Optionally, the electronic device may further include a user interface, and the user interface may be a display (Display), an input unit (such as a keyboard (Keyboard)), optionally, the user interface may also be a standard wired interface or a wireless interface. Optionally, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode, organic light-emitting diode) touch device, and the like. The display may also be appropriately called a display screen or a display unit, which is used for displaying information processed in the electronic device and for displaying a visual user interface.
进一步地,所述计算机可用存储介质可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序等;存储数据区可存储根据区块链节点的使用所创建的数据等。Further, the computer usable storage medium may mainly include a stored program area and a stored data area, wherein the stored program area may store an operating system, an application program required for at least one function, and the like; using the created data, etc.
在本申请所提供的几个实施例中,应该理解到,所揭露的设备,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In the several embodiments provided in this application, it should be understood that the disclosed apparatus, apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are only illustrative. For example, the division of the modules is only a logical function division, and there may be other division manners in actual implementation.
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。The modules described as separate components may or may not be physically separated, and components shown as modules may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
另外,在本申请各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。In addition, each functional module in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware, or can be implemented in the form of hardware plus software function modules.
以上对本申请的实施例进行了描述。但是,这些实施例仅仅是为了说明的目的,而并非为了限制本申请的范围。本申请的范围由所附权利要求及其等价物限定。不脱离本申请的范围,本领域技术人员可以做出多种替代和修改,这些替代和修改都应落在本申请的范围之内。The embodiments of the present application are described above. However, these examples are for illustrative purposes only, and are not intended to limit the scope of the present application. The scope of the application is defined by the appended claims and their equivalents. Without departing from the scope of the present application, those skilled in the art can make various substitutions and modifications, and these substitutions and modifications should all fall within the scope of the present application.

Claims (20)

  1. 一种联盟链分片共识系统中锚节点作假检测方法,其中,包括:An anchor node fraud detection method in a consortium chain fragmentation consensus system, including:
    将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
    各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
    当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
    其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i的锚节点是否为可信锚节点。 Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  2. 根据权利要求1所述的方法,其中,所述当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息,具体包括:The method according to claim 1, wherein when a transaction initiator initiates a transaction in the area block Pi, the anchor node of the area block Pi sends verification information to the anchor nodes of other area blocks, specifically including:
    当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出包含交易信息以及交易信息经哈希运算后的第一哈希值的验证信息。When a transaction initiator initiates a transaction in the regional block Pi, the anchor node of the regional block Pi sends the verification information including the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other regional blocks.
  3. 根据权利要求2所述的方法,其中,对所述哈希运算后的第一哈希值用地域块Pi的私钥进行加密得到加密后的签名,所述签名和交易信息作为所述验证信息。The method according to claim 2, wherein the first hash value after the hash operation is encrypted with the private key of the area block Pi to obtain an encrypted signature, and the signature and transaction information are used as the verification information .
  4. 根据权利要求2所述的方法,其中,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:The method according to claim 2, wherein the other region blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node. The process is as follows:
    其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
    比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  5. 根据权利要求3所述的方法,其中,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:The method according to claim 3, wherein the verification information of the transaction initiator is verified by voting on the other regional blocks, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node. The process is as follows:
    其他地域块分别用所述地域块Pi的公钥对所述签名进行解密得到所述第一哈希值;Other area blocks respectively use the public key of the area block Pi to decrypt the signature to obtain the first hash value;
    其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
    比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  6. 根据权利要求1所述的方法,其中,所述将区块链网络划分为N个地域块Pi具体为:The method according to claim 1, wherein the dividing the blockchain network into N regional blocks Pi is specifically:
    将全部区块链网络中的节点按照节点所处的地理位置划分为N个地域块Pi、i=1,2,……,N,其中N为大于2的整数。The nodes in the entire blockchain network are divided into N regional blocks Pi, i=1, 2, ..., N according to the geographical location of the nodes, where N is an integer greater than 2.
  7. 根据权利要求1所述的方法,其中,还包括:The method of claim 1, further comprising:
    若发起交易的地域块Pi的锚节点为不可信锚节点,则所述地域块Pi重新投票选出一个新的节点作为代表该地域块Pi的锚节点。If the anchor node of the region block Pi that initiates the transaction is an untrusted anchor node, the region block Pi will re-vote a new node as the anchor node representing the region block Pi.
  8. 一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如下步骤:An electronic device, comprising a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor implements the following steps when executing the computer program:
    将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
    各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
    当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
    其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i的锚节点是否为可信锚节点。 Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  9. 根据权利要求8所述的设备,其中,所述当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息,具体包括:The device according to claim 8, wherein when a transaction initiator initiates a transaction in the area block Pi, the anchor node of the area block Pi sends verification information to the anchor nodes of other area blocks, specifically including:
    当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出包含交易信息以及交易信息经哈希运算后的第一哈希值的验证信息。When a transaction initiator initiates a transaction in the regional block Pi, the anchor node of the regional block Pi sends the verification information including the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other regional blocks.
  10. 根据权利要求9所述的设备,其中,对所述哈希运算后的第一哈希值用地域块Pi的私钥进行加密得到加密后的签名,所述签名和交易信息作为所述验证信息。The device according to claim 9, wherein the encrypted signature is obtained by encrypting the first hash value after the hash operation with the private key of the area block Pi, and the signature and transaction information are used as the verification information .
  11. 根据权利要求9所述的设备,其中,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:The device according to claim 9, wherein the other region blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node. The process is as follows:
    其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
    比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  12. 根据权利要求9所述的设备,其中,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:The device according to claim 9, wherein the other region blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node. The process is as follows:
    其他地域块分别用所述地域块Pi的公钥对所述签名进行解密得到所述第一哈希值;Other area blocks respectively use the public key of the area block Pi to decrypt the signature to obtain the first hash value;
    其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
    比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  13. 根据权利要求8所述的设备,其中,所述将区块链网络划分为N个地域块Pi具体为:The device according to claim 8, wherein the dividing the blockchain network into N regional blocks Pi is specifically:
    将全部区块链网络中的节点按照节点所处的地理位置划分为N个地域块Pi、i=1,2,……,N,其中N为大于2的整数。The nodes in the entire blockchain network are divided into N regional blocks Pi, i=1, 2, ..., N according to the geographical location of the nodes, where N is an integer greater than 2.
  14. 一种计算机存储介质,其上存储有计算机程序指令,其中,所述程序指令被处理器执行时用于实现联盟链分片共识系统中锚节点作假检测方法对应的步骤;A computer storage medium on which computer program instructions are stored, wherein when the program instructions are executed by a processor, the program instructions are used to implement the steps corresponding to the anchor node fraud detection method in the alliance chain fragmentation consensus system;
    所述方法包括:The method includes:
    将区块链网络划分为N个地域块P i,i=1,2……,N,其中N为大于2的整数; Divide the blockchain network into N regional blocks P i , i=1, 2..., N, where N is an integer greater than 2;
    各个所述地域块P i中的节点经投票选出代表该地域块P i全部节点的锚节点; The nodes in each of the geographical blocks P i vote to select the anchor nodes representing all the nodes of the geographical block Pi;
    当有交易发起人在地域块P i发起交易时,地域块P i的锚节点向其他地域块的锚节点发出验证信息; When a transaction initiator initiates a transaction in the regional block Pi , the anchor node of the regional block Pi sends verification information to the anchor nodes of other regional blocks;
    其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块P i的锚节点是否为可信锚节点。 Other regional blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  15. 根据权利要求14所述的介质,其中,所述当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息,具体包括:The medium according to claim 14, wherein when a transaction initiator initiates a transaction in the area block Pi, the anchor node of the area block Pi sends verification information to the anchor nodes of other area blocks, specifically including:
    当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出包含交易信息以及交易信息经哈希运算后的第一哈希值的验证信息。When a transaction initiator initiates a transaction in the regional block Pi, the anchor node of the regional block Pi sends the verification information including the transaction information and the first hash value of the transaction information after the hash operation to the anchor nodes of the other regional blocks.
  16. 根据权利要求15所述的介质,其中,对所述哈希运算后的第一哈希值用地域块Pi的私钥进行加密得到加密后的签名,所述签名和交易信息作为所述验证信息。The medium according to claim 15, wherein the encrypted signature is obtained by encrypting the first hash value after the hash operation with the private key of the area block Pi, and the signature and transaction information are used as the verification information .
  17. 根据权利要求15所述的介质,其中,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:The medium according to claim 15, wherein the other region blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node. The process is as follows:
    其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
    比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  18. 根据权利要求15所述的介质,其中,所述其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点的过程具体为:The medium according to claim 15, wherein the other region blocks perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node. The process is as follows:
    其他地域块分别用所述地域块Pi的公钥对所述签名进行解密得到所述第一哈希值;Other area blocks respectively use the public key of the area block Pi to decrypt the signature to obtain the first hash value;
    其他地域块分别对所述交易信息进行哈希运算得到第二哈希值;The other region blocks respectively perform a hash operation on the transaction information to obtain a second hash value;
    比较验证所述第一哈希值和所述第二哈希值是否一致,若一致则验证通过,此交易发起人发起交易的地域块Pi的锚节点为可信锚节点。Compare and verify whether the first hash value and the second hash value are consistent, and if they are consistent, the verification is passed, and the anchor node of the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
  19. 根据权利要求14所述的介质,其中,所述将区块链网络划分为N个地域块Pi具体为:The medium according to claim 14, wherein the dividing the blockchain network into N regional blocks Pi is specifically:
    将全部区块链网络中的节点按照节点所处的地理位置划分为N个地域块Pi、i=1,2,……,N,其中N为大于2的整数。The nodes in the entire blockchain network are divided into N regional blocks Pi, i=1, 2, ..., N according to the geographical location of the nodes, where N is an integer greater than 2.
  20. 一种联盟链分片共识系统中锚节点作假检测装置,其中,包括:An anchor node fraud detection device in a consortium chain fragmentation consensus system, including:
    分块模块,用于将区块链网络划分为N个地域块Pi,i=1,2……,N,其中N为大于2的整数;The block module is used to divide the blockchain network into N regional blocks Pi, i=1, 2..., N, where N is an integer greater than 2;
    锚节点选取模块,用于各个所述地域块Pi中的节点经投票选出代表该地域块Pi全部节点的锚节点;An anchor node selection module, which is used for the nodes in each of the area blocks Pi to select the anchor nodes representing all the nodes of the area block Pi by voting;
    发送模块,用于当有交易发起人在地域块Pi发起交易时,地域块Pi的锚节点向其他地域块的锚节点发出验证信息;The sending module is used to send verification information from the anchor node of the regional block Pi to the anchor nodes of other regional blocks when a transaction initiator initiates a transaction in the regional block Pi;
    验证模块,用于其他地域块对交易发起人的验证信息进行投票验证,所述投票验证的结果决定交易发起人发起交易的地域块Pi是否为可信锚节点。The verification module is used for other regional blocks to perform voting verification on the verification information of the transaction initiator, and the result of the voting verification determines whether the regional block Pi where the transaction initiator initiates the transaction is a trusted anchor node.
PCT/CN2021/097125 2020-11-03 2021-05-31 Anchor node falsification detection method and apparatus, and medium and device WO2022095428A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011209080.3 2020-11-03
CN202011209080.3A CN112307447A (en) 2020-11-03 2020-11-03 Method, device, medium and equipment for detecting false of anchor node

Publications (1)

Publication Number Publication Date
WO2022095428A1 true WO2022095428A1 (en) 2022-05-12

Family

ID=74332662

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/097125 WO2022095428A1 (en) 2020-11-03 2021-05-31 Anchor node falsification detection method and apparatus, and medium and device

Country Status (2)

Country Link
CN (1) CN112307447A (en)
WO (1) WO2022095428A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112307447A (en) * 2020-11-03 2021-02-02 平安科技(深圳)有限公司 Method, device, medium and equipment for detecting false of anchor node

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109510876A (en) * 2018-12-20 2019-03-22 弗洛格(武汉)信息科技有限公司 A kind of alliance's chain sharding method and corresponding alliance's chain based on PBFT
CN111047763A (en) * 2019-12-05 2020-04-21 全链通有限公司 Electronic voting method, device and storage medium based on block chain
CN111159755A (en) * 2019-12-12 2020-05-15 广东工业大学 Cross-link data cooperation method based on alliance link
CN111277409A (en) * 2020-01-17 2020-06-12 杭州龙纪科技有限公司 Method for preventing cheating by block chain link point consensus
CN111709751A (en) * 2020-06-20 2020-09-25 山西警察学院 Expanding method for anchor node in block chain
CN112307447A (en) * 2020-11-03 2021-02-02 平安科技(深圳)有限公司 Method, device, medium and equipment for detecting false of anchor node

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598060A (en) * 2019-09-18 2019-12-20 广东卓启投资有限责任公司 Block chain rapid consensus method and device, computer equipment and storage medium
CN110958120B (en) * 2019-12-05 2022-06-10 全链通有限公司 Electronic voting method, device and storage medium based on block chain
CN111355810B (en) * 2020-03-17 2022-05-10 重庆邮电大学 Improved PBFT consensus method based on credit and voting mechanism

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109510876A (en) * 2018-12-20 2019-03-22 弗洛格(武汉)信息科技有限公司 A kind of alliance's chain sharding method and corresponding alliance's chain based on PBFT
CN111047763A (en) * 2019-12-05 2020-04-21 全链通有限公司 Electronic voting method, device and storage medium based on block chain
CN111159755A (en) * 2019-12-12 2020-05-15 广东工业大学 Cross-link data cooperation method based on alliance link
CN111277409A (en) * 2020-01-17 2020-06-12 杭州龙纪科技有限公司 Method for preventing cheating by block chain link point consensus
CN111709751A (en) * 2020-06-20 2020-09-25 山西警察学院 Expanding method for anchor node in block chain
CN112307447A (en) * 2020-11-03 2021-02-02 平安科技(深圳)有限公司 Method, device, medium and equipment for detecting false of anchor node

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SHI BOXUAN; ZHANG FENG; CHARNSRIPINYO CHALERMPOL; JIANG WENBAO: "A Construction Method for Alliance-based Network Trust Anchor", 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), IEEE, 15 March 2019 (2019-03-15), pages 1211 - 1214, XP033557422, DOI: 10.1109/ITNEC.2019.8729031 *

Also Published As

Publication number Publication date
CN112307447A (en) 2021-02-02

Similar Documents

Publication Publication Date Title
Zhang et al. Security and trust in blockchains: Architecture, key technologies, and open issues
CN111046352B (en) Identity information security authorization system and method based on block chain
CN108681966B (en) Information supervision method and device based on block chain
Sriman et al. Blockchain technology: Consensus protocol proof of work and proof of stake
CN110945550B (en) Processing and storing blockchain data in a trusted execution environment
CN110582793B (en) Anonymity and traceability of digital property transactions on a distributed transaction consensus network
WO2019222993A1 (en) Blockchain consensus method based on trust relationship
Zhang et al. Recent advances in blockchain and artificial intelligence integration: Feasibility analysis, research issues, applications, challenges, and future work
Feng et al. A blockchain-based collocation storage architecture for data security process platform of WSN
EP3659319B1 (en) Improved anti-replay device based on memory space interchange
Cai et al. Hardening distributed and encrypted keyword search via blockchain
WO2021023304A1 (en) Fork processing method and blockchain node
Zhang et al. Data security sharing method based on CP-ABE and blockchain
CN113302610B (en) Trusted platform based on blockchain
CN113822675A (en) Block chain based message processing method, device, equipment and storage medium
Fahim et al. Blockchain: A Comparative Study of Consensus Algorithms PoW, PoS, PoA, PoV
WO2022095428A1 (en) Anchor node falsification detection method and apparatus, and medium and device
Gao et al. BFR‐SE: A Blockchain‐Based Fair and Reliable Searchable Encryption Scheme for IoT with Fine‐Grained Access Control in Cloud Environment
Ge et al. A privacy protection method of lightweight nodes in blockchain
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
CN113491090B (en) Trusted platform based on blockchain
Grosu et al. A note on blockchain authentication methods for mobile devices in healthcare
AT&T
Hadi et al. A vision of blockchain technology and its integration with IOT: Applications, challenges, and opportunities; from the authentication perspective
Xu et al. BPDST: Blockchain-Based Privacy-Preserving Data Sharing on Thin Client for Electronic Medical Records

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21888131

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21888131

Country of ref document: EP

Kind code of ref document: A1