WO2022100291A1 - 一种锥体区块链的层级架构 - Google Patents

一种锥体区块链的层级架构 Download PDF

Info

Publication number
WO2022100291A1
WO2022100291A1 PCT/CN2021/120041 CN2021120041W WO2022100291A1 WO 2022100291 A1 WO2022100291 A1 WO 2022100291A1 CN 2021120041 W CN2021120041 W CN 2021120041W WO 2022100291 A1 WO2022100291 A1 WO 2022100291A1
Authority
WO
WIPO (PCT)
Prior art keywords
layer
cone
authentication
block
certification
Prior art date
Application number
PCT/CN2021/120041
Other languages
English (en)
French (fr)
Inventor
李俊
李晶宇
武少华
张琴
Original Assignee
山西特信环宇信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 山西特信环宇信息技术有限公司 filed Critical 山西特信环宇信息技术有限公司
Publication of WO2022100291A1 publication Critical patent/WO2022100291A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Definitions

  • the invention belongs to the technical field of block chain, and in particular relates to a hierarchical structure of a cone block chain.
  • Blockchain technology is the underlying technology of Bitcoin. It is a decentralized distributed database maintained by multiple blocks. Tree data structure, distributed storage technology, cryptography principles, and consensus algorithms achieve data consistency and security.
  • the hierarchical structure of blockchain is divided into data layer, network layer, consensus layer, contract layer, incentive layer, and application layer.
  • the necessary layers are data layer, network layer and consensus layer, which constitute the bottom layer of blockchain layer.
  • the foundation, one layer is indispensable.
  • the contract layer, incentive layer, and application layer are not essential in blockchain technology. For example, Bitcoin does not have a contract layer.
  • the six levels are independent and inseparable from each other, forming a blockchain hierarchy as a whole.
  • blockchain also has some shortcomings.
  • the storage speed of blockchain is slow, and it takes a long time to obtain transaction confirmation, which cannot meet the requirements of high-frequency storage in today's society.
  • the characteristics of the blockchain are decentralization. To a certain level, it is not without a center, but the center is determined by a consensus algorithm. The consistency of information and security are extremely dependent on the consensus algorithm.
  • the present invention proposes a hierarchical structure and method of a cone block chain, and establishes a new block chain hierarchical structure to ensure the security and consistency of the cone block chain system.
  • the present invention provides a hierarchical structure of a cone blockchain, which solves some drawbacks of the decentralization of the blockchain and the problem of ambiguous levels of the cone blockchain.
  • the technical scheme adopted in the present invention is:
  • a hierarchical structure of a cone block chain is characterized in that: the cone block chain includes a data layer, a network layer, a consensus layer, a contract layer and an application layer;
  • the data layer realizes the security of data storage and data consistency
  • the network layer is encapsulated with the networking method of the cone blockchain system
  • the consensus layer is used to realize the consensus of the cone blockchain system, and is encapsulated with a consensus algorithm
  • the contract layer encapsulates the script code, algorithms and smart contracts of the cone blockchain
  • the application layer encapsulates various application scenarios and cases of the cone blockchain.
  • the data layer is encapsulated with cone data blocks, cone chain structure, timestamp, random number, hash function, dynamic key, asymmetric encryption and consensus storage.
  • the network layer realizes the point-to-point two-way authentication and point-to-point broadcast data transmission of the cone block chain, and the data verification of the broadcast transmission is carried out according to the verification mechanism; the cone block chain is established according to the consensus relationship and the consensus consensus algorithm;
  • the consensus layer realizes the connection of the consensus relationship of each block, forming a cone block chain encrypted chain network, wherein the blocks of the cone block chain are connected with other blocks according to the same column consensus relationship of the consensus layer;
  • the blocks establish the same-column, same-layer and non-column and same-layer connections according to the same-column, same-layer and non-column and same-layer relationships of the consensus layer, forming a pyramidal hierarchical chain data structure; Cross-column and cross-level connections between blocks;
  • the contract layer includes script codes, algorithm mechanisms, smart contracts, and automatically realizes the broadcasting and data transmission of the cone blockchain.
  • the application layer is encapsulated with a cone block chain terminal layer, a base layer, a license qualification layer, a product layer, an asset analysis layer, a credit layer and a sharing layer.
  • the terminal layer includes any one or more of PC terminals, mobile terminals, sensor terminals and data terminals;
  • the basic layer includes the authentication block of the integration of the human and the machine, the personal identity authentication block, and the legal person identity authentication block;
  • the license qualification layer includes a license authentication block, a qualification authentication block, and an identity relationship proof block;
  • the product layer includes production and operation legal person user blocks, currency issuance and financial legal person user blocks;
  • the asset analysis layer includes product attributes, currency attributes, and value transfer cone identity filing and analysis
  • the credit layer includes personal credit, corporate credit and social credit;
  • the sharing layer includes product sharing, asset resource sharing, wealth sharing and social sharing.
  • the layered application method of the application layer includes the following steps:
  • the cone block chain terminal initiates a request, and according to the authentication information at the application layer, the cone block chain key is opened;
  • the license qualification layer of the cone blockchain application layer is that the terminal layer sends a request as an individual or a legal person. After the basic layer authentication is passed, it is sent to the license or qualification authentication block corresponding to the individual or legal person for the license or qualification corresponding to the identity. Qualification certification, after the certification is passed, the certification information is sent to the terminal;
  • the product layer and the terminal layer send a request. After the certification of the basic layer is passed, the license certification of the licensed product is carried out. After the certification is passed, it is sent to the second-level unit block of the legal person of product production for product information certification. After certification, the certification information is sent to terminal;
  • the asset parsing layer and the terminal send an authentication request. After the authentication of the base layer block, it is the asset of the licensed product. After the authentication of the license layer block, and then the authentication of the product layer block, it is the product and circulation block authentication. If it is a record asset, it will be certified by the qualification record layer, and the certification information will be returned to the terminal;
  • the terminal layer of the credit layer sends a request, and the basic layer certification is passed, which is the license layer certification of the licensed product.
  • the product layer certification is sent for product and output certification, and it is sent to the asset layer for sales volume certification, asset registration filing certification and financial certification.
  • After the relevant authentication send the authentication information back to the terminal;
  • the shared layer and the terminal layer send requests, the basic layer certification sends the permission layer, the permission layer certification sends the product layer, the product layer certification sends the asset layer, the asset layer certification sends the credit layer, and realizes the product based on the product production and sales certification. Sharing, realizes the sharing of assets on the basis of asset certification and registration and filing certification, and realizes the sharing of value on the basis of financial certification.
  • the cone block chain terminal initiates a request as a personal identity, and performs the person, card and machine authentication block in the cone block chain of the person, card and machine authentication block. After the authentication is passed, it is sent to the personal identity authentication block corresponding to the certificate number. Carry out biometric identification and terminal collection of living body comparison for identity information authentication; the authentication information is returned to the terminal to display the authentication information.
  • the cone block chain terminal initiates a request as a legal person, and after passing the authentication of the registered person-identity-machine authentication block, it is sent to the legal representative or authorized representative of the legal person corresponding to the certificate number; the identity authentication block registered by the individual is carried out with the terminal. Collect living biological information for comparison, and after the comparison is passed, send it to the authentication block registered by the legal person for legal person identity information authentication; after the authentication is passed, send the authentication information to the terminal; the authentication information is returned to the terminal to display the authentication information.
  • the present invention has the following beneficial effects:
  • Cone blockchain hierarchical structure consists of data layer, network layer, consensus layer, contract layer and application layer, among which: data layer is the lowest technology of cone blockchain, which mainly realizes the security of data storage and data consistency
  • data layer is the lowest technology of cone blockchain, which mainly realizes the security of data storage and data consistency
  • the network layer encapsulates the networking method of the cone blockchain system
  • the consensus layer realizes the distributed system consensus of the cone blockchain
  • the contract layer encapsulates various script codes, algorithms and smart contracts of the cone blockchain. It is the basis for flexible programming and data manipulation of the cone blockchain system.
  • the application layer is the display layer of the cone blockchain, which encapsulates various application scenarios and cases of the cone blockchain.
  • the hierarchical structure of the established cone blockchain solves the problem of decentralization of the blockchain, builds the hierarchical structure of the cone blockchain to establish the cone block ecosystem, and realizes the system consistency of the cone block chain and unity.
  • 1 is a schematic diagram of the hierarchical structure of the cone block chain of the present invention.
  • FIG. 2 is a schematic diagram of the application level content of the cone block chain of the present invention.
  • Fig. 3 is the schematic diagram of the hierarchical structure relationship of the cone block chain application of the present invention.
  • Fig. 4 is the structure schematic diagram of the cone block of the present invention.
  • FIG. 5 is a schematic diagram of the structure of the pyramid block chain of the present invention.
  • the hierarchical structure and method of a cone blockchain consists of a data layer, a network layer, a consensus layer, a contract layer, and an application layer, in which:
  • the data layer is the bottom technology of the cone blockchain, which mainly realizes the security of data storage and data consistency, including cone data block, cone chain structure, timestamp, random number, hash Functions, dynamic keys, asymmetric encryption, consensus storage.
  • the network layer encapsulates the networking mode of the cone blockchain system, including: P2P network two-way authentication, broadcast transmission mechanism, and verification mechanism.
  • the contract layer encapsulates various script codes, algorithms and smart contracts of the cone blockchain, which is the basis for flexible programming and data manipulation of the cone blockchain system. Including: cone script code, algorithm mechanism, smart contract.
  • the consensus layer realizes the consensus of the distributed system of the cone blockchain, including: the upper-level and lower-level association consensus algorithms in the same column, the same column and the same layer association consensus algorithm, the non-column and the same layer association consensus algorithm, and other association consensus algorithms.
  • the application layer is the display layer of the cone block chain, which encapsulates various application scenarios and cases of the cone block chain, including the cone block chain terminal layer, base layer, license qualification layer, product layer, assets Parsing layer, credit layer, sharing layer.
  • the application layer is the top layer of the pyramid blockchain hierarchical framework, which is the salient feature and core of the pyramid blockchain.
  • the terminal layer includes a PC terminal, a mobile terminal, a sensor terminal, and a data terminal.
  • the basic layer includes: the authentication block of the integration of the human and the card, the personal identity authentication block, and the legal person identity authentication block.
  • the license qualification layer includes: license authentication block, qualification authentication block, and identity relationship proof block.
  • the product layer includes: production and operation legal person user blocks, currency issuance and financial legal person user blocks.
  • the asset analysis layer includes: product attributes, currency attributes, and value transfer cone identity filing and analysis.
  • the credit layer includes: personal credit, corporate credit, and social credit.
  • the sharing layer includes: product sharing, asset resource sharing, wealth sharing, and social sharing.
  • the data layer, network layer, consensus layer, contract layer, and application layer of the cone blockchain constitute the entire ecosystem of the cone block.
  • cone blockchain constitute the cone blockchain.
  • the terminal, base layer, license qualification layer, product layer, assets, identity resolution layer, credit layer, and sharing layer of the application layer of the cone blockchain together form the application layer hierarchy.
  • the underlying technical architecture of the Cone Blockchain and the layered application of the application layer hierarchy constitute the subsystems of the Cone Blockchain.
  • the blocks of the cone blockchain are connected to each block of the fan-shaped column according to the same-column consensus relationship of the consensus layer, that is, the upper-level block of the block is connected to multiple lower-level blocks.
  • the blocks of the cone blockchain establish the same-column and same-layer and non-column and same-layer connections according to the same-column, same-layer and non-column and same-layer relationships of the consensus layer, forming a pyramidal hierarchical chain data structure.
  • S4 the associated consensus relationship of consensus storage, store the data content in each block of the cone block in layers, and use dynamic keys and asymmetric encryption methods to form a cone block chain encrypted chain network.
  • the network layer implements the point-to-point two-way authentication and point-to-point broadcast data transmission of the cone blockchain, and performs data verification of broadcast transmission according to the verification mechanism.
  • the cone block chain terminal initiates a request as a personal identity, and performs the person, card and machine authentication block in the cone block chain for the authentication block. After the authentication is passed, it is sent to the personal identity authentication corresponding to the certificate number. The block performs biometric identification and terminal collection of living body comparison for identity information authentication. The authentication information is returned to the terminal to display the authentication information.
  • the cone block chain terminal initiates a request as a legal person, and after passing the authentication of the registered human-identity-machine authentication block, sends it to the legal representative or authorized representative of the legal person corresponding to the certificate number.
  • the identity authentication block registered by the individual is compared with the living biological information collected by the terminal, and after the comparison is passed, it is sent to the authentication block registered by the legal person for authentication of the identity information of the legal person. After the authentication is passed, the authentication information is sent to the terminal. The authentication information is returned to the terminal to display the authentication information.
  • the cone block chain terminal initiates a request, and according to the authentication information at the application layer, the cone block chain key is opened.
  • the license qualification layer of the cone blockchain application layer is that the terminal layer sends a request as an individual or a legal person. After the basic layer authentication is passed, it is sent to the license or qualification authentication block corresponding to the individual or legal person for the license or qualification corresponding to the identity. Qualification certification. After the certification is passed, the certification information is sent to the terminal.
  • the product layer and the terminal layer send a request. After the basic layer certification is passed, the license certification of the licensed product is carried out. After the certification is passed, it is sent to the legal person secondary unit block of product production for product information certification. After certification, the certification information is sent to terminal
  • the asset parsing layer and the terminal send an authentication request. After the authentication of the base layer block, it is the asset of the licensed product. After the authentication of the license layer block, and then the authentication of the product layer block, it is the product and circulation block authentication. and is a record asset, after the qualification record layer certification, the certification information will be returned to the terminal.
  • the terminal layer of the credit layer sends a request, and the basic layer certification is passed, which is the license layer certification for the licensed product.
  • the product layer certification is sent for product and output certification, and it is sent to the asset layer for sales volume certification, asset registration and filing certification and financial certification. After the relevant authentication, send the authentication information back to the terminal.
  • the shared layer and the terminal layer send requests, the basic layer certification sends the permission layer, the permission layer certification sends the product layer, the product layer certification sends the asset layer, the asset layer certification sends the credit layer, and realizes the product based on the product production and sales certification. Sharing, realizes the sharing of assets on the basis of asset certification and registration and filing certification, and realizes the sharing of value on the basis of financial certification.
  • the basic authentication of cone blockchain is personal identity authentication and legal person identity authentication
  • the authentication of the cone blockchain terminal is the authentication of human-identity-machine integration.
  • the block is the top-level block of the pyramid block;
  • the itemized unit block is the middle-level block of the pyramid block, which belongs to the classification block of the block and is the sub-block of the block. ;
  • the user block is the bottom block of the pyramid block.
  • Each sub-block in the cone block is composed of a block header and a block body.
  • the block header mainly contains the block code, the associated block hash value, the service network address, the server ID, the timestamp, and the administrator information.
  • Hash value, block content hash value, block body contains administrator information, block content.
  • the administrator information includes the administrator's registration, modification, and cancellation; the block content includes verification content, associated verification content, and other block content.
  • the user block can apply for a secondary unit block and a secondary user block according to its own service content, such as providing a public platform; the user block, the secondary unit block and the secondary user block also form a cone area yuan. Some institutions also have no user block, or no sub-unit block.
  • Cone block chain structure including several cone blocks, one of which is the total cone block, and other cone blocks are divided according to their category or nature: cone blocks of the same category or nature
  • the blocks located in the same column, and the blocks in the pyramid blocks on the same column are connected to form a linear chain; according to the different categories or properties, linear chains of several columns are formed; the linear chains of different columns intersect in the total cone area
  • the blocks in the block form a pyramidal blockchain structure as a whole.
  • Cone blocks on the same column are layered according to levels and form a private chain according to the associated consensus relationship; linear chains of different columns form a cone alliance chain according to the consensus relationship; A row consists of more than one cone block of the same level on the same level.
  • Private chain institutions of the same nature, located in the same column of the cone block chain, each cone block forms a private chain according to the consensus relationship; alliance chain: institutions of different nature, located in different columns of the cone block chain, each cone block
  • the body block forms a consortium chain according to the consensus relationship; specifically: it can be divided into different levels 3-6 according to the ownership level (or subordinate level).
  • Shanxi Provincial Public Security is a private chain
  • Shanxi Civil Affairs Bureau is an alliance chain
  • the hierarchical relationship from top to bottom is: block, itemized unit block, user block, secondary unit block, secondary user block, and microblock.
  • the block, the itemized unit block and the user block are respectively generated with their corresponding administrator and administrator hash values.
  • the block administrator hash value includes the hash value of the block administrator of the sub-item unit.
  • the item unit block administrator hash value contains the subordinate user block administrator hash value; information changes in each administrator can form a hash value and broadcast through the cone blockchain.
  • the living biological information is collected through the cone blockchain client; the collected living biological information is combined with the user information, timestamp, and random number authenticated by the personal identity authentication block, and the private information is generated by hash operation.
  • the private key is dynamically generated, and a different private key is formed each time you log in; the public key is formed after the private key is generated.
  • the public key is generated by the elliptic curve algorithm; the public key and the time stamp information are hashed to form the client address of the cone blockchain, the private key is stored in the cone blockchain client, and the public key is sent to the cone in the blockchain network.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明属于区块链技术领域,具体涉及一种锥体区块链的层级架构,包括数据层、网络层、共识层、合约层和应用层组成;所述数据层实现数据存储的安全性和数据的一致性;所述网络层封装有锥体区块链系统组网方式;所述合约封装有锥体区块链的脚本代码、算法以及智能合约;所述共识层用于实现锥体区块链系统的共识,封装有共识算法。由数据层、网络层、共识层、合约层、应用层组成,其中:数据层是锥体区块链最底层的技术,主要实现数据存储的安全性和数据的一致性,网络层封装了锥体区块链系统的组网方式,合约层封装了锥体区块链的各类脚本代码、算法以及智能合约,是实现锥体区块链系统灵活编程和操作数据的基础。

Description

一种锥体区块链的层级架构 技术领域
本发明属于区块链技术领域,具体涉及一种锥体区块链的层级架构。
背景技术
随着数字货币的兴起,区块链技术得到越来越多关注,区块链技术是比特币的底层技术,是一种去中心化的多区块维护的分布式数据库,其中通过默克尔树数据结构,分布式存储技术,密码学原理,以及共识算法来实现了数据的一致性和安全性。
区块链的层级架构分为数据层、网络层、共识层、合约层、激励层、应用层,其中必要的层级为数据层,网络层和共识层,三者构成了区块链层级的底层基础,一层都不可缺少。合约层、激励层、应用层,在区块链技术中并非必不可少,例如:比特币没有合约层。六个层级之间相互独立又不可分割,整体构成区块链层级架构。
区块链作为一种新型技术也存在一些不足,除政策因素影响外,区块链存储速度较慢,得到交易确认的时间较长,不能满足现今社会高频存储的要求。
区块链的特性为去中心化,在一定层度上并不是没有中心,而是通过共识算法确定中心,信息的一致性,和安全性极度依赖共识算法。
因此本发明提出一种锥体区块链的层级架构和方法,建立新的区块链层级架构,来保证锥体区块链体系的安全性和一致性。
发明内容
针对上述技术问题,本发明提供了一种锥体区块链的层级架构,解决了区块链去中心化的一些弊端和锥体区块链层级模糊的问题。
为了解决上述技术问题,本发明采用的技术方案为:
一种锥体区块链的层级架构,其特征在于:锥体区块链包括数据层、网络层、共识层、合约层和应用层;
特别的,数据层实现数据存储的安全性和数据的一致性;
特别的,网络层封装有锥体区块链系统组网方式;
特别的,共识层用于实现锥体区块链系统的共识,封装有共识算法;
特别的,合约层封装有锥体区块链的脚本代码、算法以及智能合约;
特别的,应用层封装了锥体区块链的各种应用场景和案例。
其中所述数据层封装有锥体数据区块,锥体链式结构、时间戳、随机数、哈希函数、动 态密钥、非对称加密和共识存储。
所述网络层实现锥体区块链的区块点对点的双向认证和点对点广播数据传输,按验证机制进行广播传输的数据验证;按共识关系、一致性共识算法、建立锥体区块链;
所述共识层实现各区块共识关系连接,形成锥体区块链加密链式网络,其中锥体区块链的区块按共识层的同列共识关系与其它区块连接;锥体区块链的区块按共识层的同列同层和非列同层关系建立同列同层和非列同层连接,形成锥体分层级链式数据结构;按区块的非列非同层关系,建立区块间的跨列跨层级的连接;
所述合约层包括脚本代码,算法机制,智能合约,自动实现锥体区块链的广播和数据传输。
所述应用层封装有锥体区块链终端层、基础层、许可资格层、产品层、资产解析层、信用层和共享层。
一种锥体区块链的层级架构,
特别的,终端层包括PC机终端、移动终端、传感器终端和数据终端中的任一个或多个;
特别的,基础层包括人证机合一区块认证区块、个人身份认证区块、法人身份认证区块;
特别的,许可资格层包括许可认证区块、资格认证区块、身份关系证明区块;
特别的,产品层包括生产经营法人用户区块、货币发行和金融法人用户区块;
特别的,资产解析层包括产品属性、货币属性、价值流转锥体身份备案与解析;
特别的,信用层包括个人信用、法人信用和社会信用;
特别的,共享层包括产品共享、资产资源共享、财富共享和社会共享。
所述应用层的分层应用方法,包括以下步骤:
S1、锥体区块链终端发起请求,在应用层根据认证信息,开启锥体区块链密钥;
S2、锥体区块链应用层的许可资格层是终端层以个人身份或法人身份发出请求,基础层认证通过后,发送至个人或法人对应的许可或资格认证区块进行身份对应的许可或资格认证,认证通过后将认证信息发送至终端;
S3、产品层和终端层发出请求,基础层认证通过后,是许可产品的进行许可认证,认证通过后发送至产品生产的法人二级单元区块进行产品信息认证,认证后将认证信息发送至终端;
S4、资产解析层和终端发送认证请求,经基础层区块的认证,是许可产品的资产的,经许可层区块的认证,再经产品层区块的认证,是产品和流转区块认证和是备案资产的,经资格备案层认证,将认证信息返回终端;
S5、信用层终端层发出请求,基础层认证通过,是许可产品的进行许可层认证,通过后 发送产品层认进行产品和产量认证,发送至资产层进行销售量认证,资产注册备案认证和金融有关认证后,发送认证信息返回终端;
S6、共享层和终端层发送请求,基础层认证发送许可层,许可层认证发送产品层,产品层认证发送资产层,资产层认证发送信用层,在产品生产量,销量认证基础上实现产品的共享,在资产认证及注册备案认证的基础上实现资产的共享,在金融认证的基础上实现价值的共享。
锥体区块链终端以个人身份发起请求,在锥体区块链的人证机合一认证区块进行人证机合一认证,认证通过后,发送到证号对应的个人身份认证区块进行生物识别和终端采集活体对比进行身份信息认证;认证信息返回终端显示认证信息。
锥体区块链终端以法人身份发起请求,经注册的人证机合一认证区块认证通过后,发送至证号对应的法人代表或法人授权代表;个人注册的身份认证区块进行与终端采集活体生物信息比对,比对通过后发送至法人注册的认证区块进行法人身份信息认证;认证通过后,发送认证信息至终端;认证信息返回终端显示认证信息。
本发明与现有技术相比,具有的有益效果是:
锥体区块链层级架构由数据层、网络层、共识层、合约层、应用层组成,其中:数据层是锥体区块链最底层的技术,主要实现数据存储的安全性和数据的一致性,网络层封装了锥体区块链系统的组网方式,共识层实现锥体区块链分布式系统共识,合约层封装了锥体区块链的各类脚本代码、算法以及智能合约,是实现锥体区块链系统灵活编程和操作数据的基础。应用层是锥体区块链的展示层,封装了锥体区块链的各种应用场景和案例。
建立的锥体区块链的层级架构解决了区块链去中心化存在的问题,架建锥体区块链层级结构建立锥体区块生态系统,实现锥体区块链的系统的一致性和统一性。
附图说明
图1是本发明锥体区块链的层级架构示意图;
图2是本发明锥体区块链应用层级内容示意图;
图3是本发明锥体区块链应用层级架构关系示意图;
图4是本发明锥体区块结构示意图;
图5是本发明锥体区块链结构示意图。
具体实施方式
下面对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
如图1所示,一种锥体区块链的层级架构和方法由数据层、网络层、共识层、合约层、应用层组成,其中:
S1、数据层是锥体区块链最底层的技术,主要实现数据存储的安全性和数据的一致性,具体包括锥体数据区块,锥体链式结构、时间戳、随机数、哈希函数、动态密钥、非对称加密、共识存储。
S2、网络层封装了锥体区块链系统的组网方式,具体包括:P2P网络双向认证、广播传输机制、验证机制。
S3、合约层封装了锥体区块链的各类脚本代码、算法以及智能合约,是实现锥体区块链系统灵活编程和操作数据的基础。包括:锥体脚本代码、算法机制、智能合约。
S4、共识层实现锥体区块链分布式系统共识包括:同列上下级关联共识算法,同列同层关联共识算法,非列同层关联共识算法,其他关联共识算法。
S5、应用层是锥体区块链的展示层,封装了锥体区块链的各种应用场景和案例,具体包括锥体区块链终端层、基础层、许可资格层、产品层、资产解析层、信用层、共享层。
如图2所示,一种锥体区块链的层级架构和方法,应用层为锥体区块链层级框架的最顶层,是锥体区块链的显著特征和核心所在,其中各层级内容包括:
S1、终端层包括PC机终端,移动终端,传感器终端,数据终端。
S2、基础层包括:人证机合一区块认证区块,个人身份认证区块,法人身份认证区块。
S3、许可资格层包括:许可认证区块,资格认证区块,身份关系证明区块。
S4、产品层包括:生产经营法人用户区块,货币发行和金融法人用户区块。
S5、资产解析层包括:产品属性,货币属性,价值流转锥体身份备案与解析。
S6、信用层包括:个人信用,法人信用,社会信用。
S7、共享层包括:产品共享,资产资源共享,财富共享,社会共享。
锥体区块链的数据层、网络层、共识层、合约层、应用层,组成锥体区块整个生态系统。
进一步的,锥体区块链的数据层、网络层、构成锥体区块链的底层技术架构。
进一步的,锥体区块链应用层的终端、基础层、许可资格层、产品层、资产、身份解析层、信用层、共享层、共同组成应用层层级架构。
锥体区块链底层技术架构与应用层层级架构的分层应用组成锥体区块链的子系统。
锥体区块链底层技术数据结构和分层方法:
S1、锥体区块链的区块按共识层的同列共识关系与扇形列式的每个区块连接,即区块的上级区块和多个下级区块连接。
S2、锥体区块链的区块按共识层的同列同层和非列同层关系建立同列同层和非列同层连 接,形成锥体分层级链式数据结构。
S3、按区块的非列非同层关系,建立区块间的跨列跨层级的连接。
S4、共识存储的关联共识关系,将数据内容分层存储于锥体区块的各区块,用动态密钥和非对称加密方法,形成锥体区块链加密链式网络。
S5、网络层实现锥体区块链的区块点对点的双向认证和点对点广播数据传输,按验证机制进行广播传输的数据验证。
S6、按共识关系、一致性共识算法建立锥体区块网络。
S7、按合约层的脚本代码,算法机制,智能合约,自动实现锥体区块链的广播数据传输。
如图3所示,锥体区块应用层的分层应用方法:
S1、锥体区块链终端以个人身份发起请求,在锥体区块链的人证机合一认证区块进行人证机合一认证,认证通过后,发送到证号对应的个人身份认证区块进行生物识别和终端采集活体对比进行身份信息认证。认证信息返回终端显示认证信息。
S2、锥体区块链终端以法人身份发起请求,经注册的人证机合一认证区块认证通过后,发送至证号对应的法人代表或法人授权代表。个人注册的身份认证区块进行与终端采集活体生物信息比对,比对通过后发送至法人注册的认证区块进行法人身份信息认证。认证通过后,发送认证信息至终端。认证信息返回终端显示认证信息。
S3、锥体区块链终端发起请求,在应用层根据认证信息,开启锥体区块链密钥。
S4、锥体区块链应用层的许可资格层是终端层以个人身份或法人身份发出请求,基础层认证通过后,发送至个人或法人对应的许可或资格认证区块进行身份对应的许可或资格认证,认证通过后将认证信息发送至终端。
S5、产品层和终端层发出请求,基础层认证通过后,是许可产品的进行许可认证,认证通过后发送至产品生产的法人二级单元区块进行产品信息认证,认证后将认证信息发送至终端
S6、资产解析层和终端发送认证请求,经基础层区块的认证,是许可产品的资产的,经许可层区块的认证,再经产品层区块的认证,是产品和流转区块认证和是备案资产的,经资格备案层认证,将认证信息返回终端。
S7、信用层终端层发出请求,基础层认证通过,是许可产品的进行许可层认证,通过后发送产品层认进行产品和产量认证,发送至资产层进行销售量认证,资产注册备案认证和金融有关认证后,发送认证信息返回终端。
S8、共享层和终端层发送请求,基础层认证发送许可层,许可层认证发送产品层,产品层认证发送资产层,资产层认证发送信用层,在产品生产量,销量认证基础上实现产品的共 享,在资产认证及注册备案认证的基础上实现资产的共享,在金融认证的基础上实现价值的共享。
进一步的,锥体区块链基础认证为个人身份认证和法人身份认证
进一步的,锥体区块链终端认证为人证机合一认证。
上述锥体区块以及锥体区块链在专利申请号为202010797084.1的一种锥体区块、锥体区块链结构和方法中记载了详细的说明,故在此进行简要说明:
如图4和5所示,区块为锥体区块的顶层区块;分项单元区块为锥体区块的中层区块,属于区块的分类区块,是区块的子区块;用户区块为锥体区块的底层区块。
锥体区块中的每个子区块是由区块头和区块体组成,其中区块头主要含有区块编码、关联区块哈希值、服务网络地址、服务器标识、时间戳、管理员信息哈希值、区块内容哈希值,区块体含有管理员信息,区块内容。其中管理员信息包括,管理员的注册、更改、注销;区块内容包括验证内容、关联验证内容、其他区块内容。
用户区块根据自身服务内容,如提供公共平台的,可申请二级单元区块及二级用户区块;用户区块、二级单元区块和二级用户区块之间也构成锥体区块。有些机构也存在没有用户区块,或者没有分项单元区块的情况。
锥体区块链结构,包括若干锥体区块,其中有一个锥体区块为总锥体区块,其它锥体区块按照所属类别或性质进行划分:同一类别或性质的锥体区块位于同一列,且同一列上各锥体区块中的区块连接形成线形链;根据所属类别或性质的不同,形成若干列的线形链;不同列的线形链之间相交于总锥体区块中的区块,整体构成锥体区块链结构。
同一条列上的锥体区块按照等级分层并按照关联共识关系形成一个私有链;不同列的线形链按照共识关系形成锥体联盟链;等级相同的锥形区块在同一层,即同一条列上的同一层上包括一个以上等级相同的锥形区块。
私有链:同一性质的机构,位于锥体区块链的同一列,各个锥体区块按照共识关系形成私有链;联盟链:不同性质的机构,位于锥体区块链的不同列,各个锥体区块按照共识关系形成联盟链;具体的:可按照权属等级(或从属等级)分为不同的层级3-6。
例如:山西省公安,朔州市公安,平鲁区公安之间连接是私有链;山西省公安,山西省民政局,山西省劳动局,等等之间连接是联盟链。
层级关系从上向下为:区块、分项单元区块、用户区块、二级单元区块、二级用户区块、微区块。
区块、分项单元区块和用户区块分别生成有各自对应的管理员及管理员哈希值,其中区块管理员哈希值包含下级分项单元区块管理员的哈希值,分项单元区块管理员哈希值包含下 级用户区块管理员哈希值;各管理员中的信息变化可以形成哈希值并通过锥体区块链进行广播。
每次登陆时,均通过锥体区块链客户端采集活体生物信息;并将采集的活体生物信息结合个人身份认证区块认证通过的用户信息、时间戳、随机数,经过哈希运算生成私钥;私钥为动态生成的,每次登录形成不同的私钥;私钥生成后形成公钥。
私钥生成后,通过椭圆曲线算法生成公钥;公钥和时间戳信息哈希运算形成锥体区块链客户端地址,私钥保存在锥体区块链客户端,公钥发送在锥体区块链网络中。
上面仅对本发明的较佳实施例作了详细说明,但是本发明并不限于上述实施例,在本领域普通技术人员所具备的知识范围内,还可以在不脱离本发明宗旨的前提下作出各种变化,各种变化均应包含在本发明的保护范围之内。

Claims (10)

  1. 一种锥体区块链的层级架构,其特征在于:包括数据层、网络层、共识层、合约层和应用层组成;
    所述数据层实现数据存储的安全性和数据的一致性;
    所述网络层封装有锥体区块链系统组网方式;
    所述共识层用于实现锥体区块链系统的共识,封装有共识算法;
    所述合约层封装有锥体区块链的脚本代码、算法以及智能合约;
    所述应用层封装了锥体区块链的各种应用场景和案例。
  2. 根据权利要求1所述的一种锥体区块链的层级架构,其特征在于:所述数据层封装有锥体数据区块,锥体链式结构、时间戳、随机数、哈希函数、动态密钥、非对称加密和共识存储。
  3. 根据权利要求1所述的一种锥体区块链的层级架构,其特征在于:所述网络层实现锥体区块链的区块点对点的双向认证和点对点广播数据传输,按验证机制进行广播传输的数据验证;按共识关系、一致性共识算法、建立锥体区块链。
  4. 根据权利要求1所述的一种锥体区块链的层级架构,其特征在于:所述共识层实现各区块共识关系连接,形成锥体区块链加密链式网络,其中锥体区块链的区块按共识层的同列共识关系与其它区块连接;锥体区块链的区块按共识层的同列同层和非列同层关系建立同列同层和非列同层连接,形成锥体分层级链式数据结构;按区块非列非同层关系,建立区块间的跨列跨层级的连接。
  5. 根据权利要求1所述的一种锥体区块链的层级架构,其特征在于:所述合约层包括脚本代码,算法机制,智能合约,自动实现锥体区块链的广播和数据传输。
  6. 根据权利要求1所述的一种锥体区块链的层级架构,其特征在于:应用层封装有锥体区块链终端层、基础层、许可资格层、产品层、资产解析层、信用层和共享层。
  7. 根据权利要求6所述的一种锥体区块链的层级架构,其特征在于:
    终端层包括PC机终端、移动终端、传感器终端和数据终端中的任一个或多个;
    基础层包括人证机合一区块认证区块、个人身份认证区块、法人身份认证区块;
    许可资格层包括许可认证区块、资格认证区块、身份关系证明区块;
    产品层包括生产经营法人用户区块、货币发行和金融法人用户区块;
    资产解析层包括产品属性、货币属性、价值流转锥体身份备案与解析;
    信用层包括个人信用、法人信用和社会信用;
    共享层包括产品共享、资产资源共享、财富共享和社会共享。
  8. 根据权利要求6所述的一种锥体区块链的层级架构,其特征在于,所述应用层的分层 应用方法,包括以下步骤:
    锥体区块链终端发起请求,在应用层根据认证信息,开启锥体区块链密钥;
    锥体区块链应用层的许可资格层是终端层以个人身份或法人身份发出请求,基础层认证通过后,发送至个人或法人对应的许可或资格认证区块进行身份对应的许可或资格认证,认证通过后将认证信息发送至终端;
    产品层和终端层发出请求,基础层认证通过后,是许可产品的进行许可认证,认证通过后发送至产品生产的法人二级单元区块进行产品信息认证,认证后将认证信息发送至终端;
    资产解析层和终端发送认证请求,经基础层区块的认证,是许可产品的资产的,经许可层区块的认证,再经产品层区块的认证,是产品和流转区块认证和是备案资产的,经资格备案层认证,将认证信息返回终端;
    信用层终端层发出请求,基础层认证通过,是许可产品的进行许可层认证,通过后发送产品层认进行产品和产量认证,发送至资产层进行销售量认证,资产注册备案认证和金融有关认证后,发送认证信息返回终端;
    共享层和终端层发送请求,基础层认证发送许可层,许可层认证发送产品层,产品层认证发送资产层,资产层认证发送信用层,在产品生产量,销量认证基础上实现产品的共享,在资产认证及注册备案认证的基础上实现资产的共享,在金融认证的基础上实现价值的共享。
  9. 根据权利要求8所述的一种锥体区块链的层级架构,其特征在于:锥体区块链终端以个人身份发起请求,在锥体区块链的人证机合一认证区块进行人证机合一认证,认证通过后,发送到证号对应的个人身份认证区块进行生物识别和终端采集活体对比进行身份信息认证;认证信息返回终端显示认证信息。
  10. 根据权利要求8所述的一种锥体区块链的层级架构,其特征在于:锥体区块链终端以法人身份发起请求,经注册的人证机合一认证区块认证通过后,发送至证号对应的法人代表或法人授权代表;个人注册的身份认证区块进行与终端采集活体生物信息比对,比对通过后发送至法人注册的认证区块进行法人身份信息认证;认证通过后,发送认证信息至终端;认证信息返回终端显示认证信息。
PCT/CN2021/120041 2020-11-11 2021-09-24 一种锥体区块链的层级架构 WO2022100291A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011256084.7 2020-11-11
CN202011256084.7A CN112199445B (zh) 2020-11-11 2020-11-11 一种锥体区块链的层级架构

Publications (1)

Publication Number Publication Date
WO2022100291A1 true WO2022100291A1 (zh) 2022-05-19

Family

ID=74034177

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/120041 WO2022100291A1 (zh) 2020-11-11 2021-09-24 一种锥体区块链的层级架构

Country Status (2)

Country Link
CN (1) CN112199445B (zh)
WO (1) WO2022100291A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115495714A (zh) * 2022-09-14 2022-12-20 湖南大学 基于区块链的金融人工智能算法集成方法及系统

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199445B (zh) * 2020-11-11 2023-06-23 山西特信环宇信息技术有限公司 一种锥体区块链的层级架构
CN112750032A (zh) * 2021-01-29 2021-05-04 山西特信环宇信息技术有限公司 一种基于锥体区块链的现金管理系统及其上链方法
CN113360445B (zh) * 2021-07-07 2022-11-04 上海万向区块链股份公司 基于区块链技术的锂离子电池数据采集共享装置

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108305056A (zh) * 2018-03-27 2018-07-20 搜游网络科技(北京)有限公司 基于区块链的数据处理方法、装置及区块链节点网络
CN108337219A (zh) * 2017-11-27 2018-07-27 中国电子科技集团公司电子科学研究院 一种物联网防入侵的方法和存储介质
CN108596766A (zh) * 2018-04-28 2018-09-28 深圳市优学链科技有限公司 区块链信用评级方法、装置、计算机设备及存储介质
CN108764925A (zh) * 2018-05-31 2018-11-06 李沁福 一种基于区块链技术的综合业务平台
CN109118168A (zh) * 2018-07-20 2019-01-01 北京开普云信息科技有限公司 一种基于区块链机制的政务服务过程追溯系统及其构建方法
CN109379266A (zh) * 2018-09-29 2019-02-22 湖南智慧政务区块链科技有限公司 一种基于星型网络的多层政务区块链网络构建方法及其系统
CN109472593A (zh) * 2018-10-10 2019-03-15 远光软件股份有限公司 一种基于区块链技术的结算方法、装置及区块链网络
CN109560938A (zh) * 2019-01-23 2019-04-02 广州微盾科技股份有限公司 基于指人体生物特征识别技术的区块链系统
CN109859046A (zh) * 2019-01-30 2019-06-07 威海华智数字经济研究院有限公司 一种基于区块链技术大数据智慧运营管理系统
US20190347656A1 (en) * 2018-05-10 2019-11-14 Alibaba Group Holding Limited Blockchain member management data processing methods, apparatuses, servers, and systems
CN111461879A (zh) * 2020-03-11 2020-07-28 中关村科技软件股份有限公司 一种基于区块链的政务服务处理系统和方法
WO2020172843A1 (zh) * 2019-02-20 2020-09-03 中国互联网络信息中心 一种基于区块链多方共治的域名信息维护系统
CN112199445A (zh) * 2020-11-11 2021-01-08 山西特信环宇信息技术有限公司 一种锥体区块链的层级架构

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147735B (zh) * 2017-05-12 2020-08-11 北京博晨技术有限公司 一种基于分层结构的分布式账本系统
CN110019347B (zh) * 2018-01-02 2021-05-25 中国移动通信有限公司研究院 一种区块链的数据处理方法、装置及终端设备
CN110097445A (zh) * 2018-12-11 2019-08-06 周晓辉 基于区块链的互联网金融云端交易平台及实现方法
CN110609674A (zh) * 2019-08-19 2019-12-24 杭州云象网络技术有限公司 一种基于区块链技术的共生信息物理系统构建方法
CN111049895B (zh) * 2019-12-09 2022-06-03 北京工商大学 一种基于ism的改进pbft共识方法
CN111371905B (zh) * 2020-03-27 2023-08-01 中国人民解放军国防科技大学 一种基于云计算的区块链分层共识证明系统与方法
CN111444277B (zh) * 2020-03-31 2023-09-12 中国刑事警察学院 一种基于区块链技术的反恐情报协同共享平台及方法

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108337219A (zh) * 2017-11-27 2018-07-27 中国电子科技集团公司电子科学研究院 一种物联网防入侵的方法和存储介质
CN108305056A (zh) * 2018-03-27 2018-07-20 搜游网络科技(北京)有限公司 基于区块链的数据处理方法、装置及区块链节点网络
CN108596766A (zh) * 2018-04-28 2018-09-28 深圳市优学链科技有限公司 区块链信用评级方法、装置、计算机设备及存储介质
US20190347656A1 (en) * 2018-05-10 2019-11-14 Alibaba Group Holding Limited Blockchain member management data processing methods, apparatuses, servers, and systems
CN108764925A (zh) * 2018-05-31 2018-11-06 李沁福 一种基于区块链技术的综合业务平台
CN109118168A (zh) * 2018-07-20 2019-01-01 北京开普云信息科技有限公司 一种基于区块链机制的政务服务过程追溯系统及其构建方法
CN109379266A (zh) * 2018-09-29 2019-02-22 湖南智慧政务区块链科技有限公司 一种基于星型网络的多层政务区块链网络构建方法及其系统
CN109472593A (zh) * 2018-10-10 2019-03-15 远光软件股份有限公司 一种基于区块链技术的结算方法、装置及区块链网络
CN109560938A (zh) * 2019-01-23 2019-04-02 广州微盾科技股份有限公司 基于指人体生物特征识别技术的区块链系统
CN109859046A (zh) * 2019-01-30 2019-06-07 威海华智数字经济研究院有限公司 一种基于区块链技术大数据智慧运营管理系统
WO2020172843A1 (zh) * 2019-02-20 2020-09-03 中国互联网络信息中心 一种基于区块链多方共治的域名信息维护系统
CN111461879A (zh) * 2020-03-11 2020-07-28 中关村科技软件股份有限公司 一种基于区块链的政务服务处理系统和方法
CN112199445A (zh) * 2020-11-11 2021-01-08 山西特信环宇信息技术有限公司 一种锥体区块链的层级架构

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115495714A (zh) * 2022-09-14 2022-12-20 湖南大学 基于区块链的金融人工智能算法集成方法及系统

Also Published As

Publication number Publication date
CN112199445A (zh) 2021-01-08
CN112199445B (zh) 2023-06-23

Similar Documents

Publication Publication Date Title
WO2022100291A1 (zh) 一种锥体区块链的层级架构
CN109326337A (zh) 基于区块链的电子医疗记录存储和共享的模型及方法
Zhou et al. Med-PPPHIS: blockchain-based personal healthcare information system for national physique monitoring and scientific exercise guiding
Vivekanadam Analysis of recent trend and applications in block chain technology
di Vimercati et al. Managing and accessing data in the cloud: Privacy risks and approaches
CN111988338B (zh) 基于区块链的权限可控的物联网云平台及数据交互方法
Wang et al. Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches
CN109409100B (zh) 应用于医疗数据的信息存储和共享平台
TW202029086A (zh) 基於區塊鏈的存證方法和裝置
WO2022063172A1 (zh) 一种锥体区块链管理方法及系统
CN110545273B (zh) 一种基于区块链应用的资源分配方法及系统
Liu et al. A donation tracing blockchain model using improved DPoS consensus algorithm
CN111506590A (zh) 一种数字作品版权确权与交易可信记录管理方法
WO2019237840A1 (zh) 数据集生成方法及装置
CN115883214A (zh) 基于联盟链和cp-abe的电子医疗数据共享系统及方法
CN112801778A (zh) 联盟式不良资产区块链
WO2022142514A1 (zh) 一种锥体区块链的主权联盟链
Anitha et al. The integration of blockchain with IoT in smart appliances: a systematic review
Jamsrandorj Decentralized Access Control Using The Blockchain
CN114741734B (zh) 一种药品防伪溯源云链数据多方安全计算方法
CN112199729B (zh) 一种锥体区块链的验证方法及系统
CN116305316A (zh) 一种基于联盟链实现智慧建造的数据管理方法
CN112751662B (zh) 一种锥体区块链的共享链
Fathiyana et al. Prototype of Integrated National Identity Storage Security System in Indonesia using Blockchain Technology
Zhai et al. A review of Blockchain-based access control for the industrial IoT

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21890819

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21890819

Country of ref document: EP

Kind code of ref document: A1