[go: up one dir, main page]

CN114418574A - Consensus and resource transmission method, device and storage medium - Google Patents

Consensus and resource transmission method, device and storage medium Download PDF

Info

Publication number
CN114418574A
CN114418574A CN202210061763.1A CN202210061763A CN114418574A CN 114418574 A CN114418574 A CN 114418574A CN 202210061763 A CN202210061763 A CN 202210061763A CN 114418574 A CN114418574 A CN 114418574A
Authority
CN
China
Prior art keywords
network
transaction
node
data
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210061763.1A
Other languages
Chinese (zh)
Inventor
古莹莹
江漫滔
肖世校
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Tanhong Information Technology Co ltd
Original Assignee
Xiamen Tanhong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=72197110&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN114418574(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Xiamen Tanhong Information Technology Co ltd filed Critical Xiamen Tanhong Information Technology Co ltd
Publication of CN114418574A publication Critical patent/CN114418574A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/085Payment architectures involving remote charge determination or related payment systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a consensus and resource transmission method, a device and a storage medium, belonging to the technical field of data sharing. Analyzing and verifying more than one first transaction passing the verification, judging whether the first transaction is a transaction containing a node request for joining, if so, receiving a response message of the node requesting for joining according to a first transaction content at least comprising a consensus method required by the node requesting for joining and the identity of the node requesting for joining, judging whether the node requesting for joining agrees, and if so, distributing the first transaction and a transaction packaging uplink comprising the node requesting for joining to a first network; if not, the first transaction and the transaction packaging uplink comprising the node which requests to join are refused to be distributed to the first network; and if the first transaction is not a transaction containing the node request for joining, packaging and linking the first transaction. The technical problems of multiple activities in different places and data conflict can be solved during resource transmission.

Description

Consensus and resource transmission method, device and storage medium
Prior parent application No.: 202010551115.5, respectively;
subject name of mother case: a consensus and resource transmission method, apparatus and storage medium;
application date of the parent: 2020-06-16.
Technical Field
The present invention relates to the field of data sharing technologies, and in particular, to a consensus and resource transmission method, device, and storage medium.
Background
In order to promote social progress and improve the knowledge level of people, the state establishes advanced education institutions, opens various network teaching platforms, vigorously supports various education and teaching institutions, encourages the development of resource providers of professional technical websites and other types, expands the knowledge area of people and improves the skills of people. Resources of different education platforms and education institutions have characteristics, are operated and maintained independently of one another and are not shared with one another, and therefore, the resources or knowledge acquirers are inconvenient. In addition, the database data of different types of resource providers is numerous and complicated, and is managed by a centralized system and stored in hardware; the method is difficult to deal with various complex network attacks and limited by the defect of a centralized system, and resource data are easy to lose and easy to be distorted; the hardware storage mode has the problems of high cost, limited reading speed, difficulty in meeting the requirements of a resource acquirer and the like. In addition, the existing communication service field has similar problems, several operators are independent of each other, integration of three networks is always a difficult point in the existing domestic communication field, the hardware infrastructure transformation cost is high, the software network system is difficult to realize, and the like.
The block chain network system is introduced under various scenes due to the technical effects of safety, difficult tampering and the like, so that the technical problem that resources, information or data and the like are easy to modify under various scenes is solved, but the common identification process is time-consuming, the speed is low in the actual implementation process, and few technical schemes run well.
Disclosure of Invention
1. Technical problem to be solved by the invention
In order to overcome the technical problems, the invention provides a consensus and resource transmission method, a device and a storage medium. The technical problems of multiple activities in different places and data conflict can be solved during resource transmission, value and data resource transmission, sharing and distribution can be realized in a chain-crossing mode, and data and value resource transmission and sharing among different platform mechanisms can be realized.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
the first aspect proposes a consensus method, which is applicable to a root chain node: analyzing and verifying more than one first transaction passing the verification, judging whether the first transaction is a transaction containing a node request for joining, if so, carrying out network fragmentation on the node requesting for joining according to a first transaction content at least comprising a consensus method required by the node requesting for joining and the identity of the node requesting for joining, and distributing the node requesting for joining to a first network; sending a message for distributing the node requesting to join to the first network to the node requesting to join; receiving a response message of the node requesting to join, judging whether the node requesting to join agrees, if so, distributing the first transaction and the transaction package uplink comprising the node requesting to join to the first network; if not, the first transaction and the transaction packaging uplink comprising the node which requests to join are refused to be distributed to the first network; if the first transaction is not a transaction containing a node request to join, packaging and linking the first transaction; the root chain and any piece network are one of a public chain, a alliance chain and a private chain.
Optionally, the identity of the node requesting to join includes a physical IP address of the node requesting to join and a type of the node requesting to join, and a principle of allocating the node requesting to join to the first network by performing network fragmentation on the node requesting to join is as follows: the consensus method required by the node requesting to join is consistent with the consensus method of the first network, and the networking principle of the first network is met; network fragmentation is carried out on the node which is requested to be added through the physical IP address and the type of the node which is requested to be added by the root link node; or, a plurality of intelligent contracts are arranged on the root chain, and the intelligent contracts are used for setting node joining rules and networking principles of the fragmentation network.
Optionally, the communication mode of the method is MQTT.
Optionally, communication between the fragmentation networks is forwarded by various intelligent contracts deployed on the root chain, flexible traffic load seamless switching is realized between the nodes, intelligent traffic management and distribution are realized inside the cluster nodes, and internet traffic is load-balanced to a plurality of nodes.
Optionally, if the node requesting to join agrees to join the first network, the method further includes: the node agreeing to the requested join configures an API interface for receiving and sending the first network message that requires authentication.
Optionally, a user token verification mode is adopted for the data interface of the B/S architecture, and a verification interface mode is adopted for the data interface of the C/S architecture.
Optionally, the timestamp of the national time service center of the Chinese academy is used for the first transaction, the block containing the first transaction, and the packaged chain of the transactions.
Optionally, after the first transaction verification is passed, the first transaction hash values are packed into a block uplink, and the first transaction is stored in a cloud computing or fog computing space corresponding to the root chain.
A second aspect provides a consensus method, which is applicable to a node in a segment network: receiving and verifying the second transaction, and packaging and chaining the second transaction after the second transaction passes verification according to a consensus algorithm established by the established fragmentation network; the time stamps of the national time service center of the Chinese academy are adopted when the second transaction and the block containing the second transaction are constructed; wherein the second transaction may be an asset transaction or a non-asset transaction; the root chain and any piece network are one of a public chain, a alliance chain and a private chain.
Optionally, the communication mode of the method is MQTT.
Optionally, communication between the fragmentation networks is forwarded by various intelligent contracts deployed on the root chain, flexible traffic load seamless switching is realized between the nodes, intelligent traffic management and distribution are realized inside the cluster nodes, and internet traffic is load-balanced to a plurality of nodes.
Optionally, a user token verification mode is adopted for the data interface of the B/S architecture, and a verification interface mode is adopted for the data interface of the C/S architecture.
Optionally, the consensus method corresponding to the segment network is constructed on each segment network in an intelligent contract or node configuration application manner.
Optionally, the timestamp of the national time service center of the Chinese academy is used for the first transaction, the block containing the first transaction, and the packaged chain of the transactions.
A third aspect provides a resource transmission method, which is applicable to a node in a slice network: identifying and verifying the identity of the access party, and if the identity of the access party is verified to be passed, opening an API (application program interface) of the first network or the second network for the access party; judging the request type of an access party, if the request is a resource data uploading request, performing hash operation on resource data to obtain a resource data hash value, chaining the resource data hash value, adding the resource data into a timestamp of a national time service center of a Chinese academy, and storing the resource data in a cloud computing or fog computing storage space through an API (application program interface) of a first network or a second network;
and if the resource data is the resource data acquisition request, acquiring the resource data from the cloud computing or fog computing storage space through an API (application program interface) of the first network or the second network, comparing whether the hash value of the data resource is consistent with the hash value of the data resource data after chain linking through hash operation, and if so, sending the resource data to the access party.
Optionally, in the verification, a user verification token mode is adopted for a data interface of the B/S architecture; and for the data interface of the C/S architecture, a verification interface mode is adopted.
Optionally, the nodes of the first network or the second network include a fog computing node, a cloud computing center node, and an edge computing node.
Optionally, the verification interface mode is used for interface verification when the first network and the second network transmit data.
Optionally, the uplink of the resource data hash value is: and constructing a third transaction comprising a request for uploading the resource data and a resource data hash value, packaging the third transaction into a block after the third transaction is verified on a corresponding fragmentation network, and constructing the third transaction and the block comprising the third transaction by adopting a timestamp of a national time service center of the Chinese academy and combining the third transaction hash value and the block hash value comprising the third transaction.
Optionally, the method further includes: the process of encrypting the identity of the access party comprises the steps of sequentially carrying out Hash operation and AES256 algorithm operation on the identity of the access party, and chaining in the first network or the second network; correspondingly, the method for automatically identifying and verifying the identity of the access party is a token verification mode or an interface verification mode of the access party.
A fourth aspect provides a resource transmission method, which is applicable to a node of a root chain, and includes: when the resources are data resources, the data resources are stored in a cloud computing or fog computing storage space which can be accessed and acquired by a root chain; after receiving a request for acquiring resources sent by a node on the fragment network, the root link acquires corresponding resources from a cloud computing or fog computing storage space and transmits the corresponding resources to a client of the corresponding node on the fragment network, wherein the client needs to acquire the resources; the root chain and any piece network are one of a public chain, a alliance chain and a private chain.
Optionally, when the resource data is stored in a cloud computing or fog computing storage space accessible and acquired by the root chain through the API interface, the resource data is added to a timestamp of the national time service center of the Chinese academy.
Optionally, the intelligent contract on the root chain is used for managing the transfer flow of the cross-piece operation, or is used for charging a commission fee in the cross-piece transfer process.
Optionally, the nodes of the root chain adopt a gateway separation technology, and a client accesses each data center node through the root chain, a fragmentation network and a storage space of cloud computing or fog computing in a three-layer network; the data center nodes comprise fog computing nodes, cloud computing center nodes or edge computing nodes.
Optionally, in the inter-center storage network intercommunication, the virtual machines corresponding to the root link nodes use a dynamic DNS resolution technology, and different service IP addresses are presented in different data centers through the SLB devices.
Optionally, the SLB device periodically detects the survival status of the server/virtual machine at the root link node, and when the detection result is normal, the SLB device issues a host route of the server/virtual machine address to the backbone network; and when the checking result is abnormal, withdrawing the host route.
Furthermore, the present invention provides an electronic device, comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Accordingly, the present invention provides a storage medium storing a computer program which, when executed by a processor, implements a method as claimed in any one of the above.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
distributed cloud computing based on blockchains may employ a consensus mechanism of blockchains, i.e., token transactions between participants are triggered by off-chain activities, such as providing data sets in real time, transferring files, performing computations, providing professional services, and the like. All computing resource-related providers (computing facilitators, data providers, application providers) are provided with a trusted platform for value or data resource sharing transactions. A unique consensus protocol is integrated to ensure the credibility of the platform and the safety of data on the platform, and application programs in multiple fields including high-performance computing to the Internet of things are supported.
Drawings
Fig. 1 is a schematic structural diagram of an electronic device according to the present invention.
FIG. 2 is a schematic flow chart of a consensus method.
Fig. 3 is a flowchart illustrating a resource transmission method.
Detailed Description
For a further understanding of the present invention, reference will now be made in detail to the embodiments illustrated in the drawings.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, and have no specific limiting effect, but are all generic terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
A consensus method is applied to a root chain node, as shown in fig. 2: s101, analyzing more than one first transaction passing verification; s102, judging whether the first transaction is a transaction containing a node request for joining, if so, S103, carrying out network fragmentation on the node request for joining according to a first transaction content at least comprising a consensus method required by the node request for joining and an identity of the node request for joining, and distributing the node request for joining to a first network; s104, sending a message for distributing the node requesting to join to a first network to the node requesting to join; s105, receiving a response message of the node requesting to join; s106, judging whether the node requesting to join agrees, if so, S1061, allocating the first transaction and the transaction packaging uplink comprising the node requesting to join to the first network; if not, S1062, the first transaction and the transaction-packed uplink including the node which requests to join are refused to be distributed to the first network; if the first transaction is not a transaction including a node request to join, S107, the first transaction is packaged and linked.
Optionally, the first transaction and the block containing the first transaction are constructed by using timestamps of national time service centers of Chinese academy; the first transaction and the hash operation applied to the block containing the first transaction are combined to ensure the uniqueness of the first transaction and the block containing the first transaction so as to prevent the occurrence of a data collision phenomenon when data and value resources are inquired, accessed and acquired subsequently; the remote multi-active resource transmission speed is improved, and the time delay is reduced. And after the first transaction verification is passed, packaging the first transaction hash values into block uplink, and storing the first transaction in a cloud computing or fog computing space corresponding to the root chain.
The communication between the fragmentation networks is forwarded by various intelligent contracts deployed on a root chain, flexible flow load seamless switching is realized among nodes, and intelligent flow management and distribution are realized inside cluster nodes. Based on the principle of root chain priority, double-layer logic is adopted, namely not only a node network interface with the best experience is selected for a user, but also the load of internet traffic is balanced to a plurality of nodes. When a certain node network interface fails, the client flow can be guided to a suboptimal node network interface immediately. The architecture allows for the use of "hopping" to form new routes for messages to reach the destination of transmission when a node in the network topology is dead or out of service. The intelligent contract is utilized to carry out intelligent flow distribution and management on the application system, and meanwhile, flexible application deployment and seamless communication among different networks are provided.
The root chain is used for building the fragment network, adding and exiting the fragment network nodes, distributing and managing the fragment network nodes, and controlling the two-layer block chain system from the source so as to keep the excellent characteristics of the block chain network, such as decentralization, non-falsification and the like, provide the opportunity of fair and fair participation in consensus for each independent node without the defects in the POC consensus method. The consensus algorithm of the fragmentation network is not limited, and can be any one of the existing consensus algorithms, so that the application requirements of different operators on different application scenes are met, and the consensus algorithm is flexible and changeable.
If the node requesting to join agrees to join the first network, the method further comprises the following steps: the node agreeing to the requested join configures an API interface for receiving and sending the first network message that requires authentication. By setting an API interface and adding identity authentication, secondary login is prevented, the risk problems of network attack and the like are solved, and meanwhile, the hash operation and the DTS time stamp of the root link node are combined, so that the remote multi-activity is ensured, and data conflict is prevented.
The root chain is formed by a plurality of virtual machine networking networks positioned on a plurality of hardware devices, is a point-to-point distributed computing network, can construct an intelligent contract, and can transmit virtual currency resources carrying commercial values and data resources.
Network fragmentation is the division of the entire blockchain network into multiple sub-networks, one for each sub-network. In the embodiment, the root chain forms a plurality of fragment networks respectively through dividing nodes requesting to join, such as a first network, a second network, a third network and the like, wherein the different fragment networks have different consensus methods and different node admission conditions.
The node identity requesting the joining comprises a physical IP address of the node requesting the joining and the type of the node requesting the joining. The principle of performing network fragmentation on the node requesting to join and allocating the node requesting to join to the first network is as follows: the consensus method required by the node requesting to join is consistent with the consensus method of the first network, and the networking principle of the first network is met.
By the physical IP address and the type of the node requesting to join, the node requesting to join is subjected to network fragmentation by the root chain node, and dual constraints of networking principles are added, so that the excellent characteristics of the block chain are maintained, the occurrence of a local centralization condition is avoided, and the node right is ensured to be fair and fair in size.
As an optional implementation manner of this embodiment, the communication mode of the consensus method is MQTT. On the basis of network fragmentation, each fragmentation network independently uses MQTT for real-time communication, and all network fragments are protected by a root chain by the common identification method, so that the safety of each fragmentation network in the whole system is high, and even a newly added fragmentation network is immediately protected by the root chain. The protection mode is that a user token verification mode is adopted for a data interface of the B/S architecture, a verification interface mode is adopted for a data interface of the C/S architecture, and double encryption is carried out through an AES256 algorithm and a Hash algorithm, so that risks such as malicious communication attack and the like are prevented, and the communication transmission safety is ensured; furthermore, in combination with the consensus approach described above, there is no risk of security mechanisms to drastically change MQTT.
The greatest advantage of MQTT is its common subscription message queuing mechanism and many-to-many broadcast capability. The support of long-acting TCP connection pointing to MQTT proxy end makes the MQTT message receiving and sending with limited bandwidth simple and easy. Has the following main characteristics:
providing decoupling between one-to-many message publishing and application programs using a publish/subscribe message model;
secondly, the message transmission does not need to know the load content;
thirdly, providing network connection by using TCP/IP;
and fourthly, the service quality of three kinds of message issuing exists.
In an optional embodiment, the consensus method running on any node of a fragmented network, such as the first network, the second network, or the third network, includes: receiving and verifying the second transaction, and packaging and chaining the second transaction after the second transaction passes verification according to a consensus algorithm established by the established fragmentation network; the time stamps of the national time service center of the Chinese academy are adopted when the second transaction and the block containing the second transaction are constructed; the second transaction and the hash operation applied to the block containing the second transaction are combined to ensure the uniqueness of the second transaction and the block containing the second transaction so as to prevent the data collision phenomenon during subsequent inquiry, access and acquisition of data and value resources; the remote multi-active resource transmission speed is improved, and the time delay is reduced. The second transaction may be an asset transaction including a virtual value resource in the value transmission, or a non-asset transaction in the aspects of data storage, reading, access, and the like.
The root chain and a plurality of first networks, second networks, third networks and other slice networks, as well as all slice networks, such as the first network, the second network, the third network and the like, all adopt the communication mode of MQTT, a corresponding consensus method on the root chain is constructed on a networking virtual machine of the root chain in the mode of intelligent contracts, a corresponding consensus algorithm of the slice networks is constructed on all slice networks in the mode of intelligent contracts or node configuration application, the potential safety hazard of the MQTT can be overcome while utilizing the advantages of the MQTT, and the safety of a constructed double-layer block chain network system of the root chain and the slice networks is ensured by the consensus method of the root chain and the slice networks, interface verification, and the uniqueness of a time stamp and a Hash operation result of a national time center of Chinese academy. The transmission speed is improved, meanwhile, various network attacks can be resisted, and the network security and the data security are ensured.
A resource transmission method, as shown in FIG. 3, is applicable to any node in fragmented networks such as a first network, a second network, a third network, etc., S201, identifies and verifies the identity of an access party, and if the identity of the access party passes verification, opens an API interface of the first network or the second network for the access party; s202, judging whether the request type of the access party is a resource data uploading request, if so, S203, performing hash operation on the resource data to obtain a resource data hash value, chaining the resource data hash value, and storing the resource data into a cloud computing or fog computing storage space through an API (application program interface) of a first network or a second network; if the resource data is the resource data acquisition request, acquiring the resource data from the cloud computing or fog computing storage space through the API of the first network or the second network, and comparing whether the hash value of the data resource is consistent with the hash value of the data resource data after uplink through hash operation, and if so, sending the resource data to the access party.
The resource data hash value chaining includes but is not limited to: the method comprises the steps of establishing a third transaction containing a resource data uploading request and a resource data hash value, packaging the third transaction into a block after the third transaction passes verification on a corresponding fragmentation network, adopting a timestamp of a national time service center of a Chinese academy when the third transaction and the block containing the third transaction are established, ensuring uniqueness of an uplink transaction by combining the third transaction hash value and the block hash value containing the third transaction, ensuring that the uplink data cannot be tampered by utilizing a decentralized consensus method, and verifying data access stored in a cloud computing or fog computing storage space or obtaining uniqueness by hash value comparison to prevent data collision.
And when the resource data are stored in the cloud computing storage space through the API, adding a timestamp of the national time service center of the Chinese academy. So as to ensure the uniqueness of the resource data and prevent data collision.
The verification adopts a user verification token mode for a data interface of the B/S architecture; and for the data interface of the C/S architecture, a verification interface mode is adopted.
The verification interface mode is a process of identifying and verifying the identity of an access party, and comprises the following steps: the access party carries out Hash operation on the encryption key to be verified to obtain an encryption key Hash value to be verified, the obtained encryption key Hash value is compared with the encryption key Hash value of the uplink in the first network or the second network, if the obtained encryption key Hash value is consistent with the encryption key Hash value of the uplink in the second network, the access party decrypts the ciphertext of the identity information of the access party through the encryption key to obtain the plaintext of the identity information of the access party through an AES256 algorithm, and the identity verification of the access party is passed; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key of the uplink in the first network or the second network, the identity verification of the access party is not passed; correspondingly, the process of encrypting the identity of the access party is as follows: obtaining a ciphertext of the identity information of the access party according to the AES256 algorithm from the plaintext of the identity information of the access party through the encryption key; and performing hash operation on the encryption key to obtain an encryption key hash value, and linking the encryption key hash value and the ciphertext of the access party identity information in the first network or the second network.
The nodes of the first network or the second network comprise a fog computing node, a cloud computing center node and an edge computing node. The verification interface mode is used for interface verification when the first network and the second network transmit data.
Through a block chain network with a double-layer structure, chain crossing can be easily realized, and meanwhile, the layout requirements of various operation scenes can be met; data resource sharing, value resource transmission, dual transmission of data and value, and differentiation characteristics of different fragment networks solve information isolated islands and resource isolated islands through the double-layer network architecture; meanwhile, the reality, reliability and non-tampering of shared resources are ensured.
When the resource data are stored in the cloud computing storage space through the API, the time stamp of the national time service center of the Chinese academy is added to prevent data conflict. The process of encrypting the identity of the access party comprises the steps of sequentially carrying out Hash operation and AES256 algorithm operation on the identity of the access party, and chaining in the first network or the second network; correspondingly, the method for automatically identifying and verifying the identity of the access party is an access party verification token mode or a verification interface mode. The B/S and the C/S need different authentication modes to prevent repeated login, network attack and data conflict problems. The nodes of the first network or the second network comprise a cloud computing center node and an edge computing node. The network scale is expanded, the differentiated layout of the node types is realized, the storage space is expanded, and the advantages of all the nodes are fully exerted.
By utilizing a distributed point-to-point network consisting of the fog computing nodes, the cloud computing center nodes and the edge computing nodes and a data storage space of cloud computing or fog computing, the remote multi-event data transmission is realized, the data transmission speed is high, no data conflict exists, and the timestamp of the national time service center of the Chinese academy is added when the common chain is packaged after the transaction hash computation containing the value or the data resource. And adding a timestamp of a national time service center of the Chinese academy of China when the resource data is stored in a cloud computing or fog computing storage space through an API (application program interface). The problem of data conflict is solved through asymmetric hash operation and the timestamp of the authoritative national time service center of the Chinese academy. The verification mode is adopted when the access party carries out the uplink of the transaction data through the verification mode when carrying out data communication transmission among different fragment networks, so that the network safety and the data safety are ensured, and the downtime caused by malicious access attack is greatly reduced.
Correspondingly, the present embodiment provides a resource transmission method applicable to a root chain, including: when the resources are data resources, the data resources are stored in a cloud computing or fog computing storage space which can be accessed and acquired by a root chain; and after receiving a resource acquisition request sent by a node on the fragment network, the root link acquires the corresponding resource from the cloud computing or fog computing storage space and transmits the resource to a client of the corresponding node on the fragment network, wherein the client needs to acquire the resource.
When two users in different fragment networks need to exchange values, value transfer is carried out through the root chain. Here, account interaction and virtual value transfer of different fragmentation networks are involved. If the network fragments X and Y are provided, the account of the user A in the network fragments needs to transfer to the account of the user B in the network fragments Y, in order to maintain the atomicity of the transaction and prevent the generation of double flowers, the intelligent contract C on the root chain is used for managing the transfer flow of the cross-fragment operation, and the processing method for the intelligent contract on the root chain comprises the following steps:
receiving a transaction request sent by a user A for transferring the virtual value (such as the number of tokens and the value amount corresponding to the tokens) of the user A of the fragmentation network X to a user B of the fragmentation network Y; after the transaction request is verified to be correct, wherein the transaction verification comprises the steps of verifying whether the format of the transaction is legal or not, verifying whether the balance on an account A1 corresponding to the user A in the fragmentation network Y is larger than or equal to the sum of the transfer amount and the reserved transaction cost or not, and if the transaction is legal and the balance on the account A1 meets the requirement, freezing the corresponding transfer amount and the reserved transaction cost of the user A on the fragmentation network X; after the freezing is finished, the intelligent contract initiates a corresponding transfer transaction to a user B through an account A1 of the user A in the fragmentation network Y, the corresponding transfer transaction is recorded as transaction Y1, meanwhile, a hash value H-Y1 of the transfer transaction on the fragmentation network Y is fed back to the intelligent contract C, the hash value H-Y1 of the transfer transaction on the fragmentation network Y is fed back to the user A on the fragmentation network X by the intelligent contract C, the corresponding actually-occurring transfer amount is transferred to the intelligent contract C by the user A on the fragmentation network X according to the actually-occurring transfer amount on the fragmentation network Y, meanwhile, the hash value H-Y1 of the transfer transaction on the fragmentation network Y is added into the format content of the transaction, the constructed hash value H-Y1 is recorded as transaction X1, and the redundant part is unfrozen and returns to the address of the user A on the fragmentation network X; feeding back the hash value H-X1 of transaction X1 to the smart contract C; adding the hash value H-X1 into the format content of the transaction Y1 again by the intelligent contract C to construct a transaction Y11 of the fragment network Y, commonly recognizing the transaction X1 on the fragment network X, commonly recognizing the transaction Y11 on the fragment network Y, monitoring a block containing the transaction X1 on the fragment network X and a block containing the transaction Y11 on the fragment network Y by the intelligent contract C, and identifying that the cross-piece transfer is successful when the two are successfully recognized; because the intelligent contract C monitors the execution states of the two, even if malicious attacks or operations such as forking occur, the phenomenon of double flowers does not occur, and the atomicity of the transaction is ensured.
In order to ensure the enthusiasm of the root chain, the intelligent contract C on the root chain can charge a commission fee from the trans-patch transfer process so as to support the sustainable and stable development of the root chain. In conclusion, the cross-segment value transfer belongs to the value transfer process among different segment networks, and for the value transfer of the same segment network, similar to the common transaction method in the prior art, the corresponding transaction content and format can be flexibly adapted and changed according to the difference of the consensus method set by different segment networks so as to meet the value transfer process of each segment network.
The root chain and the architecture mode of the two-layer blockchain network of the plurality of segmented networks, which are provided by the technical scheme of the embodiment, can exchange, transfer or redistribute the value resources and the data resources, and can be flexibly changed according to the needs when being popularized and applied in different business scenes; such as acquisition of resources and/or transfer and exchange of value, may be accompanied when different users in the fragmented networks E and F interact. The method can flexibly adapt to different kinds of business scenes, can flexibly switch according to different business scenes, and is multi-party compatible.
By adopting a gateway separation technology, clients of enterprise parks or branches access various data center nodes (including a fog computing node, a cloud computing center node or an edge computing node) through a three-layer network (a root chain, a fragment network and a cloud computing or fog computing storage space), computing, communication, control and storage resources and services are distributed to users or distributed on equipment and systems close to the users, and cloud computing is expanded to the network edge node. And small clouds at the edge of the network, namely local small clouds, are subjected to fog computing. The method has limited processing capacity and storage equipment, and provides a method for screening information flow from components of the Internet of things, which has the following characteristics:
the fog computation is not as decentralized as edge computation, but further reduces the amount of data transmitted over the network or up to the cloud computing layer, which facilitates communication and collaboration between "nodes" in the edge layer.
And the system is applied to the industrial Internet of things and is positioned among a plurality of warehouses and factories in a supply chain. The fog computing layer may be used to "check and balance" material, equipment, and supply levels at multiple locations and automatically trigger the creation, sending, and receiving of orders.
And thirdly, controlling the movement amount and type of operation data through the equipment and the local area network of the organization and the decision maker (or the industrial cloud data service). Fog computing can help reduce bandwidth usage, even mitigate the need for expensive upgrades by enterprises, and help enterprises keep IT infrastructure running smoothly.
And the storage networks are interconnected. Cross-center storage network intercommunication (storage space network intercommunication between different cloud computing or fog computing centers, or intercommunication between different types of nodes) is a necessary condition for ensuring dynamic migration of the virtual machine, and a 'shared storage mode' or a 'double-active storage mode' can be adopted.
And two-layer network interconnection. The IP address is not changed after the virtual machine is dynamically migrated, so that a cross-center two-layer network is constructed at the virtual machine network access layer. The method can be realized by adopting the technologies of EVI, VPLS, DWDM/Dark Fiber and the like.
And three-layer network interconnection. Networking nodes or access parties such as clients of an enterprise park or a branch office access each data center through a three-layer network, and for a distributed data center capable of supporting cross-center migration of virtual machines, a traditional three-layer network deployment scheme realizes single-side gateway export by uniformly deploying VRRP (virtual router redundancy protocol) across centers.
The interconnection among the data centers is realized on the physical medium layer, a flexible deployment form can be provided for cross-center two-layer expansion (a two-layer network of a root chain and a fragment network), an interconnection channel of three layers (the interconnection and the intercommunication of the root chain, the fragment network and a storage center) is firstly established among the data centers, then VLAN expansion is realized on the basis of the MAC Over IP technology, and the later has the advantages that the technical characteristics can be provided by the MAC Over IP, the problems of MAC address learning among the distributed data centers, three-layer path optimization and the like are simplified.
A dynamic DNS analysis technology is adopted to solve three-layer suboptimal paths, and different service IP addresses are presented by the same virtual machine in different data centers through NAT (realized by SLB equipment). The GSLB acts as a DNS server and resolves to clients different service IP addresses according to the physical location of the virtual machine (virtual machine corresponding to the root node point). Technical problem how to inform GSLB of the physical location of a virtual machine and to modify DNS records. The technical problem is solved by adopting an RHI (Route Health Injection) technology, the characteristic is usually realized by an SLB device, the SLB device periodically detects the survival state of a server/a virtual machine, and when the detection result is normal, the SLB issues a host Route of the virtual machine address to a backbone network; and when the checking result is abnormal, withdrawing the host route. Therefore, the Ingress traffic path from the client to the A or B center can be dynamically adjusted, and the health state of the virtual machine corresponding to the root link point is ensured.
Gateway split technique in the Egress direction (virtual machine to client where the accessing party is located). To avoid sub-optimal paths in the Egress direction, the same VRRP configuration (the same VRRP VIP configuration on a convergence device at a certain A, B center) must be deployed simultaneously on the convergence switches at both sides of the distributed data center, and cross-central two-layer interworking of VLANs where VRRPs are located must be ensured. If the aggregation device already adopts VLAN extension based on H3C EVI technology, the localized deployment of the VRRP is supported by default, and if the technical characteristics similar to EVI are not deployed, a user can also realize the localized deployment of the VRRP by configuring a corresponding command line.
The root chain and any one of the fragment networks can be any one of the blockchains such as a public chain, a alliance chain and a private chain, cross-chain intercommunication and interconnection can be realized by the method of the embodiment, and the problem of flow island can be solved. On the premise of completely maintaining the technical architecture, the storage architecture and the management organization of the native chain and on the premise of not generating chemical action (namely, the architecture self-management and operation self-maintenance between the root chain and any one of the fragment networks and among the fragment networks), the communication interaction and interconnection service is provided for the native chain.
The technical scheme of the embodiment can be popularized and used in value transfer in the financial field, for example, a self-organized cross-chain data transfer system among a plurality of financial subjects organizes and controls a root chain through an authoritative financial system center, and strictly controls networking principles when each financial subject forms a fragmentation network, node networking conditions of the fragmentation network formed by each financial subject and the like to ensure network security and data security. The method can also be popularized and used in various resource learning sharing platforms, and the data island barrier between the platforms is broken, so that diversified interaction is realized.
Example 2
This embodiment provides an electronic device, the device includes: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Furthermore, the present embodiment provides a storage medium storing a computer program that, when executed by a processor, implements the method as described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 1, as another aspect, the present application also provides an apparatus 500 including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus 500 are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to embodiments disclosed herein, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (28)

1. A consensus method, adapted for a root chain node:
analyzing and verifying more than one first transaction passing the verification, judging whether the first transaction is a transaction containing a node request for joining, if so, carrying out network fragmentation on the node requesting for joining according to a first transaction content at least comprising a consensus method required by the node requesting for joining and the identity of the node requesting for joining, and distributing the node requesting for joining to a first network; sending a message for distributing the node requesting to join to the first network to the node requesting to join; receiving a response message of the node requesting to join, judging whether the node requesting to join agrees, if so, distributing the first transaction and the transaction package uplink comprising the node requesting to join to the first network; if not, the first transaction and the transaction packaging uplink comprising the node which requests to join are refused to be distributed to the first network;
if the first transaction is not a transaction containing a node request to join, packaging and linking the first transaction; the root chain and any piece network are one of a public chain, a alliance chain and a private chain.
2. A consensus method as claimed in claim 1,
the node identity requesting for joining comprises a physical IP address of the node requesting for joining and a type of the node requesting for joining, the node requesting for joining is network-fragmented, and the principle of allocating the node requesting for joining to the first network is as follows: the consensus method required by the node requesting to join is consistent with the consensus method of the first network, and the networking principle of the first network is met; network fragmentation is carried out on the node which is requested to be added through the physical IP address and the type of the node which is requested to be added by the root link node; or, a plurality of intelligent contracts are arranged on the root chain, and the intelligent contracts are used for setting node joining rules and networking principles of the fragmentation network.
3. A consensus method as claimed in claim 1, wherein: the communication mode of the method is MQTT.
4. A consensus method as claimed in claim 1, wherein: the communication between the fragmentation networks is forwarded by various intelligent contracts deployed on a root chain, flexible traffic load seamless switching is realized among nodes, intelligent traffic management and distribution are realized inside cluster nodes, and the internet traffic is subjected to load balancing to a plurality of nodes.
5. A consensus method as claimed in claim 1, wherein:
if the node requesting to join agrees to join the first network, the method further comprises the following steps: the node agreeing to the requested join configures an API interface for receiving and sending the first network message that requires authentication.
6. A consensus method as claimed in claim 3, wherein: and adopting a user token verification mode for the data interface of the B/S architecture, and adopting a verification interface mode for the data interface of the C/S architecture.
7. A consensus method as claimed in any one of claims 1-6 wherein the first transaction, the block containing the first transaction, and the bundled transaction are time stamped using the national time center of the Chinese academy.
8. A consensus method as claimed in any one of claims 1-6 wherein the first transaction hash value is packed into a block uplink after the first transaction is validated, and the first transaction is stored in a cloud or fog computing space corresponding to the root chain.
9. A consensus method, adapted for a node in a fragmented network:
receiving and verifying the second transaction, and packaging and chaining the second transaction after the second transaction passes verification according to a consensus algorithm established by the established fragmentation network; the time stamps of the national time service center of the Chinese academy are adopted when the second transaction and the block containing the second transaction are constructed; wherein the second transaction may be an asset transaction or a non-asset transaction; the root chain and any piece network are one of a public chain, a alliance chain and a private chain.
10. A consensus method as claimed in claim 9, wherein: the communication mode of the method is MQTT.
11. A consensus method as claimed in claim 9, wherein: the communication between the fragmentation networks is forwarded by various intelligent contracts deployed on a root chain, flexible traffic load seamless switching is realized among nodes, intelligent traffic management and distribution are realized inside cluster nodes, and the internet traffic is subjected to load balancing to a plurality of nodes.
12. A consensus method as claimed in claim 10, wherein: and adopting a user token verification mode for the data interface of the B/S architecture, and adopting a verification interface mode for the data interface of the C/S architecture.
13. A consensus method as claimed in any one of claims 9-12, wherein: the consensus method corresponding to the fragmentation network is constructed on each fragmentation network in an intelligent contract or node configuration application mode.
14. A consensus method as claimed in any one of claims 9-12, wherein: and the time stamps of the national time service center of the Chinese academy are adopted when the first transaction, the block containing the first transaction are constructed and the transaction is packaged and linked.
15. A resource transmission method, adapted for a node in a fragmented network:
identifying and verifying the identity of the access party, and if the identity of the access party is verified to be passed, opening an API (application program interface) of the first network or the second network for the access party; judging the request type of an access party, if the request is a resource data uploading request, performing hash operation on resource data to obtain a resource data hash value, chaining the resource data hash value, adding the resource data into a timestamp of a national time service center of a Chinese academy, and storing the resource data in a cloud computing or fog computing storage space through an API (application program interface) of a first network or a second network;
and if the resource data is the resource data acquisition request, acquiring the resource data from the cloud computing or fog computing storage space through an API (application program interface) of the first network or the second network, comparing whether the hash value of the data resource is consistent with the hash value of the data resource data after chain linking through hash operation, and if so, sending the resource data to the access party.
16. The method of claim 15, wherein: the verification adopts a user verification token mode for a data interface of the B/S architecture; and for the data interface of the C/S architecture, a verification interface mode is adopted.
17. The method of claim 15, wherein:
the nodes of the first network or the second network comprise a fog computing node, a cloud computing center node and an edge computing node.
18. The method of claim 16, wherein:
the verification interface mode is used for interface verification when the first network and the second network transmit data.
19. The method of claim 15, wherein: the resource data hash value uplink is: and constructing a third transaction comprising a request for uploading the resource data and a resource data hash value, packaging the third transaction into a block after the third transaction is verified on a corresponding fragmentation network, and constructing the third transaction and the block comprising the third transaction by adopting a timestamp of a national time service center of the Chinese academy and combining the third transaction hash value and the block hash value comprising the third transaction.
20. The method of claim 16, wherein: further comprising: the process of encrypting the identity of the access party comprises the steps of sequentially carrying out Hash operation and AES256 algorithm operation on the identity of the access party, and chaining in the first network or the second network; correspondingly, the method for automatically identifying and verifying the identity of the access party is a token verification mode or an interface verification mode of the access party.
21. A resource transmission method is characterized in that a node suitable for a root chain comprises the following steps: when the resources are data resources, the data resources are stored in a cloud computing or fog computing storage space which can be accessed and acquired by a root chain; after receiving a request for acquiring resources sent by a node on the fragment network, the root link acquires corresponding resources from a cloud computing or fog computing storage space and transmits the corresponding resources to a client of the corresponding node on the fragment network, wherein the client needs to acquire the resources; the root chain and any piece network are one of a public chain, a alliance chain and a private chain.
22. The method according to claim 21, wherein the time stamp of the national time service center of the Chinese academy is added when the resource data is stored in the cloud computing or fog computing storage space accessible and acquired by the root chain through the API.
23. The resource transfer method according to claim 21, wherein the intelligent contract on the root chain is used for managing the transfer flow of the cross-piece operation or for charging a commission fee during the cross-piece transfer process.
24. The resource transmission method according to claim 21, wherein a gateway separation technique is adopted for the nodes of the root chain, and a client accesses each data center node through a three-layer network by using the root chain, a fragmentation network and a storage space of cloud computing or fog computing; the data center nodes comprise fog computing nodes, cloud computing center nodes or edge computing nodes.
25. The method of claim 24, wherein in the inter-center storage network communication, the virtual machine corresponding to the root link node adopts a dynamic DNS resolution technique, and different service IP addresses are presented in different data centers through the SLB device.
26. The method as claimed in claim 25, wherein the SLB device periodically detects the survival status of the server/virtual machine at the root node, and when the detection result is normal, the SLB device issues a host route of the server/virtual machine address to the backbone network; and when the checking result is abnormal, withdrawing the host route.
27. An electronic device, characterized in that the device comprises:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-26.
28. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-26.
CN202210061763.1A 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium Pending CN114418574A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN202010054574 2020-01-17
CN2020100545742 2020-01-17
CN202010551115.5A CN111612466B (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202010551115.5A Division CN111612466B (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium

Publications (1)

Publication Number Publication Date
CN114418574A true CN114418574A (en) 2022-04-29

Family

ID=72197110

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010551115.5A Active CN111612466B (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium
CN202210061763.1A Pending CN114418574A (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010551115.5A Active CN111612466B (en) 2020-01-17 2020-06-16 Consensus and resource transmission method, device and storage medium

Country Status (2)

Country Link
CN (2) CN111612466B (en)
WO (1) WO2021254029A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612466B (en) * 2020-01-17 2022-02-18 厦门潭宏信息科技有限公司 Consensus and resource transmission method, device and storage medium
CN114221972A (en) * 2020-09-03 2022-03-22 中国电信股份有限公司 Relay blockchain system and cross-chain transaction method
CN112235382B (en) * 2020-09-30 2021-09-10 厦门攸基数据科技有限公司 Transaction management system and method based on block chain fragmentation
CN112950415B (en) * 2021-03-11 2024-01-16 全链通有限公司 Judicial evidence fixing method, platform and system based on blockchain
CN113516557B (en) * 2021-07-14 2022-09-23 桂林电子科技大学 Block chain with directed acyclic graph structure and implementation method thereof
CN113472534A (en) * 2021-07-23 2021-10-01 厦门潭宏信息科技有限公司 Block chain data encryption method, equipment and storage medium
CN114430326B (en) * 2022-04-07 2022-08-05 中国工商银行股份有限公司 Block chain based information confirmation method and device, electronic equipment and storage medium
CN115348263B (en) * 2022-06-29 2024-10-25 中国工商银行股份有限公司 Multi-level block chain system, and multi-level block chain hybrid networking method and device
CN115473766B (en) * 2022-08-22 2024-01-26 苏州思萃工业互联网技术研究所有限公司 Vip implementation method and system based on distributed gateway
CN115695288A (en) * 2022-10-28 2023-02-03 中国农业银行股份有限公司 Login control method and device, electronic equipment and storage medium

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475666B (en) * 2013-09-23 2017-01-04 中国科学院声学研究所 A kind of digital signature authentication method of Internet of Things resource
CN107171829B (en) * 2017-04-24 2019-12-24 杭州趣链科技有限公司 Dynamic node management method realized based on BFT consensus algorithm
US10853772B2 (en) * 2018-04-04 2020-12-01 Vijay K. Madisetti Method and system for exchange of value or tokens between blockchain networks
CN109191124B (en) * 2018-08-16 2021-02-26 北京京东尚科信息技术有限公司 Block chain network, deployment method and storage medium
CN109345387A (en) * 2018-09-04 2019-02-15 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, across chain communication device and storage medium
WO2020082213A1 (en) * 2018-10-22 2020-04-30 深圳市哈希树科技有限公司 Network expandability blockchain implementation method
US11528258B2 (en) * 2018-11-02 2022-12-13 Intel Corporation System and apparatus for data confidentiality in distributed ledger
CN110753026B (en) * 2019-02-27 2020-10-30 北京嘀嘀无限科技发展有限公司 Block chain-based fragmentation method and device
CN109949160A (en) * 2019-03-27 2019-06-28 上海优扬新媒信息技术有限公司 A kind of sharding method and device of block chain
CN114401150B (en) * 2019-09-05 2023-10-20 创新先进技术有限公司 Method for adding node in blockchain network and blockchain system
CN110535872B (en) * 2019-09-12 2021-06-01 腾讯科技(深圳)有限公司 Method and apparatus for processing data requests in a blockchain network
CN110545286B (en) * 2019-09-18 2022-04-26 腾讯科技(深圳)有限公司 Method, device, equipment and storage medium for joining and exiting alliance chain
CN110557403B (en) * 2019-09-26 2022-05-31 腾讯科技(深圳)有限公司 Resource allocation method and device based on block chain, storage medium and node equipment
CN110855761B (en) * 2019-10-29 2021-09-21 深圳前海微众银行股份有限公司 Data processing method and device based on block chain system
CN111245836B (en) * 2020-01-13 2021-07-13 电子科技大学 A method for dynamic management of blockchain network based on multi-node decision-making
CN111612466B (en) * 2020-01-17 2022-02-18 厦门潭宏信息科技有限公司 Consensus and resource transmission method, device and storage medium

Also Published As

Publication number Publication date
WO2021254029A1 (en) 2021-12-23
CN111612466A (en) 2020-09-01
CN111612466B (en) 2022-02-18

Similar Documents

Publication Publication Date Title
CN111612466B (en) Consensus and resource transmission method, device and storage medium
US11502871B2 (en) Dynamic discovery of peer network devices across a Wide Area Network
Oktian et al. Distributed SDN controller system: A survey on design choice
Nguyen et al. Decentralized and revised content-centric networking-based service deployment and discovery platform in mobile edge computing for IoT devices
CN110945853B (en) Method for generating and managing multi-mode identification network based on consortium chain voting consensus algorithm
Feng et al. HetNet: A flexible architecture for heterogeneous satellite-terrestrial networks
US10824454B2 (en) 5G dynamic slice and network identity instantiation, termination, and access management system and method
WO2019201043A1 (en) Network communication method, system and device, and storage medium
US9342412B2 (en) Managing replication of computing nodes for provided computer networks
CN107819742B (en) System architecture and method for dynamically deploying network security service
CN101151604A (en) Provisioning and management in a message publish/subscribe system
CN101277248A (en) Method and system for distributing network data
Bonadio et al. An integrated framework for blockchain inspired fog communications and computing in internet of vehicles
US10362120B2 (en) Distributed gateways with centralized data center for high throughput satellite (HTS) spot beam network
US20220182243A1 (en) Method and Apparatus for Distributed Ledger
CN104901825B (en) A kind of method and apparatus for realizing zero configuration starting
CN113839995A (en) Cross-domain resource management system, method, device and storage medium
CN113472668B (en) Routing method and system in multiparty security computation
CN118157916B (en) Access method, device and system for enterprise network
US20240160495A1 (en) Network locality in a gpu super-cluster
US11218918B2 (en) Fast roaming and uniform policy for wireless clients with distributed hashing
Yang Optical and wireless convergence network based on blockchain
CN117729062B (en) Networking method, device and system for enterprise network
US12058024B1 (en) Distributed ledger network discovery and cross-instance data routing
CN112769670B (en) VPN data security access control method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination