CN110247753A - Go out block method and device based on block chain meshed network - Google Patents
Go out block method and device based on block chain meshed network Download PDFInfo
- Publication number
- CN110247753A CN110247753A CN201910519296.0A CN201910519296A CN110247753A CN 110247753 A CN110247753 A CN 110247753A CN 201910519296 A CN201910519296 A CN 201910519296A CN 110247753 A CN110247753 A CN 110247753A
- Authority
- CN
- China
- Prior art keywords
- block
- node
- hash
- cryptographic hash
- digital signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
Abstract
The present embodiments relate to a kind of to go out block method and device based on block chain meshed network.Include: to generate the first block, the first Hash operation is carried out according to the first block and obtains the first cryptographic Hash;First cryptographic Hash is signed to obtain the first digital signature;Second Hash operation is carried out to the second block and obtains the second cryptographic Hash, the second block is next block of the first block;Third Hash operation is carried out to the first digital signature and the second cryptographic Hash, obtains third cryptographic Hash;According to third cryptographic Hash and preset random rule, selects second to go out block node as the second block in multiple block nodes out and go out block node.With this, block node can specify next block node out out, the assignment procedure has certain randomness and verifiability, block chain can be reduced by the possibility of success attack, and improve block chain meshed network goes out block efficiency, and then book keeping operation efficiency is improved, allow block chain meshed network should the bigger service scenarios of data scale.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of block method and dresses out based on block chain meshed network
It sets.
Background technique
Each of block chain network node is equivalent to store each computer of all block datas or service
Device terminal.The production of all new blocks, and the verifying and record keeping of transaction, and it is synchronous to be broadcasted to the whole network, all by node Lai
It completes.
Node is exactly the miner that we are commonly called as.The different of each miner calculate power, determine it can be assigned to how many record keeping
Power harvests how many rewards.
The block chain first generation knows together mechanism POW, is exactly proof of work common recognition mechanism, is commonly called as digging mine.It is new to produce
Block, must just carry out the operation of thousands of secondary Hash collisions.And these operations, many electric power can be consumed, the energy is caused
Waste, therefore also by dirty disease.Everybody is more allowed to worry, once most of power of calculating is monopolized, decentralization is just on the hazard.
The second generation knows together mechanism POS, is exactly that equity proves common recognition mechanism, it is to be determined according to quantity with cash in hand with the time
Who possesses more billing rights.The advantages of this common recognition mechanism is can be to avoid energy consumption, but the disadvantage is that right of speech is all held
Coin rich and influential family is controlled, and centralized feature is formed, and also the original intention with block chain decentralization runs in the opposite direction.
Third generation common recognition mechanism is exactly DPOS, maximum feature, is exactly to be added on the basis that POS equity proves
Electoral system.The super node for the final acquisition billing right being born by all votes by ballot of user with cash in hand is kept accounts, can
To significantly reduce the waste of the energy, still, on the super node all concentrated due to operation, to the calculation force request of super node
It is higher, and the efficiency of super node directly affects the efficiency of book keeping operation, this is resulted in, this kind of mode copes with the ability of large-scale data
Not strong, development is restricted.
Summary of the invention
Based on the above issues, the embodiment of the invention provides a kind of goes out block method and dress based on block chain meshed network
It sets.
Block method is gone out based on block chain meshed network in a first aspect, the embodiment of the invention provides a kind of.The block
Chain meshed network include it is multiple go out block node, the method be suitable for first go out block node, described first go out block node be described
It is multiple go out block nodes in any one, which comprises
The first block is generated, the first Hash operation is carried out according to first block and obtains the first cryptographic Hash;
First cryptographic Hash is signed to obtain the first digital signature;
Second Hash operation is carried out to the second block and obtains the second cryptographic Hash, second block is first block
Next block;
Third Hash operation is carried out to first digital signature and second cryptographic Hash, obtains third cryptographic Hash;
According to the third cryptographic Hash and preset random rule, selection second goes out block in the multiple block node out
Node goes out block node as second block.
In some embodiments, in first Hash operation, second Hash operation and the third Hash operation
Any two operation be identical or different Hash operation.
In some embodiments, described that third Hash fortune is carried out to first digital signature and second cryptographic Hash
It calculates, obtains third cryptographic Hash, comprising:
First digital signature, second cryptographic Hash and the first numerical value are subjected to the second Hash operation and obtain the second Kazakhstan
Uncommon value third cryptographic Hash, first numerical value are the sequence number that 1-n or described first goes out block node, and the n is arbitrary value.
In some embodiments, the preset random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of the multiple quantity of block node out;
Determine that the corresponding verifying node of the remainder goes out block node for described second.
In some embodiments, further includes:
First digital signature is sent to the multiple block node out.
In some embodiments, further includes:
The second digital signature that third goes out the transmission of block node is received, second digital signature is directed to third block;
Second Hash operation is carried out to the 4th block and obtains the 4th cryptographic Hash, the 4th block is the third block
Next block;
Second Hash operation is carried out to second digital signature and the 4th cryptographic Hash, obtains the 5th cryptographic Hash;
According to the 5th cryptographic Hash and preset random rule, judge that described first goes out whether block node is described the
Four blocks go out block node;
If so, being packaged to the 4th block.
In some embodiments, described according to the 5th cryptographic Hash and preset random rule, judge described first
Out block node whether be the 4th block go out block node include:
According to the 5th cryptographic Hash and preset random rule, the serial number for going out block node of the 4th block is determined;
Whether the serial number for going out block node for judging the 4th block is the described first serial number for going out block node.
Second aspect provides a kind of block assembly out based on block chain meshed network.The block chain meshed network packet
Multiple block nodes out are included, described device is suitable for first and goes out block node, and described first goes out block node for the multiple block node out
In any one, described device includes:
First hash units generate the first block, carry out the first Hash operation according to first block and obtain the first Kazakhstan
Uncommon value;
Signature unit, for being signed to obtain the first digital signature to first cryptographic Hash;
Second hash units obtain the second cryptographic Hash, secondth area for carrying out the second Hash operation to the second block
Block is next block of first block;
Third hash units, for carrying out third Hash operation to first digital signature and second cryptographic Hash,
Obtain third cryptographic Hash;
Selecting unit is used for according to the third cryptographic Hash and preset random rule, in the multiple block node out
The middle block node out for selecting second to go out block node as second block.
In some embodiments, in first Hash operation, second Hash operation and the third Hash operation
Any two operation be identical or different Hash operation.
In some embodiments, the third hash units are specifically used for:
First digital signature, second cryptographic Hash and the first numerical value are subjected to the second Hash operation and obtain the second Kazakhstan
Uncommon value third cryptographic Hash, first numerical value are the sequence number that 1-n or described first goes out block node, and the n is arbitrary value.
In some embodiments, the preset random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of the multiple quantity of block node out;
Determine that the corresponding verifying node of the remainder goes out block node for described second.
In some embodiments, further includes:
Transmission unit, for sending first digital signature to the multiple block node out.
In some embodiments, further includes:
Receiving unit, the second digital signature of block node transmission is gone out for receiving third, and second digital signature is directed to
Third block;
Second hash units are also used to, and are carried out the second Hash operation to the 4th block and are obtained the 4th cryptographic Hash, and the described 4th
Block is next block of the third block;
Third hash units are also used to, and are carried out third Hash operation to second digital signature and the 4th cryptographic Hash, are obtained
To the 5th cryptographic Hash;
Judging unit, for judging that described first goes out block section according to the 5th cryptographic Hash and preset random rule
Point whether be the 4th block go out block node;
Packaged unit, if so, for being packaged to the 4th block.
In some embodiments, judging unit is specifically used for:
According to the 5th cryptographic Hash and preset random rule, the serial number for going out block node of the 4th block is determined;
Whether the serial number for going out block node for judging the 4th block is the described first serial number for going out block node.
The third aspect, this specification embodiment provide a kind of computer equipment, including memory, processor and are stored in
On memory and the computer program that can run on a processor, which is characterized in that the processor executes real when described program
Either side or various method and steps in existing aforementioned first aspect or second aspect.
Fourth aspect provides a kind of computer readable storage medium, and meter is stored on the computer readable storage medium
Calculation machine program, the computer program realize either side or more in above-mentioned first aspect or second aspect when being executed by processor
Method described in aspect.
5th aspect, provides a kind of computer program product comprising instruction, when described instruction is run on computers
When, so that computer executes in above-mentioned first aspect or second aspect method described in either side or various aspects.
Through the embodiment of the present invention, out block node can specify it is next go out block node, the assignment procedure have it is certain with
Machine and verifiability can reduce block chain by the possibility of success attack, and improve the block out of block chain meshed network
Efficiency, and then book keeping operation efficiency is improved, allow block chain meshed network should the bigger service scenarios of data scale.
Detailed description of the invention
Fig. 1 applies the exemplary architecture of embodiment provided by the present application;
Fig. 2 is a kind of flow chart for going out block method based on block chain meshed network provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of the device of the release information based on block chain provided in an embodiment of the present invention;
Fig. 4 shows a kind of computer equipment structural schematic diagram provided by this specification embodiment.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a kind of to go out block method and device based on block chain meshed network.Fig. 1, which is shown, to be answered
With the exemplary architecture of embodiment provided by the present application.
As shown in Figure 1, the exemplary architecture may include multiple block chain nodes, multiple block chain node may include
Multiple block node 101 and multiple verifying nodes 102 out.In one example, should go out block node can be to be selected by election mechanism
The quantity of the multiple super nodes selected, the super node can determine according to actual needs, and the quantity of the super node can be
Odd number, such as 21.In another example, multiple block node out can be alternate node, wherein the super node can
Think and chosen from alternate node, the quantity of the alternate node can also determine according to actual needs, for example, can be 100,
Wherein, alternate node can be selected according to preset random rule, for example, calculating the highest specified quantity node of power can be with
Alternately node.In another example, verifying node can also be all or part of node in addition to block node out.Its
In, block chain node can be realized in a software form, can also realize in the form of hardware.When implemented in hardware, it can be
Laptop, desktop computer and mobile terminal etc..
Block node is mainly used for based on common recognition mechanism out, the data in system in designated time period is produced block, also
It is primarily used for keeping accounts.Verifying node is mainly used for based on common recognition mechanism, and the block generated to block node out is verified, and passes through
The block of verifying can be recorded in block chain.It is can communicate between node to synchronize the data such as block chain.For example, section
It can be communicated based on D2D agreement between point.
In order to facilitate understanding of embodiments of the present invention, it is further explained below in conjunction with attached drawing with specific embodiment
Bright, embodiment does not constitute the restriction to the embodiment of the present invention.
Fig. 2 is a kind of flow chart for going out block method based on block chain meshed network provided by the invention.The block chain link
Spot net includes the block chain meshed network in multiple block nodes, such as exemplary architecture shown in FIG. 1 out, and this method is suitable for
First go out block node, this first go out block node be it is multiple go out block nodes in any one.As shown in Fig. 2, this method is specifically wrapped
It includes:
S210 generates the first block, carries out the first Hash operation according to first block and obtains the first cryptographic Hash.
Wherein, each node in block chain meshed network is run based on common recognition mechanism.The common recognition mechanism is predefined,
The common recognition mechanism, which can wrap, includes block common recognition mechanism, verifying common recognition mechanism etc..
Block node out in block chain meshed network can determine that first goes out block node according to the common recognition mechanism of block out, this first
The data in system in designated time period can be generated block by block node out.The designated time period can according to actual needs really
It is fixed, such as can be 1 second, 10 seconds, 3 minutes or 10 minutes etc..The system can be corresponding whole for the block chain meshed network
A block catenary system.Wherein, block chain has multiple blocks to constitute, and each block can carry the mark of a block
The storage organization of chain type is formed.
Current block chain node is generating block it needs to be determined that next node for needing to generate block, the current block chain
Node is properly termed as first and goes out block node, which is properly termed as second and goes out block node, deserve
The block that preceding block chain link point generates is properly termed as the first block, and the block which generates can
To be known as the second block.
In order to increase the efficiency for going out the selection of block node of node, reduce the burden of system, next block node out is being selected
When, the first Hash operation can be carried out to the first block, obtain the first cryptographic Hash.Wherein, verifying common recognition mechanism may include pre-
First Hash operation of definition, which can determine according to actual needs, for example, the first Hash operation can be
SHA-256 etc..
S220 is signed to obtain the first digital signature to first cryptographic Hash.
Each block chain node may include at least one secret key pair, and each secret key pair includes a public key and a private
Key, the private key are stored in local, which can be sent to other block chain nodes.
Current block chain node can sign to the cryptographic Hash after determining the first cryptographic Hash, obtain the first number
Signature.The signature can be used private key and sign, and can verify the signature using the corresponding public key of the private key.
S230 carries out the second Hash operation to the second block and obtains the second cryptographic Hash, and second block is described first
Next block of block.
Wherein, verifying common recognition mechanism may include predefined second Hash operation, which can basis
Actual needs determines, for example, the second Hash operation can be SHA-256 etc..
Since next block has no idea to predict, whole process can be allowed more random with this.
S240 carries out third Hash operation to first digital signature and second cryptographic Hash, obtains third Hash
Value.
When determining next block node out, third Hash fortune can be carried out to the first digital signature and the second cryptographic Hash
It calculates, obtains third cryptographic Hash.Wherein, block common recognition mechanism may include predefined third Hash operation, third Hash fortune out
Calculating can determine according to actual needs, for example, third Hash operation can be SHA-256 etc..
In embodiments of the present invention, any two in the first Hash operation, the second Hash operation and third Hash operation
Operation can be identical or different Hash operation.In an example, the first Hash operation, the second Hash operation and third are breathed out
Uncommon operation can be identical Hash operation, in another example, the first Hash operation, the second Hash operation and third Hash
Operation can be different Hash operation.
S250, according to the third cryptographic Hash and preset random rule, it is the multiple go out block node in select the
Two, which go out block node as second block, goes out block node.
When determining next block node out, can be selected according to third cryptographic Hash.Wherein, block common recognition mechanism can out
To include the preset random rule of selection gist, the preset random rule is with certain randomness and verifiability.
In one example, which may include:
Third cryptographic Hash is converted into 10 systems, and takes the remainder of second value;
Determine that the corresponding verifying node of the remainder goes out block node for second.
Wherein, which can determine according to the quantity of verifying node.For example, the quantity of block node can be out
100, which can be 100.
Wherein, third cryptographic Hash ensure that randomness, the determination of third cryptographic Hash and preset random rule, ensure that
This second go out block node verifiability.
First go out block node the first digital signature can be sent to second go out block node, so as to second go out block node continue
Block out.For example, the first digital signature can be sent to multiple block nodes out by way of broadcast.
Block node the first block of transmission and first can also be gone out to second and go out the public key of block node.Wherein, the public key is sent
Form may include a variety of.In one example, can be generated according to the public key should go out block address of node, which can be with
Produce or be transferred to address as transaction, this second go out block node can be gone out according to this block address of node determine should go out block node
Public key.In another example, which can carry is sent in the first block.
Second goes out block node after receiving the first digital signature, can verify the first identity for going out block node first, should
The identity of block node can carry out verifying realization to the first digital signature by going out the public key of block node out.After being verified,
Second go out block node can the verifying identity to itself verify, which can be based on preset random rule
It is verified, whether includes its own to verify the block node out of the second block.After above-mentioned two verification process all passes through, the
Two, which go out block node, is again packaged the second block, and the second block of packing is carried out the whole network and is synchronized.
In some embodiments, above-mentioned steps S240 can be specifically achieved by the steps of:
First digital signature, the second cryptographic Hash and the first numerical value are subjected to the second Hash operation and obtain the second cryptographic Hash
Third cryptographic Hash.
Wherein, the first numerical value is the predefined fixed values such as 1-n, which is arbitrary value.
First numerical value can also for first go out block node sequence number, or according to first go out block node sequence number it is true
Fixed numerical value.By first numerical value, the randomness of block node selection can be further realized out.
In some embodiments, can also include the following steps:
1) the second digital signature that third goes out the transmission of block node is received, second digital signature is directed to third block;
2) the second Hash operation is carried out to the 4th block and obtains the 4th cryptographic Hash, the 4th block is the third block
Next block;
3) the second Hash operation is carried out to second digital signature and the 4th cryptographic Hash, obtains the 5th cryptographic Hash;
4) according to the 5th cryptographic Hash and preset random rule, judge that described first goes out whether block node is described
4th block goes out block node;
5) if so, being packaged to the 4th block.
6) if it is not, then terminating.
In step 1), third block, public key and the second digital signature that third goes out the transmission of block node can receive.
Wherein, third block can go out the newly-generated block of block node for third.Second digital signature can be according to this
Third block determines.It specifically may refer to the acquisition process of aforementioned first digital signature, details are not described herein again.
First, which goes out block node, can also determine that third goes out the public key of block node, which can go out block node according to the third
Address determine, also it is available carrying with the public key in third block.
, can be according to the 5th cryptographic Hash and preset random rule in step 4), determine the 4th block goes out block section
The serial number of point;Whether the serial number for going out block node for judging the 4th block is the first serial number for going out block node.
In addition, first goes out block node after receiving third block, the identity that third goes out block node can be verified first, it should
The identity of block node can be realized by following step out.
Step A goes out the public key in the secret key pair of block node using third, verifies, obtains to second digital signature
To the 6th cryptographic Hash.
Step B carries out the first Hash operation to the third block and obtains the 7th cryptographic Hash;
First, which goes out block node, can compare the 6th cryptographic Hash and whether the 7th cryptographic Hash is identical, if identical, illustrate this
Second digital signature is that the third goes out the digital signature of block node, namely is verified.If it is different, then verifying does not pass through.
In addition, second block can also be the block before the first block.It can specifically be achieved by the steps of: A:
At least one before determining current block appointed interval has verified that block.The appointed interval can be according to the number of multiple block nodes out
Amount determines;
B: each the second Hash operation of carry out in block is had verified that at least one respectively, obtains the second cryptographic Hash.
In one example, can determine second cryptographic Hash, second cryptographic Hash can according to first block it
Preceding n-th of block determines that the n can be the integer greater than 0, which can be the appointed interval in abovementioned steps A.Example
Such as, the value of the n can be the quantity of multiple block nodes out, for example, the quantity of block node is 21 out, which can be 21.
In another example, it can determine that multiple second cryptographic Hash, multiple cryptographic Hash can be according to first blocks
N-th of block before plays continuous multiple blocks and determines that the value of the n can be the quantity of multiple block nodes out, this is continuous
The quantity of multiple blocks can be preset value, the preset value can determine according to actual needs, such as 5.
In another example, it can determine that multiple second cryptographic Hash, multiple cryptographic Hash can be according to first blocks
Multiple blocks at interval of n block before determine that the value of interval n can be true according to the quantity of multiple block nodes out
Fixed, for example, the quantity of block node is 21 out, which can be 20.
Through the embodiment of the present invention, out block node can specify it is next go out block node, the assignment procedure have it is certain with
Machine and verifiability can reduce block chain by the possibility of success attack, and improve the block out of block chain meshed network
Efficiency, and then book keeping operation efficiency is improved, allow block chain meshed network should the bigger service scenarios of data scale.
Fig. 3 is a kind of block assembly structural schematic diagram out based on block chain meshed network provided in an embodiment of the present invention.It should
Block chain meshed network includes the block chain meshed network in multiple block nodes, such as exemplary architecture shown in FIG. 1 out, described
Device is suitable for first and goes out block node, and described first goes out block node for any one in the multiple block node out, the dress
It sets and includes:
First hash units 301 generate the first block, carry out the first Hash operation according to first block and obtain first
Cryptographic Hash;
Signature unit 302, for being signed to obtain the first digital signature to first cryptographic Hash;
Second hash units 303 obtain the second cryptographic Hash for carrying out the second Hash operation to the second block, and described second
Block is next block of first block;
Third hash units 304, for carrying out third Hash fortune to first digital signature and second cryptographic Hash
It calculates, obtains third cryptographic Hash;
Selecting unit 305 is used for according to the third cryptographic Hash and preset random rule, in the multiple block section out
It selects second to go out block node as second block in point and goes out block node.
In some embodiments, in first Hash operation, second Hash operation and the third Hash operation
Any two operation be identical or different Hash operation.
In some embodiments, the third hash units are specifically used for:
First digital signature, second cryptographic Hash and the first numerical value are subjected to the second Hash operation and obtain the second Kazakhstan
Uncommon value third cryptographic Hash, first numerical value are the sequence number that 1-n or described first goes out block node, and the n is arbitrary value.
In some embodiments, the preset random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of the multiple quantity of block node out;
Determine that the corresponding verifying node of the remainder goes out block node for described second.
In some embodiments, further includes:
Transmission unit, for sending first digital signature to the multiple block node out.
In some embodiments, further includes:
Receiving unit, the second digital signature of block node transmission is gone out for receiving third, and second digital signature is directed to
Third block;
Second hash units are also used to, and are carried out the second Hash operation to the 4th block and are obtained the 4th cryptographic Hash, and the described 4th
Block is next block of the third block;
Third hash units are also used to, and are carried out third Hash operation to second digital signature and the 4th cryptographic Hash, are obtained
To the 5th cryptographic Hash;
Judging unit, for judging that described first goes out block section according to the 5th cryptographic Hash and preset random rule
Point whether be the 4th block go out block node;
Packaged unit, if so, for being packaged to the 4th block.
In some embodiments, judging unit is specifically used for:
According to the 5th cryptographic Hash and preset random rule, the serial number for going out block node of the 4th block is determined;
Whether the serial number for going out block node for judging the 4th block is the described first serial number for going out block node.
It is appreciated that the present embodiment goes out block assembly and embodiment of the method shown in Fig. 2 based on block chain meshed network
It is corresponding, therefore, the device of the present embodiment is equally applicable to above with respect to the description of embodiment of the method shown in Fig. 2, herein not
It repeats again.
Fig. 4 shows a kind of computer equipment structural schematic diagram, the computer equipment provided by this specification embodiment
It may include: processor 410, memory 420, input/output interface 430, communication interface 440 and bus 450.Wherein processor
440, memory 420, input/output interface 430 and communication interface 440 by bus 450 realize between inside equipment
Communication connection.
Processor 410 can use general CPU (Central Processing Unit, central processing unit), micro process
Device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one or
The modes such as multiple integrated circuits are realized, for executing relative program, to realize technical solution provided by this specification embodiment.
Memory 420 can use ROM (Read Only Memory, read-only memory), RAM (Random Access
Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 420 can store
Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware
When, relevant program code is stored in memory 420, and execution is called by processor 410.
Input/output interface 430 is for connecting input/output module, to realize information input and output.Input and output/
Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein
Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display,
Loudspeaker, vibrator, indicator light etc..
Communication interface 440 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment
Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly
(such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 450 includes an access, in various components (such as the processor 410, memory 420, input/output of equipment
Interface 430 and communication interface 440) between transmit information.
It should be noted that although above equipment illustrates only processor 410, memory 420, input/output interface
430, communication interface 440 and bus 450, but in the specific implementation process, which can also include realizing to operate normally
Necessary other assemblies.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising realizing in above equipment
Component necessary to this specification example scheme, without including all components shown in figure.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description.
These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution.
Professional technician can use different methods to achieve the described function each specific application, but this realization
It should not be considered as beyond the scope of the present invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can be executed with hardware, processor
The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention
Protection scope, all any modification, equivalent substitution, improvement and etc. within the scope of the present invention, done should be included in this hair
Within bright protection scope.
Claims (10)
1. a kind of go out block method based on block chain meshed network, which is characterized in that the block chain meshed network includes multiple
Block node out, the method are suitable for first and go out block node, and described first goes out block node for appointing in the multiple block node out
Meaning one, which comprises
The first block is generated, the first Hash operation is carried out according to first block and obtains the first cryptographic Hash;
First cryptographic Hash is signed to obtain the first digital signature;
Second Hash operation is carried out to the second block and obtains the second cryptographic Hash, second block is the next of first block
A block;
Third Hash operation is carried out to first digital signature and second cryptographic Hash, obtains third cryptographic Hash;
According to the third cryptographic Hash and preset random rule, selection second goes out block node in the multiple block node out
Go out block node as second block.
2. the method according to claim 1, wherein first Hash operation, second Hash operation and
Any two operation in the third Hash operation is identical or different Hash operation.
3. the method according to claim 1, wherein described to first digital signature and second Hash
Value carries out third Hash operation, obtains third cryptographic Hash, comprising:
First digital signature, second cryptographic Hash and the first numerical value are subjected to the second Hash operation and obtain the second cryptographic Hash
Third cryptographic Hash, first numerical value are the sequence number that 1-n or described first goes out block node, and the n is arbitrary value.
4. the method according to claim 1, wherein the preset random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of the multiple quantity of block node out;
Determine that the corresponding verifying node of the remainder goes out block node for described second.
5. the method according to claim 1, wherein further include:
First digital signature is sent to the multiple block node out.
6. according to the method described in claim 5, it is characterized by further comprising:
The second digital signature that third goes out the transmission of block node is received, second digital signature is directed to third block;
Second Hash operation is carried out to the 4th block and obtains the 4th cryptographic Hash, the 4th block is the next of the third block
A block;
Second Hash operation is carried out to second digital signature and the 4th cryptographic Hash, obtains the 5th cryptographic Hash;
According to the 5th cryptographic Hash and preset random rule, judge that described first goes out whether block node is the 4th area
Block goes out block node;
If so, being packaged to the 4th block.
7. according to the method described in claim 6, it is characterized in that, described according to the 5th cryptographic Hash and preset random
Rule, judge described first go out block node whether be the 4th block go out block node include:
According to the 5th cryptographic Hash and preset random rule, the serial number for going out block node of the 4th block is determined;
Whether the serial number for going out block node for judging the 4th block is the described first serial number for going out block node.
8. a kind of go out block assembly based on block chain meshed network, which is characterized in that the block chain meshed network includes multiple
Block node out, described device are suitable for first and go out block node, and described first goes out block node for appointing in the multiple block node out
Meaning one, described device include:
First hash units generate the first block, carry out the first Hash operation according to first block and obtain the first cryptographic Hash;
Signature unit, for being signed to obtain the first digital signature to first cryptographic Hash;
Second hash units obtain the second cryptographic Hash for carrying out the second Hash operation to the second block, and second block is
Next block of first block;
Third hash units are obtained for carrying out third Hash operation to first digital signature and second cryptographic Hash
Third cryptographic Hash;
Selecting unit, for being selected in the multiple block node out according to the third cryptographic Hash and preset random rule
Select the second block node out for going out block node as second block.
9. device according to claim 8, which is characterized in that further include:
Transmission unit, for sending first digital signature to the multiple block node out.
10. device according to claim 9, which is characterized in that further include:
Receiving unit, the second digital signature of block node transmission is gone out for receiving third, and second digital signature is directed to third
Block;
Second hash units are also used to, and are carried out the second Hash operation to the 4th block and are obtained the 4th cryptographic Hash, the 4th block
For next block of the third block;
Third hash units are also used to, and carry out third Hash operation to second digital signature and the 4th cryptographic Hash, obtain the
Five cryptographic Hash;
Judging unit, for according to the 5th cryptographic Hash and preset random rule, judge described first out block node be
It is no to go out block node for the 4th block;
Packaged unit, if so, for being packaged to the 4th block.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910519296.0A CN110247753B (en) | 2019-06-17 | 2019-06-17 | Block output method and device based on block chain node point network |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910519296.0A CN110247753B (en) | 2019-06-17 | 2019-06-17 | Block output method and device based on block chain node point network |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN110247753A true CN110247753A (en) | 2019-09-17 |
| CN110247753B CN110247753B (en) | 2020-10-09 |
Family
ID=67887466
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910519296.0A Active CN110247753B (en) | 2019-06-17 | 2019-06-17 | Block output method and device based on block chain node point network |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110247753B (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110597489A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Random number generation method, equipment and medium |
| CN111443895A (en) * | 2020-03-12 | 2020-07-24 | 杭州泛链科技有限公司 | Verifiable random number generation method applied to block chain |
| CN111598567A (en) * | 2020-05-07 | 2020-08-28 | 深圳创客区块链技术有限公司 | Method, device and storage medium for preventing block chain large computing power attack |
| CN112258326A (en) * | 2020-12-24 | 2021-01-22 | 布比(北京)网络技术有限公司 | Random block output method and system |
| CN113052596A (en) * | 2019-12-28 | 2021-06-29 | 中移(成都)信息通信科技有限公司 | Block chain-based block output method, device, equipment and medium |
Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107005574A (en) * | 2016-12-23 | 2017-08-01 | 深圳前海达闼云端智能科技有限公司 | Block generation method and device and block chain network |
| CN107911819A (en) * | 2017-11-30 | 2018-04-13 | 江苏通付盾科技有限公司 | The method and system of packing node are chosen based on phone number |
| CN108600161A (en) * | 2018-03-12 | 2018-09-28 | 成都零光量子科技有限公司 | A kind of fair efficient block chain common recognition method |
| CN108596621A (en) * | 2018-04-28 | 2018-09-28 | 深圳市优学链科技有限公司 | Block chain accounting nodes generation method, device, computer equipment and storage medium |
| CN108737375A (en) * | 2018-04-13 | 2018-11-02 | 中山大学 | A kind of block chain common recognition method and system |
| CN108964879A (en) * | 2018-07-20 | 2018-12-07 | 杭州复杂美科技有限公司 | A kind of drawing method, common recognition method, equipment and storage medium |
| WO2019019162A1 (en) * | 2017-07-28 | 2019-01-31 | 杭州复杂美科技有限公司 | Receivable financing method based on block chain technology |
| CN109544310A (en) * | 2018-11-13 | 2019-03-29 | 孙晞瑜 | A kind of quick common recognition bookkeeping methods and its system based on block chain alliance chain |
| CN109560939A (en) * | 2019-01-29 | 2019-04-02 | 张超 | A kind of block method and the device out of block chain |
| US20190139043A1 (en) * | 2016-05-24 | 2019-05-09 | Mastercard International Incorporated | Method and system for an efficient consensus mechanism for permissioned blockchains using audit guarantees |
| CN109743173A (en) * | 2018-12-20 | 2019-05-10 | 弗洛格(武汉)信息科技有限公司 | Go out block node in block chain and determines method, block verification method and block catenary system |
| CN109785130A (en) * | 2018-12-17 | 2019-05-21 | 金蝶软件(中国)有限公司 | Block chain is known together method, apparatus, computer equipment and storage medium at random |
| CN109889397A (en) * | 2019-03-31 | 2019-06-14 | 杭州复杂美科技有限公司 | Drawing method, block generation method, equipment and storage medium |
-
2019
- 2019-06-17 CN CN201910519296.0A patent/CN110247753B/en active Active
Patent Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20190139043A1 (en) * | 2016-05-24 | 2019-05-09 | Mastercard International Incorporated | Method and system for an efficient consensus mechanism for permissioned blockchains using audit guarantees |
| CN107005574A (en) * | 2016-12-23 | 2017-08-01 | 深圳前海达闼云端智能科技有限公司 | Block generation method and device and block chain network |
| WO2019019162A1 (en) * | 2017-07-28 | 2019-01-31 | 杭州复杂美科技有限公司 | Receivable financing method based on block chain technology |
| CN107911819A (en) * | 2017-11-30 | 2018-04-13 | 江苏通付盾科技有限公司 | The method and system of packing node are chosen based on phone number |
| CN108600161A (en) * | 2018-03-12 | 2018-09-28 | 成都零光量子科技有限公司 | A kind of fair efficient block chain common recognition method |
| CN108737375A (en) * | 2018-04-13 | 2018-11-02 | 中山大学 | A kind of block chain common recognition method and system |
| CN108596621A (en) * | 2018-04-28 | 2018-09-28 | 深圳市优学链科技有限公司 | Block chain accounting nodes generation method, device, computer equipment and storage medium |
| CN108964879A (en) * | 2018-07-20 | 2018-12-07 | 杭州复杂美科技有限公司 | A kind of drawing method, common recognition method, equipment and storage medium |
| CN109544310A (en) * | 2018-11-13 | 2019-03-29 | 孙晞瑜 | A kind of quick common recognition bookkeeping methods and its system based on block chain alliance chain |
| CN109785130A (en) * | 2018-12-17 | 2019-05-21 | 金蝶软件(中国)有限公司 | Block chain is known together method, apparatus, computer equipment and storage medium at random |
| CN109743173A (en) * | 2018-12-20 | 2019-05-10 | 弗洛格(武汉)信息科技有限公司 | Go out block node in block chain and determines method, block verification method and block catenary system |
| CN109560939A (en) * | 2019-01-29 | 2019-04-02 | 张超 | A kind of block method and the device out of block chain |
| CN109889397A (en) * | 2019-03-31 | 2019-06-14 | 杭州复杂美科技有限公司 | Drawing method, block generation method, equipment and storage medium |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110597489A (en) * | 2019-09-26 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Random number generation method, equipment and medium |
| CN110597489B (en) * | 2019-09-26 | 2023-11-24 | 腾讯科技(深圳)有限公司 | Random number generation method, equipment and medium |
| CN113052596A (en) * | 2019-12-28 | 2021-06-29 | 中移(成都)信息通信科技有限公司 | Block chain-based block output method, device, equipment and medium |
| CN113052596B (en) * | 2019-12-28 | 2024-04-09 | 中移(成都)信息通信科技有限公司 | Blockchain-based block generation method, device, equipment and medium |
| CN111443895A (en) * | 2020-03-12 | 2020-07-24 | 杭州泛链科技有限公司 | Verifiable random number generation method applied to block chain |
| CN111598567A (en) * | 2020-05-07 | 2020-08-28 | 深圳创客区块链技术有限公司 | Method, device and storage medium for preventing block chain large computing power attack |
| CN111598567B (en) * | 2020-05-07 | 2023-11-10 | 深圳创客区块链技术有限公司 | Method, device and storage medium for preventing blockchain powerful attack |
| CN112258326A (en) * | 2020-12-24 | 2021-01-22 | 布比(北京)网络技术有限公司 | Random block output method and system |
| CN112258326B (en) * | 2020-12-24 | 2021-03-16 | 布比(北京)网络技术有限公司 | Random block output method and system |
Also Published As
| Publication number | Publication date |
|---|---|
| CN110247753B (en) | 2020-10-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110210865A (en) | Packaging method and device based on block chain | |
| CN110247753A (en) | Go out block method and device based on block chain meshed network | |
| CN110223070A (en) | Verification method and device based on block chain meshed network | |
| CN110222537A (en) | Verification method and device applied to block chain link | |
| CN108848148B (en) | Transaction information confirmation method and device based on block chain | |
| CN111985007A (en) | Contract signing and executing method and device based on block chain | |
| CN110225044A (en) | Verification method and device on block chain | |
| JP2019536398A (en) | System architecture and method of processing data therein | |
| CN110233722A (en) | Go out block method and device on block chain | |
| CN110222538A (en) | It is related to the verification method and device of block chain | |
| CN113536240A (en) | Method and device for using admission ticket by combining NFT (network File transfer) | |
| CN110223069A (en) | Packaging method and device based on block chain meshed network | |
| CN110224839A (en) | Applied to the verification method and device on block chain | |
| CN110224813A (en) | Go out block method and device based on block chain | |
| CN111262707B (en) | Digital signature method, verification method, device and storage medium | |
| CN110224840A (en) | Packaging method and device based on block chain | |
| CN110245949A (en) | It is related to the packaging method and device of block chain | |
| CN110247773A (en) | Packaging method and device on block chain | |
| CN110245950A (en) | Be related to block chain goes out block method and device | |
| CN110225043A (en) | Packaging method and device applied to block chain | |
| CN111835815A (en) | Synchronous storage method and device for internet self-media data on block chain | |
| CN109885258A (en) | Data deletion apparatus and method based on block chain | |
| CN110990418A (en) | Asynchronous processing method and device based on block chain user data | |
| CN111831653A (en) | Method and device for storing self-media data of Internet on block chain | |
| CN119067664A (en) | A cross-border e-commerce transaction method and system based on big data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| CB02 | Change of applicant information | ||
| CB02 | Change of applicant information |
Address after: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant after: Beijing ruice Technology Co.,Ltd. Address before: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing Applicant before: BEIJING AIMORECE TECHNOLOGY Co.,Ltd. |
|
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |